Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Order 00293884800595.bat.exe

Overview

General Information

Sample name:Order 00293884800595.bat.exe
Analysis ID:1465164
MD5:efd3bf2442d368363512548564a51050
SHA1:ca5a3f2750542ea7d6b86f108eb6bff4095f4b16
SHA256:f321c2bed7f29e767bbbf1fb11f6fd64e41e5fe45b3fef084198583a20f9533b
Tags:AgentTeslabatexeGuLoader
Infos:

Detection

GuLoader
Score:88
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files

Classification

  • System is w10x64
  • Order 00293884800595.bat.exe (PID: 5352 cmdline: "C:\Users\user\Desktop\Order 00293884800595.bat.exe" MD5: EFD3BF2442D368363512548564A51050)
    • Order 00293884800595.bat.exe (PID: 2268 cmdline: "C:\Users\user\Desktop\Order 00293884800595.bat.exe" MD5: EFD3BF2442D368363512548564A51050)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000002.3805211828.0000000004DF4000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    Process Memory Space: Order 00293884800595.bat.exe PID: 5352JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: Order 00293884800595.bat.exeAvira: detected
      Source: Order 00293884800595.bat.exeReversingLabs: Detection: 13%
      Source: Order 00293884800595.bat.exeVirustotal: Detection: 20%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: Order 00293884800595.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: Order 00293884800595.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,1_2_00405A4F
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_00406620 FindFirstFileA,FindClose,1_2_00406620
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_004027CF FindFirstFileA,1_2_004027CF
      Source: Order 00293884800595.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
      Source: Order 00293884800595.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
      Source: Order 00293884800595.bat.exeString found in binary or memory: http://www.skinstudio.netG
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_0040550F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,1_2_0040550F

      System Summary

      barindex
      Source: initial sampleStatic PE information: Filename: Order 00293884800595.bat.exe
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004033D8
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_004072D11_2_004072D1
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_00406AFA1_2_00406AFA
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_6ED51B281_2_6ED51B28
      Source: Order 00293884800595.bat.exe, 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs Order 00293884800595.bat.exe
      Source: Order 00293884800595.bat.exe, 00000008.00000000.3804170183.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs Order 00293884800595.bat.exe
      Source: Order 00293884800595.bat.exeBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs Order 00293884800595.bat.exe
      Source: Order 00293884800595.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: classification engineClassification label: mal88.troj.evad.winEXE@2/17@0/0
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004033D8
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_004047BF GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,1_2_004047BF
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_00402198 CoCreateInstance,MultiByteToWideChar,1_2_00402198
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsdF577.tmpJump to behavior
      Source: Order 00293884800595.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile read: C:\Users\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: Order 00293884800595.bat.exeReversingLabs: Detection: 13%
      Source: Order 00293884800595.bat.exeVirustotal: Detection: 20%
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile read: C:\Users\user\Desktop\Order 00293884800595.bat.exeJump to behavior
      Source: unknownProcess created: C:\Users\user\Desktop\Order 00293884800595.bat.exe "C:\Users\user\Desktop\Order 00293884800595.bat.exe"
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess created: C:\Users\user\Desktop\Order 00293884800595.bat.exe "C:\Users\user\Desktop\Order 00293884800595.bat.exe"
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: oleacc.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: shfolder.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: riched20.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: usp10.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: msls31.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: textinputframework.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: coreuicomponents.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: coremessaging.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: textshaping.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
      Source: Order 00293884800595.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Data Obfuscation

      barindex
      Source: Yara matchFile source: Process Memory Space: Order 00293884800595.bat.exe PID: 5352, type: MEMORYSTR
      Source: Yara matchFile source: 00000001.00000002.3805211828.0000000004DF4000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_6ED51B28 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,1_2_6ED51B28
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\UserInfo.dllJump to dropped file
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\nsExec.dllJump to dropped file
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\BgImage.dllJump to dropped file
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Ragworm.LoyJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Allopurinol.fluJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Incute.RebJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Charting.skrJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\chokoladeforretning.marJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\doubling.regJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\hmoriderne.nerJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\TyndstegsfiletsJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\lvens.flbJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\FigurmrkerneJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne\materialiter.sigJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne\preinvest.priJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne\ridningen.txtJump to behavior
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeAPI/Special instruction interceptor: Address: 530A83C
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeRDTSC instruction interceptor: First address: 52D40A4 second address: 52D40A4 instructions: 0x00000000 rdtsc 0x00000002 test ebx, eax 0x00000004 cmp ebx, ecx 0x00000006 jc 00007FE4DD2819B5h 0x00000008 test ax, bx 0x0000000b inc ebp 0x0000000c inc ebx 0x0000000d rdtsc
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\UserInfo.dllJump to dropped file
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\System.dllJump to dropped file
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\nsExec.dllJump to dropped file
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\BgImage.dllJump to dropped file
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,1_2_00405A4F
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_00406620 FindFirstFileA,FindClose,1_2_00406620
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_004027CF FindFirstFileA,1_2_004027CF
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeAPI call chain: ExitProcess graph end nodegraph_1-4524
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeAPI call chain: ExitProcess graph end nodegraph_1-4668
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_6ED51B28 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,1_2_6ED51B28
      Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 1_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,1_2_004033D8
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      Registry Run Keys / Startup Folder
      1
      Access Token Manipulation
      1
      Masquerading
      OS Credential Dumping2
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault AccountsScheduled Task/Job1
      DLL Side-Loading
      1
      Process Injection
      1
      Access Token Manipulation
      LSASS Memory3
      File and Directory Discovery
      Remote Desktop Protocol1
      Clipboard Data
      Junk DataExfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Registry Run Keys / Startup Folder
      1
      Process Injection
      Security Account Manager23
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
      DLL Side-Loading
      1
      DLL Side-Loading
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      Order 00293884800595.bat.exe14%ReversingLabsWin32.Trojan.Generic
      Order 00293884800595.bat.exe20%VirustotalBrowse
      Order 00293884800595.bat.exe100%AviraHEUR/AGEN.1338492
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\BgImage.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\BgImage.dll0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\System.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\System.dll1%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\UserInfo.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\UserInfo.dll0%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\nsExec.dll0%ReversingLabs
      C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\nsExec.dll0%VirustotalBrowse
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
      http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
      http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
      http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
      http://www.skinstudio.netG0%Avira URL Cloudsafe
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://nsis.sf.net/NSIS_ErrorOrder 00293884800595.bat.exefalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://nsis.sf.net/NSIS_ErrorErrorOrder 00293884800595.bat.exefalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://www.skinstudio.netGOrder 00293884800595.bat.exefalse
      • Avira URL Cloud: safe
      unknown
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1465164
      Start date and time:2024-07-01 11:59:09 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 8m 7s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:9
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:Order 00293884800595.bat.exe
      Detection:MAL
      Classification:mal88.troj.evad.winEXE@2/17@0/0
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 99%
      • Number of executed functions: 51
      • Number of non-executed functions: 31
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240s for sample files taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      No context
      No context
      No context
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\System.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
        P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
          P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
            pp0fHVNbib.exeGet hashmaliciousFormBook, GuLoaderBrowse
              pp0fHVNbib.exeGet hashmaliciousGuLoaderBrowse
                kZlAkx6fp7.exeGet hashmaliciousFormBook, GuLoaderBrowse
                  kZlAkx6fp7.exeGet hashmaliciousGuLoaderBrowse
                    detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exeGet hashmaliciousGuLoaderBrowse
                      Kompagnonernes.exeGet hashmaliciousGuLoaderBrowse
                        detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exeGet hashmaliciousGuLoaderBrowse
                          C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\BgImage.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                            P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                              P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                C:\Users\user\AppData\Local\Temp\nssFF7B.tmp\UserInfo.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                  P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                    P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:modified
                                      Size (bytes):49
                                      Entropy (8bit):4.75216571132969
                                      Encrypted:false
                                      SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                                      MD5:797DA95245047A54F125FBF3B19FA295
                                      SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                                      SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                                      SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):7680
                                      Entropy (8bit):5.188410641489526
                                      Encrypted:false
                                      SSDEEP:96:8eQMA6z4f7TI20Y1wircawlkX1b3+LDfbAJ8uLzqkLnLiEQjJ3KxkP:tChfHv08wocw3+e8uLmyLpmP
                                      MD5:2D5F40DDC34E9DC8F43B5BF1F61301E3
                                      SHA1:5ED3CD47AFFC4D55750E738581FCE2B40158C825
                                      SHA-256:785944E57E8E4971F46F84A07D82DEE2AB4E14A68543D83BFE7BE7D5CDA83143
                                      SHA-512:605CEBCC480CB71BA8241782D89E030A5C01E1359ACCBDE174CB6BDAF249167347ECB06E3781CB9B1CC4B465CEF95F1663F0D9766ED84EBADE87AA3970765B3E
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Joe Sandbox View:
                                      • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                      • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                      • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.W.p.9Cp.9Cp.9Cp.8C@.9C..dCy.9C$..Cq.9C$..Cq.9C..=Cq.9CRichp.9C........PE..L....C.f...........!......................... ...............................P............@..........................$....... ..d............................@....................................................... ...............................text...3........................... ..`.rdata....... ......................@..@.data...$....0......................@....reloc..l....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):12288
                                      Entropy (8bit):5.744994954995265
                                      Encrypted:false
                                      SSDEEP:192:gFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/nC93:E7pJp48F2exrg5F/C
                                      MD5:12B140583E3273EE1F65016BECEA58C4
                                      SHA1:92DF24D11797FEFD2E1F8D29BE9DFD67C56C1ADA
                                      SHA-256:014F1DFEB842CF7265A3644BC6903C592ABE9049BFC7396829172D3D72C4D042
                                      SHA-512:49FFDFA1941361430B6ACB3555FD3AA05E4120F28CBDF7CEAA2AF5937D0B8CCCD84471CF63F06F97CF203B4AA20F226BDAD082E9421B8E6B62AB6E1E9FC1E68A
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 1%, Browse
                                      Joe Sandbox View:
                                      • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                      • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                      • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                      • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                      • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                      • Filename: kZlAkx6fp7.exe, Detection: malicious, Browse
                                      • Filename: kZlAkx6fp7.exe, Detection: malicious, Browse
                                      • Filename: detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exe, Detection: malicious, Browse
                                      • Filename: Kompagnonernes.exe, Detection: malicious, Browse
                                      • Filename: detalle_transferencia_2024-05-13T064143.173 0200_3049280002017526_PDF.exe, Detection: malicious, Browse
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....C.f...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...h....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):4096
                                      Entropy (8bit):3.327532764383977
                                      Encrypted:false
                                      SSDEEP:48:qKNKyd+Z46pHT1wHsl9rEGbgPgVZShMmj3OPRYBA:5JSRzuHsxE4VH6O+i
                                      MD5:90228DD140188EC0CA02F7F52E4C9A30
                                      SHA1:6880D9AEEC4C97C4B7718044C9C59B92379FEACA
                                      SHA-256:54BCF3D018734B884BD33A74A05EEA0AC3C83501ACBDB71EA8EC56EC9402A263
                                      SHA-512:1A38B1EBB9E2440DD240C8CD2406261E21B544ED392F808D36F78590075F854D89E624589BFDDABCACE96B33A7F3084C7686351BD66AE07EC035BBEF94EF8DA2
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Joe Sandbox View:
                                      • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                      • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                      • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                      Reputation:low
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................|........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):6656
                                      Entropy (8bit):5.178709395875687
                                      Encrypted:false
                                      SSDEEP:96:z0OBtYZKtPsrqBApt1JHpb9XWk7Qe06iE6mE6YNFyVOHd0+uPHwEX:4tZKtrAJJJbP7iEHEbN8Ved0Ph
                                      MD5:4A2F4FE4A3AD1DE56EE6BF7DD4923963
                                      SHA1:7CC68B94448C964FD99904E5784B059AED4D5DAA
                                      SHA-256:89B1E6509A1B45B32933E9D785A9C8C5B9CE7C616E1112DCF7FC3FA5CA27EBDE
                                      SHA-512:4B6BBE75BEAFAE9A29932FF5DDD3940AADFAE62C157836E6CDAB755955782DD5354D5EB389B4B8C16BF59F4CE7A099A0161D915C1CF2968F28E195DC8E3997EA
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                      Reputation:moderate, very likely benign file
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):25
                                      Entropy (8bit):4.163856189774724
                                      Encrypted:false
                                      SSDEEP:3:+gMn:8
                                      MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                                      SHA1:61DC848DD725DB72746E332D040A032C726C9816
                                      SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                                      SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:[Caps]..Setting=Enabled..
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3011
                                      Entropy (8bit):4.875614577841428
                                      Encrypted:false
                                      SSDEEP:48:Sl+lWlUMDNbr6641SO9Agz4x2qEtyTgz0gWP5CZ9sam0uxKKhY7SDEf:W+lLMDNbr6641S0z4xFEITggV+9zXa3Q
                                      MD5:6103DF2AF52F53D95AF61664D1866FFE
                                      SHA1:6AD99D4586667B497725EEC01AE0A772C441C1D4
                                      SHA-256:6AA446B014371D8DD9EF43D2A103E9CA8A0F61A3AFC4676BFC63AD07C1977C7E
                                      SHA-512:2AFA117DD3ACB8B695FFBC0F236E8B87F1DD4A7EAFD79A26CB4F191EED76DEBA7CBB106F3E78218769581C014840D039A4E173340CA0D6C2D2DFF0B5C5138096
                                      Malicious:false
                                      Preview:...W..n......t......b.5..Cb....&.................:....Q........x.i..../........h....x.`......(...D..x`...........'...M..z..v.........J.;...3...B.......#..s.._......p....q.,.t..........J.............................5...W.;B...G......._.............G.".3...mi..9.=..4.......V........7......@..o.1..n...u......9............=........D...........=.........y..).............Q.q................zG....O.0.}C...@......8.9bg.M...<........r......!Y.J.......A..........;.R............3..\...4.....N.2.X.i.......'.s..0....7....<...6.<......~..........).>..]...;....I...........:...R.....Lg....v..8............m.................T.$......ry5.5......A............M.............p..k..........2...~.k......................Y.Y`...}.....f.......8.PE........m...:.......a~......l-8..P..z..%.0.....]..L:.....E....?9.1.......;...E.....|...t.....n................vH.....u.................Q.<.Y....8......r.v............7........,1....Z.....c..6.G.....xc..j...8.H~....#.........F.,.......{-.VQ..6.v..u..f.....$.
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3794
                                      Entropy (8bit):4.876163305802233
                                      Encrypted:false
                                      SSDEEP:96:LnmpgKl8MI0hs4Qnu6lgB+EQFO+trNMgUIkR:7UpaMI34iu6eBdwO+8rIkR
                                      MD5:0629DF955F60990975A3C8EF199B57E9
                                      SHA1:FE57FA7FDF44B6E789A760C5292FD8DAE221187B
                                      SHA-256:499908BD96C7F2D9BC0F94433CC14C482C002C07A09DF0D73AF45BC17C4DA70B
                                      SHA-512:753EB2360926F32A6ED70E034FEAA57D6274756C3CE60914A4A1EC12DC07ACAC92C7906E3FE48A76F74BBEFBE8EAC023D352D11A087F47DEE9BD0ACBB59331F8
                                      Malicious:false
                                      Preview:.s............W?...T.7.h....~..2....4....`...Z....n..,.....L#.<....`j......U.................l...n.....................j......_...!/...........A........-.......Tk.................W......wv.4.N.....................>....n.T....OP.....%..e..."....,...]U...R. ..4.1k..........3J.%......d.....W............~..z...`........p......~D.....o..[...ib.......C......A..........%.....{.......W.r...............f...h....<...........~.......9.#.......0B>..o..*............,....p........T....J...]Y.S .........#.............................z......3..........{....H....p......v......V..F......,U..=.......R......Q.._.-4........,1...0.............v...z.............2<g.......;....!........g..d.1......d.J-......E.q......,.+...>.4eh...|T.:....B.......C........U......?.>..7.....h.....:...."..!..........6..........................B.@D.W.....8..............t..H.h............................S...h.....x....5......c."...................Q>.....2.5...)....%......T.....v........;1.......x.'.D.....y=.......O........
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):10873
                                      Entropy (8bit):4.45315643418991
                                      Encrypted:false
                                      SSDEEP:192:NnMiU6OB3y5rHQbiFwEfer0QRluQmbOysQvb7QdhA4rkcm+W86T:NMiU6U3y5jE6w0erLR0FOWbUDAUg
                                      MD5:4E2651680D03081750960F589C34FAFA
                                      SHA1:F2C11C99549A2F32D2F794271CFF605470A0DDA3
                                      SHA-256:47C3443F81BD967BBC234AC79B0B240EBDFCEF0684890AF05E30CD4B41818087
                                      SHA-512:6F0DACB3704F2AC5357BF228AF41D55D270C75CDF0359C50BBE10E61E80EE24AD2D4EB2E25B00DCBC75CD1F769E33F81236B9BBF338C495F787A225C115C991E
                                      Malicious:false
                                      Preview:...A...........8.LLL.4.mmm...II.............KK.......LL.........**...`.\\\...................._k...e...r..^n.gge...l...3...2...:...:...C...r...e...a..ot...e...F...i...l..ce...A...(...m.yy ...r...4.P. ...,... ...i... ...0...x..=8...0...0...0...0...0...0...0...,... ._.i... ...0...,... ...p... ..G0...,..I ..8i... ...4...,... ...i... ...0...x...8...0...,... ...i... ...0...)...i.......r...8..2q...k...e...r...n...e...l...3...2...:...:...S.:.e...t...F..Hi...l...e..fP...o.**i...n...t...e...r...(..Si.rr ...r...8...,..{ ...i..& ...2...3...0...1...2... ...,... ...i... ...0...,...i... ...0...)...i.......r...4...q...k...e...r...n...e...l...3...2.3.:...:...V...i...r.HHt...u...a.Z.l...A...l...l...o..ac...(...i... ...0...,...i... ...3...1...6..)7...4..~3...6.!!8...,..G ...i..\ ...0..dx...3.Y.0...0...0..v,... ...i.;; ...0...x..'4...0...)...p.......r...2...q...k...e...r...n.{.e...l...3...2...:...:...R...e...a...d...F...i...l...e...(...i... ...r. 8..1,... ..Zi.x. .6.r..Q2...,... ...i. . .ff3...1...6.j.7
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):253454
                                      Entropy (8bit):7.522001887072237
                                      Encrypted:false
                                      SSDEEP:6144:4p6mcA5t6dww234eadgurEHsERrPNEVzoo3mKd/nmt+:06mR5Edt22uv1emKB9
                                      MD5:30D029AAEF1DD0E2E041462E6AE62742
                                      SHA1:E8065BC7AEE55C97FA97A08070F40F2BF5169464
                                      SHA-256:43F89369DB3D8E15A092E771580E111E4CD3C517F83F48CAC9907FBF9872B2A0
                                      SHA-512:724DD6EA2CBB319ADFA7A2AC4E87739AF15A3C4D1904743032AC0CF2D1E4AE6240B81FD65E041AF34F8233393A7BAA1D8EE907FB311F741F7BB9A6B86AC1F824
                                      Malicious:false
                                      Preview:...............WWW.???..............------...................H......................ccc..b....vvvvv.X.........................................................ZZZ.@@......6..PPP.)))...888........GGGGG........................EEEE....L...............c..........o.............N...........MM.................................$$..r...................@.......^.#..........C......ccccc.........ddd......................A......................................!....G......????...................LL..........^.......................QQQQQQQQ....z..............1....."""................bbb...^.A....................q.....................................s.........<<.N.....................KKK...................................ggg....]._....777.c................]......x............;......2222..a.x....;;.I....|...nnn....::.f..666.................X.........QQQ........v...........3..........{..........................*....N..........}.................###..................;;;;.............X.....QQ.......i....HHH.j
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):2438
                                      Entropy (8bit):4.834166284053989
                                      Encrypted:false
                                      SSDEEP:48:QMQ2WErZ2pGC24S3HorZ9JAGA8jkcrbs1DHkkkIq/iSlcHKMVi:X59ys3HorNAGArcr2c/WKWi
                                      MD5:6C88CA43B6FA2E51F1BE781CDF1A7C3E
                                      SHA1:85E53052FFFD4D9AB7FD255A39628FB9D9A4C57D
                                      SHA-256:87747776DBB97E3892F3B4FE2507A907737E3E01F94F88B0D0ED7D849EFD31CF
                                      SHA-512:4B12F969637C61A8F6E1EF79DB3D54DC076672E35B1F67B9742F3B99A38F933298E2DB262A5DB487E281B85BF37FF74FB036E5C5AA3D6844B2D8AC0937B0F483
                                      Malicious:false
                                      Preview:...-....?..A..d.Z..............!.........\..j+.\...E.C..0.6........3.......K....E.....x....g..l.A............Ic........)P.7e.?.......v...|...Q.....h..<.....>........v6.=..;....@...............8,.........W....4.w... ..y......n._...L.IFr.....N...w...U..........H...%.......)......n..<K...:.........o...x..<........0....I...!&.......<.....p..._...........s.......L.......O...F...........p.......c..c.........%.]........X.........-......X.....{.x........^."...x...N....,..........1......)WD.+.[........?P..........4....6...........Z.B............R....;.....e.(.....7...}.........P....3...7B.....(...................................$........O.-"...k....]..........]....F.)...........)......v.....^..Q.......f}......!....0.........=........................m...........A....Q...(w...a......J3...U.n....\0...M..)......Y.....P..#...........p..R........N..^...R.............'.{.............y....g.....^L.......X.............t=z...VP..|.........l..E.-..(..F.....q..I....p..N\.......S.....f1.......4.
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3194
                                      Entropy (8bit):4.87998401204962
                                      Encrypted:false
                                      SSDEEP:48:rpEyDeY5QtYx201GaEtVnQvy5Dv6Z3JIV50tFh1FrDopL0AHmEMAaovQIS+GO/m+:fDeATGaETkd5J8e51xMYOey/mgRbP
                                      MD5:73DC0D944FBB5219CEDD966AF6EBB2C8
                                      SHA1:24D17D23C94CFC76FEF577CAF82C6D45B6125591
                                      SHA-256:3C2F20CCCBB8EEC2F5B2A70E44EC1631BFC8070C2F5A9198F1096563A8D0FA52
                                      SHA-512:72FE2BEEAFE7F5296FA346947E0BE3824B934545A299BFCB4AEBA9BD095AA7A2756E42C9D88E5DDDD072C931D35075AED7C7D4E3B641F74A62C96E150C573E4F
                                      Malicious:false
                                      Preview:........F...........].....<.~......d.............Y..1t...o...(...XA...~.h.qE-...KY..........F{....X............E)....x...R}......$$.}..6.......h+...9&.....c.....+.f..d........!.C....E.z../.....MZ............g.......\..?....@.....s..k.P}......$.<...........aE....!q.........*..e.V.q.b..Ui.R..>.h..R.F...........jM.W..G...^.l.....%.........D......*.v.P.=....s<.....D".....0.).$...B......+..*.B......N..o....o../....z..................G..............%..L..Y.....r.B.Zn..I...x...f.............)....6........?..............."..............'....-......G.................x..C...............t....`.................Q.a....}....e...................i.............0.q.....G..#......t....../]..hH.(......C.Y.z4...y........T..E...E....3....i....._........>.?.p...e....y..)?...o..i....5...S.$.....,.............\.......)..u.........8............p..\......... .........3...9....t...._..o......#U...r0..................g..............n.....d.....b....qE...............4..%..j..0Y.P......(.z...........R<C....
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):434
                                      Entropy (8bit):4.287029634434794
                                      Encrypted:false
                                      SSDEEP:12:THnAEO/X/lz5Qxq70QPiETlsieWr5hmhAZYOua3Jy6:kt5CqtPT7rUk3f
                                      MD5:D831A4A6C7B8B672C51DC73C42BF1B99
                                      SHA1:2EFA4039C5CBBE38D45B65CFCD8CB283B0B00F6F
                                      SHA-256:57B3854CDF7B15EB58BFD24E92F41E8B4A513F9A413E7981891B71F5BD56F4B8
                                      SHA-512:D5920BC02B61C18C83CE48D41AE1777F50685766A60CCB6C53161B25E3AFB34A1DDB0E8710C37E3B8B050F772E3EAB3A65FB4ACB093AEFD55AA2FDA74EC6C8F7
                                      Malicious:false
                                      Preview:chertier urduet extrabronchial foruroliger weakliest digesters glansbillederne weretiger superinfiniteness halisteretic udkommentere snowbourn gldstninger..resknderens landhandler ujvnheds rankerne rykkedes,kosos skabelseshistoriens sklves newsmagazine,timberman civilists expection unlowered agrostology landsplanlgnings stereoisomerism.parablen pachydermatoid jumpsuits kraftens estraden.misocapnic blygraa perirraniai flaskebakker,
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):2322
                                      Entropy (8bit):4.685927571910316
                                      Encrypted:false
                                      SSDEEP:48:hKk/USLt/YV/KNG2/Jddel368ugS8jMMccq3mtjzlrNiNviupW9:hb/USL1YV/K/TdeQ8jMMcYn3Opq
                                      MD5:C4A322BD2B1B0FD5130E2119EBE14A09
                                      SHA1:4C0F0F8AAC954E9D599F8C89B340F5C3C4742A6B
                                      SHA-256:063D6E2970210F7A4C74FE744AD76E71650AB5CB974EE4A9AF2BF446D6B2B3BF
                                      SHA-512:64FCE5DC8E510DCCAEA30E2BDB0671C706CECFB4AEC19ECD5B6326E4EE4B1B33A422E917A522F0CFCA184007ABE2B9D89EA401757A637D8D3DFA4B156E58A04A
                                      Malicious:false
                                      Preview:..e..k......Dh........=........z...W...m5K...0...R....4:.L....p.........-.......>...`..#.^.......>...d.d..7..........E...5N...@.......................K......:.o........t....... ......;....e.....R............>......,..&.|...................l+..e....q..Cf....U|..I.X.....U..e.G.....f.........&.......A....................9..}....E...............~.....9...q......T...G.....( ..t..x.......y......[.........Hh....GC9...........Q......C..N..Qt.~.......x.....L.......1.............................T..........V....6.....Ajt..@.....?...............$X.......m.n..........,.U......7.......X.................V........W......\P..............PE.....w......F....:.'9H....;eB.....{+.{.J....s........F....:......X..k.........../.......?.Z..+.....>.F..`1T....2.3.I7...`..{....k.u......b.......J+D...........Y8..y......UU...............3./...... .....[........]N6...y.e.........H..............m...........\.........V..[........W...&.U..........2..r....C....U.3....?...~....Wz......W.....|.C.......a,............
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3861
                                      Entropy (8bit):4.8950653795254695
                                      Encrypted:false
                                      SSDEEP:96:GKEfl8Ry/OyCvfcyh5ph9whBJQRaTYbEVr1wbd:MfObXc2h9iQUDZ1y
                                      MD5:2B5A33F2637CE6016495BE603413514E
                                      SHA1:571279989D47FF42C2974CDEDEA4C872CB9424CF
                                      SHA-256:46F41A0D8B9B891702F9ED2FB60FF737A2275011882501155B710EF9BA8577C7
                                      SHA-512:F55FE759C0DF2E8B9E38962E386BEB468FD4442714233F5A5DD13CA10647411FD62D966D8363FE50568F15525EEE815493AEDEF112A6FA6FA0B506A97AF21CF6
                                      Malicious:false
                                      Preview:.N..........b..Q...G..p.1...;...f._......X.........+..................1r.ES...9...~..C...?B...........IpF........0.......3...............S.......w..>?...$.....J...q..............K..................l........................;.......!.....................I.:..................S......4..kZ.../..................d.......a..............cs....9.......l......(....h.....F..'.V..........}..&C.;U..........._...............N..#.V...................:..".............j...?.....K...H.....s................._....L...1.....Z..L........."..........J.......1......`.......1..........@.y.......6...P...]....Z..........................Ob.....L.....U..cZ..n.CXq.........0...q.......K..........U...K....@/..|.......... ..|......pN.E......................>......?..Z=k....<............S......p.<..3..........1o.......Il.....3.y.................2....(.!.i(XC...b...Le..`.........@............*........=.....=v.=.'..>.............?........].Y..m........."$^L..^A...u......O....K9.3.......................;uG..*.
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):3435
                                      Entropy (8bit):4.910328234136937
                                      Encrypted:false
                                      SSDEEP:48:P/sA7KBdAWdry+HEnrwU7j9mS/QwZ/kQMlzuVm+aAIBzx396upw/QAa/rl0:sA70/BEwy9D/XDVtIBzx3oupIa/6
                                      MD5:4A27BE5B33E9690FFCC4087DE6B78DE1
                                      SHA1:808A634035F94A20441F52F413777897DFD7D3E0
                                      SHA-256:CA6742E9E11A6E3008BAE84674451A7228E0E79F53A34235269984EFAE996C72
                                      SHA-512:6D4114A7DCF410C531465AEE6802A3A0A965864DD4AE65E304188931D17C394B3A700DA6558CCB2BF37AA99906D34A1E38E7CF62E655A6E2EAC3E5CDC38449E9
                                      Malicious:false
                                      Preview:.*.....G.[..........*Wd......^..................;{..+........o..a.....g..2......BN...........m`..{...g..k..(..........Z.s...Z....|.`.$....u..m..@.b.h.........n[.q...!.....(B.C..........4KC..................v.......[.q.i.......ug...g...E.....A..[..o38..........N.^.......y.p.z....._.!..........<.,..I.Y..G................._....;\.&........\.....bu..>...........=...r..y...}....`|7.......w...2...........*od.C.......................... ....................ul._9.4<...~..........................e]...+.....i.......... _....................l...........z.u..2f...4...$.Pg................J............h...D.......R.3..........G!..w.r."..........{.JS8........O.P....m...'.......rS..........1..2....0.......+....M...0.....Y...:.*........Q....g.l.q......'.r$..........7............6.........o..2..5...........%.0...:.........G......................|............._...8.P...................|.......r...........M.......6~...B...g.d.........5....'...................3....Y...}.4L.DT,.....R..Ds....7.........
                                      Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):1618
                                      Entropy (8bit):4.660461986408
                                      Encrypted:false
                                      SSDEEP:48:mV2wmwMfFEXBaoCpI1sCEVHQTtlgJtScnbhH7D:maNK/0IOQjgJhx
                                      MD5:5A5EB5C7789F88A3DCC3F79DB0AA1A49
                                      SHA1:E67C28DEF4C59F267095C50C6A571AB5B65A9D04
                                      SHA-256:3A7318B3E11D39D783BA8BCCCAD3541B6896A03B1533E4F189DFD1CCC2FF40CE
                                      SHA-512:9762CD2524E971CF672D8DD8F46F4E7EE3F0FF5D91D11801AECB135DF9FBA6FC93D5FCC131879C1D3A81F2734AC5D6E07016E6CEC131A5F51C54CFE0664D0238
                                      Malicious:false
                                      Preview:...b..>.P.....k.................`T...........-.8...$....#P...f..9%......Y.9....o............C...#...............O|......9......u.............e......D=.A...............x...c....5^..?....G..h.....'..........k....../............Bn........i........&..............5Q..4........@..C......7.;....t....5...............C..x..................H...@.....>.......9.h..c......3..9W..$......v.....~.........!.......Y...."X.....N..|......d....Z.[.......+j.....@xB..w..S.........N.............J......u...................n....x....'..R.n.;...=.H`............................3...c.e..F..C.....n.0n..).......Y...Z..0..I.Q...Y.......H-...W..Q......<.`......l.........".S...Mg.8...X.........0/........[..$.........R...p.k-......S....`.....................k.....@......L.8.$....\M..............>.l.................d...O............R....+.................g..x.....>..b......V-..w...../...8......G......Q..........}..G..............'....................v.......m.}:...I$...........".M...J........._*..{...........
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):7.446136838270128
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:Order 00293884800595.bat.exe
                                      File size:507'437 bytes
                                      MD5:efd3bf2442d368363512548564a51050
                                      SHA1:ca5a3f2750542ea7d6b86f108eb6bff4095f4b16
                                      SHA256:f321c2bed7f29e767bbbf1fb11f6fd64e41e5fe45b3fef084198583a20f9533b
                                      SHA512:c26bea56fd64182ecfb9c2d3968d8c2e9cf8066a421606cda53ab3684d5564fb9e5f4496ca61c8b2c97fa5e52a81753481a40dddbe7115ba5ec96c580e035dcc
                                      SSDEEP:12288:c19+dlfwYKZWegvXQto36lPXgPQxJ31hRW/UiPk:PdloYK7gvAS3QGQ31hRNV
                                      TLSH:E5B4CF53F72388DBDA3D13F199A2C7772EE410199971D5DDA3E2BE8770009263A193B8
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L....C.f.................h...x.......3............@
                                      Icon Hash:eb9b9b2bbb9be371
                                      Entrypoint:0x4033d8
                                      Entrypoint Section:.text
                                      Digitally signed:false
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x660843F9 [Sat Mar 30 16:55:21 2024 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:671f2a1f8aee14d336bab98fea93d734
                                      Instruction
                                      push ebp
                                      mov ebp, esp
                                      sub esp, 00000224h
                                      push esi
                                      push edi
                                      xor edi, edi
                                      push 00008001h
                                      mov dword ptr [ebp-14h], edi
                                      mov dword ptr [ebp-0Ch], 0040A188h
                                      mov dword ptr [ebp-08h], edi
                                      mov byte ptr [ebp-04h], 00000020h
                                      call dword ptr [0040809Ch]
                                      mov esi, dword ptr [004080A0h]
                                      lea eax, dword ptr [ebp-000000C4h]
                                      push eax
                                      mov dword ptr [ebp-000000B0h], edi
                                      mov dword ptr [ebp-30h], edi
                                      mov dword ptr [ebp-2Ch], edi
                                      mov dword ptr [ebp-000000C4h], 0000009Ch
                                      call esi
                                      test eax, eax
                                      jne 00007FE4DC4F9241h
                                      lea eax, dword ptr [ebp-000000C4h]
                                      mov dword ptr [ebp-000000C4h], 00000094h
                                      push eax
                                      call esi
                                      cmp dword ptr [ebp-000000B4h], 02h
                                      jne 00007FE4DC4F922Ch
                                      movsx cx, byte ptr [ebp-000000A3h]
                                      mov al, byte ptr [ebp-000000B0h]
                                      sub ecx, 30h
                                      sub al, 53h
                                      mov byte ptr [ebp-2Ah], 00000004h
                                      neg al
                                      sbb eax, eax
                                      not eax
                                      and eax, ecx
                                      mov word ptr [ebp-30h], ax
                                      cmp dword ptr [ebp-000000B4h], 02h
                                      jnc 00007FE4DC4F9224h
                                      and byte ptr [ebp-2Ah], 00000000h
                                      cmp byte ptr [ebp-000000AFh], 00000041h
                                      jl 00007FE4DC4F9213h
                                      movsx ax, byte ptr [ebp-000000AFh]
                                      sub eax, 40h
                                      mov word ptr [ebp-30h], ax
                                      jmp 00007FE4DC4F9206h
                                      mov word ptr [ebp-30h], di
                                      cmp dword ptr [ebp-000000C0h], 0Ah
                                      jnc 00007FE4DC4F920Ah
                                      and word ptr [ebp+00000000h], 0000h
                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x430000x33c30.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x660c0x68003b90adcd2f1248db844446cb2ef15486False0.6663912259615384data6.411908920093797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x80000x13400x1400b3bd9ad1bd1020c5cf4d51a4d7b61e07False0.4576171875data5.237673976044139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xa0000x251380x600c4e774255fea540ed5efa114edfa6420False0.4635416666666667data4.1635686587741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .ndata0x300000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x430000x33c300x33e007fa7729fe4a0557bfedd7b90570ef402False0.497632718373494data6.34541536700329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x433880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.30904708387554714
                                      RT_ICON0x53bb00xb761PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867930557034827
                                      RT_ICON0x5f3180x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.3459112886272861
                                      RT_ICON0x687c00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.391913123844732
                                      RT_ICON0x6dc480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.4092465753424658
                                      RT_ICON0x71e700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.4437759336099585
                                      RT_ICON0x744180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5302532833020638
                                      RT_ICON0x754c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.6196721311475409
                                      RT_ICON0x75e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6524822695035462
                                      RT_DIALOG0x762b00x100dataEnglishUnited States0.5234375
                                      RT_DIALOG0x763b00x11cdataEnglishUnited States0.6056338028169014
                                      RT_DIALOG0x764d00xc4dataEnglishUnited States0.5918367346938775
                                      RT_DIALOG0x765980x60dataEnglishUnited States0.7291666666666666
                                      RT_GROUP_ICON0x765f80x84dataEnglishUnited States0.9242424242424242
                                      RT_VERSION0x766800x270dataEnglishUnited States0.5016025641025641
                                      RT_MANIFEST0x768f00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                      DLLImport
                                      ADVAPI32.dllRegEnumValueA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegOpenKeyExA, RegCreateKeyExA
                                      SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteExA
                                      ole32.dllOleUninitialize, OleInitialize, IIDFromString, CoCreateInstance, CoTaskMemFree
                                      COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                      USER32.dllSetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcA, GetMessagePos, CheckDlgButton, LoadCursorA, SetCursor, GetSysColor, SetWindowPos, GetWindowLongA, IsWindowEnabled, SetClassLongA, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetDlgItemTextA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, MessageBoxIndirectA, CharPrevA, PeekMessageA, GetClassInfoA, DispatchMessageA, TrackPopupMenu
                                      GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor
                                      KERNEL32.dllCreateFileA, GetTempFileNameA, ReadFile, RemoveDirectoryA, CreateProcessA, CreateDirectoryA, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceA, lstrcpynA, SetErrorMode, GetVersionExA, lstrlenA, GetCommandLineA, GetTempPathA, GetWindowsDirectoryA, WriteFile, ExitProcess, CopyFileA, GetCurrentProcess, GetModuleFileNameA, GetFileSize, GetTickCount, Sleep, SetFileAttributesA, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv, lstrcpyA, MoveFileExA, lstrcatA, WideCharToMultiByte, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableA
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      No network behavior found

                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:1
                                      Start time:06:00:13
                                      Start date:01/07/2024
                                      Path:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Order 00293884800595.bat.exe"
                                      Imagebase:0x400000
                                      File size:507'437 bytes
                                      MD5 hash:EFD3BF2442D368363512548564A51050
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.3805211828.0000000004DF4000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Target ID:8
                                      Start time:06:04:18
                                      Start date:01/07/2024
                                      Path:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                      Wow64 process (32bit):
                                      Commandline:"C:\Users\user\Desktop\Order 00293884800595.bat.exe"
                                      Imagebase:
                                      File size:507'437 bytes
                                      MD5 hash:EFD3BF2442D368363512548564A51050
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:21.5%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:16.1%
                                        Total number of Nodes:1549
                                        Total number of Limit Nodes:41
                                        execution_graph 3904 4015c2 3908 402c5e 3904->3908 3907 4015db 3909 402c6a 3908->3909 3914 406320 3909->3914 3912 4015c9 SetFileAttributesA 3912->3907 3929 40632d 3914->3929 3915 40656e 3916 402c8b 3915->3916 3953 40628d lstrcpynA 3915->3953 3916->3912 3931 406587 3916->3931 3918 406545 lstrlenA 3918->3929 3919 406320 15 API calls 3919->3918 3922 40644c GetSystemDirectoryA 3922->3929 3924 406462 GetWindowsDirectoryA 3924->3929 3925 406587 5 API calls 3925->3929 3926 4064ee lstrcatA 3926->3929 3927 406320 15 API calls 3927->3929 3929->3915 3929->3918 3929->3919 3929->3922 3929->3924 3929->3925 3929->3926 3929->3927 3930 4064c5 SHGetPathFromIDListA CoTaskMemFree 3929->3930 3940 406174 3929->3940 3945 4066b5 GetModuleHandleA 3929->3945 3951 4061eb wsprintfA 3929->3951 3952 40628d lstrcpynA 3929->3952 3930->3929 3937 406593 3931->3937 3932 4065ff CharPrevA 3934 4065fb 3932->3934 3933 4065f0 CharNextA 3933->3934 3933->3937 3934->3932 3936 40661a 3934->3936 3936->3912 3937->3933 3937->3934 3938 4065de CharNextA 3937->3938 3939 4065eb CharNextA 3937->3939 3961 405c4a 3937->3961 3938->3937 3939->3933 3954 406113 3940->3954 3943 4061d7 3943->3929 3944 4061a8 RegQueryValueExA RegCloseKey 3944->3943 3946 4066d1 3945->3946 3947 4066db GetProcAddress 3945->3947 3958 406647 GetSystemDirectoryA 3946->3958 3950 4066ea 3947->3950 3949 4066d7 3949->3947 3949->3950 3950->3929 3951->3929 3952->3929 3953->3916 3955 406122 3954->3955 3956 40612b RegOpenKeyExA 3955->3956 3957 406126 3955->3957 3956->3957 3957->3943 3957->3944 3959 406669 wsprintfA LoadLibraryExA 3958->3959 3959->3949 3962 405c50 3961->3962 3963 405c63 3962->3963 3964 405c56 CharNextA 3962->3964 3963->3937 3964->3962 3965 401a43 3966 402c5e 21 API calls 3965->3966 3967 401a4c ExpandEnvironmentStringsA 3966->3967 3968 401a60 3967->3968 3970 401a73 3967->3970 3969 401a65 lstrcmpA 3968->3969 3968->3970 3969->3970 3971 402543 3982 402c9e 3971->3982 3974 402c5e 21 API calls 3975 402556 3974->3975 3976 402560 RegQueryValueExA 3975->3976 3979 4027ed 3975->3979 3977 402580 3976->3977 3981 402586 RegCloseKey 3976->3981 3977->3981 3987 4061eb wsprintfA 3977->3987 3981->3979 3983 402c5e 21 API calls 3982->3983 3984 402cb5 3983->3984 3985 406113 RegOpenKeyExA 3984->3985 3986 40254d 3985->3986 3986->3974 3987->3981 5029 401744 5030 402c5e 21 API calls 5029->5030 5031 40174b SearchPathA 5030->5031 5032 401766 5031->5032 5033 401d44 5034 402c3c 21 API calls 5033->5034 5035 401d4b 5034->5035 5036 402c3c 21 API calls 5035->5036 5037 401d57 GetDlgItem 5036->5037 5038 40264d 5037->5038 5039 402ac5 SendMessageA 5040 402aea 5039->5040 5041 402adf InvalidateRect 5039->5041 5041->5040 5042 405345 5043 405355 5042->5043 5044 405369 5042->5044 5045 40535b 5043->5045 5054 4053b2 5043->5054 5046 405371 IsWindowVisible 5044->5046 5050 405388 5044->5050 5048 404379 SendMessageA 5045->5048 5049 40537e 5046->5049 5046->5054 5047 4053b7 CallWindowProcA 5051 405365 5047->5051 5048->5051 5055 404c80 SendMessageA 5049->5055 5050->5047 5060 404d00 5050->5060 5054->5047 5056 404ca3 GetMessagePos ScreenToClient SendMessageA 5055->5056 5057 404cdf SendMessageA 5055->5057 5058 404cdc 5056->5058 5059 404cd7 5056->5059 5057->5059 5058->5057 5059->5050 5069 40628d lstrcpynA 5060->5069 5062 404d13 5070 4061eb wsprintfA 5062->5070 5064 404d1d 5065 40140b 2 API calls 5064->5065 5066 404d26 5065->5066 5071 40628d lstrcpynA 5066->5071 5068 404d2d 5068->5054 5069->5062 5070->5064 5071->5068 3988 4023c9 3989 4023d1 3988->3989 3990 4023d7 3988->3990 3991 402c5e 21 API calls 3989->3991 3992 402c5e 21 API calls 3990->3992 3994 4023e7 3990->3994 3991->3990 3992->3994 3993 402c5e 21 API calls 3997 4023fe WritePrivateProfileStringA 3993->3997 3995 402c5e 21 API calls 3994->3995 3996 4023f5 3994->3996 3995->3996 3996->3993 3998 4020ca 3999 40218a 3998->3999 4000 4020dc 3998->4000 4003 401423 28 API calls 3999->4003 4001 402c5e 21 API calls 4000->4001 4002 4020e3 4001->4002 4004 402c5e 21 API calls 4002->4004 4008 40230f 4003->4008 4005 4020ec 4004->4005 4006 402101 LoadLibraryExA 4005->4006 4007 4020f4 GetModuleHandleA 4005->4007 4006->3999 4009 402111 GetProcAddress 4006->4009 4007->4006 4007->4009 4010 402120 4009->4010 4011 40215d 4009->4011 4013 402128 4010->4013 4014 40213f 4010->4014 4064 4053d1 4011->4064 4061 401423 4013->4061 4019 6ed5176b 4014->4019 4015 402130 4015->4008 4017 40217e FreeLibrary 4015->4017 4017->4008 4020 6ed5179b 4019->4020 4075 6ed51b28 4020->4075 4022 6ed517a2 4023 6ed518c4 4022->4023 4024 6ed517b3 4022->4024 4025 6ed517ba 4022->4025 4023->4015 4123 6ed5233f 4024->4123 4107 6ed52381 4025->4107 4030 6ed517d0 4035 6ed517d6 4030->4035 4039 6ed517e1 4030->4039 4031 6ed517e9 4045 6ed517df 4031->4045 4133 6ed52d53 4031->4133 4032 6ed51800 4136 6ed52568 4032->4136 4033 6ed5181e 4036 6ed51824 4033->4036 4037 6ed5186c 4033->4037 4035->4045 4117 6ed52ac8 4035->4117 4155 6ed515fb 4036->4155 4043 6ed52568 11 API calls 4037->4043 4038 6ed51806 4147 6ed515e9 4038->4147 4127 6ed52742 4039->4127 4048 6ed5185d 4043->4048 4045->4032 4045->4033 4060 6ed518b3 4048->4060 4161 6ed5252e 4048->4161 4050 6ed517e7 4050->4045 4051 6ed52568 11 API calls 4051->4048 4055 6ed518bd GlobalFree 4055->4023 4057 6ed5189f 4057->4060 4165 6ed51572 wsprintfA 4057->4165 4058 6ed51898 FreeLibrary 4058->4057 4060->4023 4060->4055 4062 4053d1 28 API calls 4061->4062 4063 401431 4062->4063 4063->4015 4065 4053ec 4064->4065 4074 40548f 4064->4074 4066 405409 lstrlenA 4065->4066 4067 406320 21 API calls 4065->4067 4068 405432 4066->4068 4069 405417 lstrlenA 4066->4069 4067->4066 4070 405445 4068->4070 4071 405438 SetWindowTextA 4068->4071 4072 405429 lstrcatA 4069->4072 4069->4074 4073 40544b SendMessageA SendMessageA SendMessageA 4070->4073 4070->4074 4071->4070 4072->4068 4073->4074 4074->4015 4168 6ed512a5 GlobalAlloc 4075->4168 4077 6ed51b4f 4169 6ed512a5 GlobalAlloc 4077->4169 4079 6ed51d90 GlobalFree GlobalFree GlobalFree 4080 6ed51dad 4079->4080 4093 6ed51df7 4079->4093 4082 6ed52181 4080->4082 4088 6ed51dc2 4080->4088 4080->4093 4081 6ed51c4d GlobalAlloc 4099 6ed51b5a 4081->4099 4083 6ed521a3 GetModuleHandleA 4082->4083 4082->4093 4084 6ed521b4 LoadLibraryA 4083->4084 4085 6ed521c9 4083->4085 4084->4085 4084->4093 4176 6ed51652 GetProcAddress 4085->4176 4086 6ed51c98 lstrcpyA 4090 6ed51ca2 lstrcpyA 4086->4090 4087 6ed51cb6 GlobalFree 4087->4099 4088->4093 4172 6ed512b4 4088->4172 4090->4099 4091 6ed5221a 4091->4093 4096 6ed52227 lstrlenA 4091->4096 4092 6ed52047 4175 6ed512a5 GlobalAlloc 4092->4175 4093->4022 4177 6ed51652 GetProcAddress 4096->4177 4097 6ed521db 4097->4091 4105 6ed52204 GetProcAddress 4097->4105 4099->4079 4099->4081 4099->4086 4099->4087 4099->4090 4099->4092 4099->4093 4100 6ed51f89 GlobalFree 4099->4100 4101 6ed520c3 4099->4101 4102 6ed512b4 2 API calls 4099->4102 4170 6ed515c4 GlobalSize GlobalAlloc 4099->4170 4100->4099 4101->4093 4104 6ed5211c lstrcpyA 4101->4104 4102->4099 4104->4093 4105->4091 4106 6ed5204f 4106->4022 4115 6ed5239a 4107->4115 4109 6ed524d6 GlobalFree 4110 6ed517c0 4109->4110 4109->4115 4110->4030 4110->4031 4110->4045 4111 6ed52448 GlobalAlloc MultiByteToWideChar 4113 6ed52495 4111->4113 4114 6ed52474 GlobalAlloc CLSIDFromString GlobalFree 4111->4114 4112 6ed512b4 GlobalAlloc lstrcpynA 4112->4115 4113->4109 4183 6ed526d6 4113->4183 4114->4109 4115->4109 4115->4111 4115->4112 4115->4113 4179 6ed5133d 4115->4179 4119 6ed52ada 4117->4119 4118 6ed52b7f EnumWindows 4122 6ed52b9d 4118->4122 4119->4118 4121 6ed52c69 4121->4045 4186 6ed52a74 4122->4186 4124 6ed52354 4123->4124 4125 6ed5235f GlobalAlloc 4124->4125 4126 6ed517b9 4124->4126 4125->4124 4126->4025 4131 6ed52772 4127->4131 4128 6ed52820 4130 6ed52826 GlobalSize 4128->4130 4132 6ed52830 4128->4132 4129 6ed5280d GlobalAlloc 4129->4132 4130->4132 4131->4128 4131->4129 4132->4050 4134 6ed52d5e 4133->4134 4135 6ed52d9e GlobalFree 4134->4135 4190 6ed512a5 GlobalAlloc 4136->4190 4138 6ed52574 4139 6ed52604 StringFromGUID2 WideCharToMultiByte 4138->4139 4140 6ed525f3 lstrcpynA 4138->4140 4141 6ed52628 WideCharToMultiByte 4138->4141 4142 6ed52649 wsprintfA 4138->4142 4143 6ed5266d GlobalFree 4138->4143 4144 6ed526a7 GlobalFree 4138->4144 4145 6ed512f6 2 API calls 4138->4145 4191 6ed51361 4138->4191 4139->4138 4140->4138 4141->4138 4142->4138 4143->4138 4144->4038 4145->4138 4195 6ed512a5 GlobalAlloc 4147->4195 4149 6ed515ee 4150 6ed515fb 2 API calls 4149->4150 4151 6ed515f8 4150->4151 4152 6ed512f6 4151->4152 4153 6ed512ff GlobalAlloc lstrcpynA 4152->4153 4154 6ed51338 GlobalFree 4152->4154 4153->4154 4154->4048 4156 6ed51634 lstrcpyA 4155->4156 4157 6ed51607 wsprintfA 4155->4157 4160 6ed5164d 4156->4160 4157->4160 4160->4051 4162 6ed5253c 4161->4162 4164 6ed5187f 4161->4164 4163 6ed52555 GlobalFree 4162->4163 4162->4164 4163->4162 4164->4057 4164->4058 4166 6ed512f6 2 API calls 4165->4166 4167 6ed51593 4166->4167 4167->4060 4168->4077 4169->4099 4171 6ed515e2 4170->4171 4171->4099 4178 6ed512a5 GlobalAlloc 4172->4178 4174 6ed512c3 lstrcpynA 4174->4093 4175->4106 4176->4097 4177->4093 4178->4174 4180 6ed51344 4179->4180 4181 6ed512b4 2 API calls 4180->4181 4182 6ed5135f 4181->4182 4182->4115 4184 6ed526e4 VirtualAlloc 4183->4184 4185 6ed5273a 4183->4185 4184->4185 4185->4113 4187 6ed52a7f 4186->4187 4188 6ed52a84 GetLastError 4187->4188 4189 6ed52a8f 4187->4189 4188->4189 4189->4121 4190->4138 4192 6ed51389 4191->4192 4193 6ed5136a 4191->4193 4192->4138 4193->4192 4194 6ed51370 lstrcpyA 4193->4194 4194->4192 4195->4149 5072 402e4a 5073 402e72 5072->5073 5074 402e59 SetTimer 5072->5074 5075 402ec7 5073->5075 5076 402e8c MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5073->5076 5074->5073 5076->5075 5080 6ed51058 5082 6ed51074 5080->5082 5081 6ed510dc 5082->5081 5084 6ed51091 5082->5084 5093 6ed5154b 5082->5093 5085 6ed5154b GlobalFree 5084->5085 5086 6ed510a1 5085->5086 5087 6ed510b1 5086->5087 5088 6ed510a8 GlobalSize 5086->5088 5089 6ed510b5 GlobalAlloc 5087->5089 5090 6ed510c6 5087->5090 5088->5087 5091 6ed51572 3 API calls 5089->5091 5092 6ed510d1 GlobalFree 5090->5092 5091->5090 5092->5081 5094 6ed51551 5093->5094 5095 6ed51557 5094->5095 5096 6ed51563 GlobalFree 5094->5096 5095->5084 5096->5084 4203 40244e 4204 402480 4203->4204 4205 402455 4203->4205 4207 402c5e 21 API calls 4204->4207 4206 402c9e 21 API calls 4205->4206 4208 40245c 4206->4208 4209 402487 4207->4209 4210 402466 4208->4210 4214 402494 4208->4214 4215 402d1c 4209->4215 4212 402c5e 21 API calls 4210->4212 4213 40246d RegDeleteValueA RegCloseKey 4212->4213 4213->4214 4216 402d2f 4215->4216 4217 402d28 4215->4217 4216->4217 4219 402d60 4216->4219 4217->4214 4220 406113 RegOpenKeyExA 4219->4220 4221 402d8e 4220->4221 4222 402e43 4221->4222 4223 402d98 4221->4223 4222->4217 4224 402dc1 4223->4224 4225 402d9e RegEnumValueA 4223->4225 4226 402e28 RegCloseKey 4224->4226 4227 402dfd RegEnumKeyA 4224->4227 4228 402e06 RegCloseKey 4224->4228 4231 402d60 6 API calls 4224->4231 4225->4224 4225->4226 4226->4222 4227->4224 4227->4228 4229 4066b5 5 API calls 4228->4229 4230 402e16 4229->4230 4232 402e38 4230->4232 4233 402e1a RegDeleteKeyA 4230->4233 4231->4224 4232->4222 4233->4222 5097 4027cf 5098 402c5e 21 API calls 5097->5098 5099 4027d6 FindFirstFileA 5098->5099 5100 4027f9 5099->5100 5103 4027e9 5099->5103 5105 4061eb wsprintfA 5100->5105 5102 402800 5106 40628d lstrcpynA 5102->5106 5105->5102 5106->5103 5107 6ed518c7 5108 6ed518ea 5107->5108 5109 6ed5191a GlobalFree 5108->5109 5110 6ed5192c __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5108->5110 5109->5110 5111 6ed512f6 2 API calls 5110->5111 5112 6ed51aae GlobalFree GlobalFree 5111->5112 5113 401c53 5114 402c3c 21 API calls 5113->5114 5115 401c5a 5114->5115 5116 402c3c 21 API calls 5115->5116 5117 401c67 5116->5117 5118 401c7c 5117->5118 5120 402c5e 21 API calls 5117->5120 5119 401c8c 5118->5119 5121 402c5e 21 API calls 5118->5121 5122 401ce3 5119->5122 5123 401c97 5119->5123 5120->5118 5121->5119 5125 402c5e 21 API calls 5122->5125 5124 402c3c 21 API calls 5123->5124 5126 401c9c 5124->5126 5127 401ce8 5125->5127 5128 402c3c 21 API calls 5126->5128 5129 402c5e 21 API calls 5127->5129 5131 401ca8 5128->5131 5130 401cf1 FindWindowExA 5129->5130 5134 401d0f 5130->5134 5132 401cd3 SendMessageA 5131->5132 5133 401cb5 SendMessageTimeoutA 5131->5133 5132->5134 5133->5134 5135 402653 5136 402658 5135->5136 5137 40266c 5135->5137 5138 402c3c 21 API calls 5136->5138 5139 402c5e 21 API calls 5137->5139 5141 402661 5138->5141 5140 402673 lstrlenA 5139->5140 5140->5141 5142 405ec7 WriteFile 5141->5142 5143 402695 5141->5143 5142->5143 5144 403a54 5145 403a5f 5144->5145 5146 403a66 GlobalAlloc 5145->5146 5147 403a63 5145->5147 5146->5147 4376 4014d6 4381 402c3c 4376->4381 4378 4014dc Sleep 4380 402aea 4378->4380 4382 406320 21 API calls 4381->4382 4383 402c51 4382->4383 4383->4378 4384 401957 4385 401959 4384->4385 4386 402c5e 21 API calls 4385->4386 4387 40195e 4386->4387 4390 405a4f 4387->4390 4430 405d0d 4390->4430 4393 405a77 DeleteFileA 4395 401967 4393->4395 4394 405a8e 4398 405bc6 4394->4398 4444 40628d lstrcpynA 4394->4444 4397 405ab4 4399 405ac7 4397->4399 4400 405aba lstrcatA 4397->4400 4398->4395 4401 406620 2 API calls 4398->4401 4445 405c66 lstrlenA 4399->4445 4402 405acd 4400->4402 4404 405be0 4401->4404 4405 405adb lstrcatA 4402->4405 4406 405ae6 lstrlenA FindFirstFileA 4402->4406 4404->4395 4407 405be4 4404->4407 4405->4406 4408 405bbc 4406->4408 4428 405b0a 4406->4428 4458 405c1f lstrlenA CharPrevA 4407->4458 4408->4398 4410 405c4a CharNextA 4410->4428 4412 405a07 5 API calls 4413 405bf6 4412->4413 4414 405c10 4413->4414 4415 405bfa 4413->4415 4416 4053d1 28 API calls 4414->4416 4415->4395 4420 4053d1 28 API calls 4415->4420 4416->4395 4417 405b9b FindNextFileA 4419 405bb3 FindClose 4417->4419 4417->4428 4419->4408 4421 405c07 4420->4421 4422 406066 40 API calls 4421->4422 4424 405c0e 4422->4424 4424->4395 4425 405a4f 64 API calls 4425->4428 4426 4053d1 28 API calls 4426->4417 4427 4053d1 28 API calls 4427->4428 4428->4410 4428->4417 4428->4425 4428->4426 4428->4427 4429 406066 40 API calls 4428->4429 4449 40628d lstrcpynA 4428->4449 4450 405a07 4428->4450 4429->4428 4461 40628d lstrcpynA 4430->4461 4432 405d1e 4462 405cb8 CharNextA CharNextA 4432->4462 4435 405a6f 4435->4393 4435->4394 4436 406587 5 API calls 4442 405d34 4436->4442 4437 405d5f lstrlenA 4438 405d6a 4437->4438 4437->4442 4439 405c1f 3 API calls 4438->4439 4441 405d6f GetFileAttributesA 4439->4441 4440 406620 2 API calls 4440->4442 4441->4435 4442->4435 4442->4437 4442->4440 4443 405c66 2 API calls 4442->4443 4443->4437 4444->4397 4446 405c73 4445->4446 4447 405c84 4446->4447 4448 405c78 CharPrevA 4446->4448 4447->4402 4448->4446 4448->4447 4449->4428 4468 405dfb GetFileAttributesA 4450->4468 4453 405a34 4453->4428 4454 405a22 RemoveDirectoryA 4456 405a30 4454->4456 4455 405a2a DeleteFileA 4455->4456 4456->4453 4457 405a40 SetFileAttributesA 4456->4457 4457->4453 4459 405bea 4458->4459 4460 405c39 lstrcatA 4458->4460 4459->4412 4460->4459 4461->4432 4463 405ce3 4462->4463 4464 405cd3 4462->4464 4466 405c4a CharNextA 4463->4466 4467 405d03 4463->4467 4464->4463 4465 405cde CharNextA 4464->4465 4465->4467 4466->4463 4467->4435 4467->4436 4469 405a13 4468->4469 4470 405e0d SetFileAttributesA 4468->4470 4469->4453 4469->4454 4469->4455 4470->4469 4471 4033d8 SetErrorMode GetVersionExA 4472 40342a GetVersionExA 4471->4472 4474 403469 4471->4474 4473 403446 4472->4473 4472->4474 4473->4474 4475 4034ed 4474->4475 4476 4066b5 5 API calls 4474->4476 4477 406647 3 API calls 4475->4477 4476->4475 4478 403503 lstrlenA 4477->4478 4478->4475 4479 403513 4478->4479 4480 4066b5 5 API calls 4479->4480 4481 40351a 4480->4481 4482 4066b5 5 API calls 4481->4482 4483 403521 4482->4483 4484 4066b5 5 API calls 4483->4484 4485 40352d #17 OleInitialize SHGetFileInfoA 4484->4485 4560 40628d lstrcpynA 4485->4560 4488 40357b GetCommandLineA 4561 40628d lstrcpynA 4488->4561 4490 40358d 4491 405c4a CharNextA 4490->4491 4492 4035b4 CharNextA 4491->4492 4497 4035c3 4492->4497 4493 403689 4494 40369d GetTempPathA 4493->4494 4562 4033a7 4494->4562 4496 4036b5 4498 4036b9 GetWindowsDirectoryA lstrcatA 4496->4498 4499 40370f DeleteFileA 4496->4499 4497->4493 4500 405c4a CharNextA 4497->4500 4504 40368b 4497->4504 4501 4033a7 12 API calls 4498->4501 4572 402f31 GetTickCount GetModuleFileNameA 4499->4572 4500->4497 4503 4036d5 4501->4503 4503->4499 4507 4036d9 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4503->4507 4656 40628d lstrcpynA 4504->4656 4505 403722 4510 405c4a CharNextA 4505->4510 4543 4037a7 4505->4543 4552 4037b7 4505->4552 4509 4033a7 12 API calls 4507->4509 4512 403707 4509->4512 4520 40373c 4510->4520 4512->4499 4512->4552 4514 4037d1 4666 4059a3 4514->4666 4515 403928 4516 403930 GetCurrentProcess OpenProcessToken 4515->4516 4524 4039a6 ExitProcess 4515->4524 4518 403976 4516->4518 4519 403947 LookupPrivilegeValueA AdjustTokenPrivileges 4516->4519 4526 4066b5 5 API calls 4518->4526 4519->4518 4521 403781 4520->4521 4522 4037e6 4520->4522 4527 405d0d 18 API calls 4521->4527 4670 40590e 4522->4670 4529 40397d 4526->4529 4530 40378d 4527->4530 4532 403992 ExitWindowsEx 4529->4532 4534 40399f 4529->4534 4530->4552 4657 40628d lstrcpynA 4530->4657 4532->4524 4532->4534 4684 40140b 4534->4684 4536 403803 4539 40381b 4536->4539 4674 40628d lstrcpynA 4536->4674 4538 40379c 4658 40628d lstrcpynA 4538->4658 4542 403839 wsprintfA 4539->4542 4557 403867 4539->4557 4544 406320 21 API calls 4542->4544 4600 403a96 4543->4600 4544->4539 4547 403877 GetFileAttributesA 4550 403883 DeleteFileA 4547->4550 4547->4557 4548 4038af SetCurrentDirectoryA 4549 406066 40 API calls 4548->4549 4551 4038be CopyFileA 4549->4551 4550->4557 4551->4552 4551->4557 4659 4039bc 4552->4659 4553 405a4f 71 API calls 4553->4557 4554 406066 40 API calls 4554->4557 4555 406320 21 API calls 4555->4557 4557->4539 4557->4542 4557->4547 4557->4548 4557->4552 4557->4553 4557->4554 4557->4555 4558 403918 CloseHandle 4557->4558 4559 406620 2 API calls 4557->4559 4675 405897 CreateDirectoryA 4557->4675 4678 4058f1 CreateDirectoryA 4557->4678 4681 405926 CreateProcessA 4557->4681 4558->4552 4559->4557 4560->4488 4561->4490 4563 406587 5 API calls 4562->4563 4565 4033b3 4563->4565 4564 4033bd 4564->4496 4565->4564 4566 405c1f 3 API calls 4565->4566 4567 4033c5 4566->4567 4568 4058f1 2 API calls 4567->4568 4569 4033cb 4568->4569 4687 405e4f 4569->4687 4691 405e20 GetFileAttributesA CreateFileA 4572->4691 4574 402f71 4592 402f81 4574->4592 4692 40628d lstrcpynA 4574->4692 4576 402f97 4577 405c66 2 API calls 4576->4577 4578 402f9d 4577->4578 4693 40628d lstrcpynA 4578->4693 4580 402fa8 GetFileSize 4596 4030a2 4580->4596 4599 402fbf 4580->4599 4582 4030ab 4584 4030db GlobalAlloc 4582->4584 4582->4592 4729 403390 SetFilePointer 4582->4729 4705 403390 SetFilePointer 4584->4705 4586 40310e 4589 402ecd 6 API calls 4586->4589 4588 4030f6 4706 403168 4588->4706 4589->4592 4590 4030c4 4593 40337a ReadFile 4590->4593 4592->4505 4594 4030cf 4593->4594 4594->4584 4594->4592 4595 402ecd 6 API calls 4595->4599 4694 402ecd 4596->4694 4597 403102 4597->4592 4597->4597 4598 40313f SetFilePointer 4597->4598 4598->4592 4599->4586 4599->4592 4599->4595 4599->4596 4726 40337a 4599->4726 4601 4066b5 5 API calls 4600->4601 4602 403aaa 4601->4602 4603 403ab0 4602->4603 4604 403ac2 4602->4604 4743 4061eb wsprintfA 4603->4743 4605 406174 3 API calls 4604->4605 4606 403aed 4605->4606 4608 403b0b lstrcatA 4606->4608 4610 406174 3 API calls 4606->4610 4609 403ac0 4608->4609 4735 403d5b 4609->4735 4610->4608 4613 405d0d 18 API calls 4614 403b3d 4613->4614 4615 403bc6 4614->4615 4617 406174 3 API calls 4614->4617 4616 405d0d 18 API calls 4615->4616 4618 403bcc 4616->4618 4619 403b69 4617->4619 4620 403bdc LoadImageA 4618->4620 4621 406320 21 API calls 4618->4621 4619->4615 4624 403b85 lstrlenA 4619->4624 4628 405c4a CharNextA 4619->4628 4622 403c82 4620->4622 4623 403c03 RegisterClassA 4620->4623 4621->4620 4627 40140b 2 API calls 4622->4627 4625 403c8c 4623->4625 4626 403c39 SystemParametersInfoA CreateWindowExA 4623->4626 4629 403b93 lstrcmpiA 4624->4629 4630 403bb9 4624->4630 4625->4552 4626->4622 4631 403c88 4627->4631 4632 403b83 4628->4632 4629->4630 4633 403ba3 GetFileAttributesA 4629->4633 4634 405c1f 3 API calls 4630->4634 4631->4625 4636 403d5b 22 API calls 4631->4636 4632->4624 4635 403baf 4633->4635 4637 403bbf 4634->4637 4635->4630 4638 405c66 2 API calls 4635->4638 4639 403c99 4636->4639 4744 40628d lstrcpynA 4637->4744 4638->4630 4641 403ca5 ShowWindow 4639->4641 4642 403d28 4639->4642 4643 406647 3 API calls 4641->4643 4644 4054a3 5 API calls 4642->4644 4645 403cbd 4643->4645 4646 403d2e 4644->4646 4647 403ccb GetClassInfoA 4645->4647 4650 406647 3 API calls 4645->4650 4648 403d32 4646->4648 4649 403d4a 4646->4649 4652 403cf5 DialogBoxParamA 4647->4652 4653 403cdf GetClassInfoA RegisterClassA 4647->4653 4648->4625 4654 40140b 2 API calls 4648->4654 4651 40140b 2 API calls 4649->4651 4650->4647 4651->4625 4655 40140b 2 API calls 4652->4655 4653->4652 4654->4625 4655->4625 4656->4494 4657->4538 4658->4543 4660 4039d4 4659->4660 4661 4039c6 CloseHandle 4659->4661 4749 403a01 4660->4749 4661->4660 4664 405a4f 71 API calls 4665 4037bf OleUninitialize 4664->4665 4665->4514 4665->4515 4667 4059b8 4666->4667 4668 4037de ExitProcess 4667->4668 4669 4059cc MessageBoxIndirectA 4667->4669 4669->4668 4671 4066b5 5 API calls 4670->4671 4672 4037eb lstrlenA 4671->4672 4673 40628d lstrcpynA 4672->4673 4673->4536 4674->4539 4676 4058e3 4675->4676 4677 4058e7 GetLastError 4675->4677 4676->4557 4677->4676 4679 405901 4678->4679 4680 405905 GetLastError 4678->4680 4679->4557 4680->4679 4682 405965 4681->4682 4683 405959 CloseHandle 4681->4683 4682->4557 4683->4682 4685 401389 2 API calls 4684->4685 4686 401420 4685->4686 4686->4524 4688 405e5a GetTickCount GetTempFileNameA 4687->4688 4689 4033d6 4688->4689 4690 405e87 4688->4690 4689->4496 4690->4688 4690->4689 4691->4574 4692->4576 4693->4580 4695 402ed6 4694->4695 4696 402eee 4694->4696 4697 402ee6 4695->4697 4698 402edf DestroyWindow 4695->4698 4699 402ef6 4696->4699 4700 402efe GetTickCount 4696->4700 4697->4582 4698->4697 4730 4066f1 4699->4730 4702 402f0c CreateDialogParamA ShowWindow 4700->4702 4703 402f2f 4700->4703 4702->4703 4703->4582 4705->4588 4707 40317e 4706->4707 4708 4031ac 4707->4708 4734 403390 SetFilePointer 4707->4734 4710 40337a ReadFile 4708->4710 4711 4031b7 4710->4711 4712 403313 4711->4712 4713 4031c9 GetTickCount 4711->4713 4718 4032fd 4711->4718 4714 403355 4712->4714 4719 403317 4712->4719 4715 403218 4713->4715 4713->4718 4716 40337a ReadFile 4714->4716 4717 40337a ReadFile 4715->4717 4715->4718 4722 40326e GetTickCount 4715->4722 4723 403293 MulDiv wsprintfA 4715->4723 4725 405ec7 WriteFile 4715->4725 4716->4718 4717->4715 4718->4597 4719->4718 4720 40337a ReadFile 4719->4720 4721 405ec7 WriteFile 4719->4721 4720->4719 4721->4719 4722->4715 4724 4053d1 28 API calls 4723->4724 4724->4715 4725->4715 4727 405e98 ReadFile 4726->4727 4728 40338d 4727->4728 4728->4599 4729->4590 4731 40670e PeekMessageA 4730->4731 4732 406704 DispatchMessageA 4731->4732 4733 402efc 4731->4733 4732->4731 4733->4582 4734->4708 4736 403d6f 4735->4736 4745 4061eb wsprintfA 4736->4745 4738 403de0 4746 403e14 4738->4746 4740 403de5 4741 403b1b 4740->4741 4742 406320 21 API calls 4740->4742 4741->4613 4742->4740 4743->4609 4744->4615 4745->4738 4747 406320 21 API calls 4746->4747 4748 403e22 SetWindowTextA 4747->4748 4748->4740 4750 403a0f 4749->4750 4751 4039d9 4750->4751 4752 403a14 FreeLibrary GlobalFree 4750->4752 4751->4664 4752->4751 4752->4752 4753 402758 4754 40275f 4753->4754 4755 402a6c 4753->4755 4756 402c3c 21 API calls 4754->4756 4757 402766 4756->4757 4758 402775 SetFilePointer 4757->4758 4758->4755 4759 402785 4758->4759 4761 4061eb wsprintfA 4759->4761 4761->4755 5148 401e5a GetDC 5149 402c3c 21 API calls 5148->5149 5150 401e6c GetDeviceCaps MulDiv ReleaseDC 5149->5150 5151 402c3c 21 API calls 5150->5151 5152 401e9d 5151->5152 5153 406320 21 API calls 5152->5153 5154 401eda CreateFontIndirectA 5153->5154 5155 40264d 5154->5155 5156 6ed516c8 5157 6ed516f7 5156->5157 5158 6ed51b28 18 API calls 5157->5158 5159 6ed516fe 5158->5159 5160 6ed51705 5159->5160 5161 6ed51711 5159->5161 5162 6ed512f6 2 API calls 5160->5162 5163 6ed51738 5161->5163 5164 6ed5171b 5161->5164 5168 6ed5170f 5162->5168 5166 6ed51762 5163->5166 5167 6ed5173e 5163->5167 5165 6ed51572 3 API calls 5164->5165 5169 6ed51720 5165->5169 5171 6ed51572 3 API calls 5166->5171 5170 6ed515e9 3 API calls 5167->5170 5172 6ed515e9 3 API calls 5169->5172 5173 6ed51743 5170->5173 5171->5168 5174 6ed51726 5172->5174 5175 6ed512f6 2 API calls 5173->5175 5176 6ed512f6 2 API calls 5174->5176 5177 6ed51749 GlobalFree 5175->5177 5178 6ed5172c GlobalFree 5176->5178 5177->5168 5179 6ed5175d GlobalFree 5177->5179 5178->5168 5179->5168 4787 4015e0 4788 402c5e 21 API calls 4787->4788 4789 4015e7 4788->4789 4790 405cb8 4 API calls 4789->4790 4804 4015ef 4790->4804 4791 401649 4793 401677 4791->4793 4794 40164e 4791->4794 4792 405c4a CharNextA 4792->4804 4797 401423 28 API calls 4793->4797 4795 401423 28 API calls 4794->4795 4796 401655 4795->4796 4806 40628d lstrcpynA 4796->4806 4803 40166f 4797->4803 4798 4058f1 2 API calls 4798->4804 4800 40590e 5 API calls 4800->4804 4801 401660 SetCurrentDirectoryA 4801->4803 4802 401631 GetFileAttributesA 4802->4804 4804->4791 4804->4792 4804->4798 4804->4800 4804->4802 4805 405897 2 API calls 4804->4805 4805->4804 4806->4801 5180 4016e0 5181 402c5e 21 API calls 5180->5181 5182 4016e6 GetFullPathNameA 5181->5182 5183 4016fd 5182->5183 5189 40171e 5182->5189 5186 406620 2 API calls 5183->5186 5183->5189 5184 401732 GetShortPathNameA 5185 402aea 5184->5185 5187 40170e 5186->5187 5187->5189 5190 40628d lstrcpynA 5187->5190 5189->5184 5189->5185 5190->5189 5191 404463 lstrcpynA lstrlenA 5192 6ed52c73 5193 6ed52c8b 5192->5193 5194 6ed515c4 2 API calls 5193->5194 5195 6ed52ca6 5194->5195 4856 405969 ShellExecuteExA 4857 401eea 4858 402c3c 21 API calls 4857->4858 4859 401ef0 4858->4859 4860 402c3c 21 API calls 4859->4860 4861 401efc 4860->4861 4862 401f13 EnableWindow 4861->4862 4863 401f08 ShowWindow 4861->4863 4864 402aea 4862->4864 4863->4864 4865 40176b 4866 402c5e 21 API calls 4865->4866 4867 401772 4866->4867 4868 405e4f 2 API calls 4867->4868 4869 401779 4868->4869 4870 405e4f 2 API calls 4869->4870 4870->4869 5196 40196c 5197 402c5e 21 API calls 5196->5197 5198 401973 lstrlenA 5197->5198 5199 40264d 5198->5199 5200 401ff0 5201 402c5e 21 API calls 5200->5201 5202 401ff7 5201->5202 5203 406620 2 API calls 5202->5203 5204 401ffd 5203->5204 5205 40200f 5204->5205 5207 4061eb wsprintfA 5204->5207 5207->5205 5208 4014f4 SetForegroundWindow 5209 402aea 5208->5209 5210 6ed51661 5211 6ed5154b GlobalFree 5210->5211 5213 6ed51679 5211->5213 5212 6ed516bf GlobalFree 5213->5212 5214 6ed51694 5213->5214 5215 6ed516ab VirtualFree 5213->5215 5214->5212 5215->5212 5216 6ed510e0 5225 6ed51110 5216->5225 5217 6ed5129a GlobalFree 5218 6ed511cd GlobalAlloc 5218->5225 5219 6ed51295 5219->5217 5220 6ed51286 GlobalFree 5220->5225 5221 6ed5133d 2 API calls 5221->5225 5222 6ed512f6 2 API calls 5222->5225 5223 6ed51165 GlobalAlloc 5223->5225 5224 6ed51361 lstrcpyA 5224->5225 5225->5217 5225->5218 5225->5219 5225->5220 5225->5221 5225->5222 5225->5223 5225->5224 5226 404778 5227 404788 5226->5227 5228 4047ae 5226->5228 5229 40432d 22 API calls 5227->5229 5230 404394 8 API calls 5228->5230 5231 404795 SetDlgItemTextA 5229->5231 5232 4047ba 5230->5232 5231->5228 4982 40177e 4983 402c5e 21 API calls 4982->4983 4984 401785 4983->4984 4985 4017a3 4984->4985 4986 4017ab 4984->4986 5022 40628d lstrcpynA 4985->5022 5023 40628d lstrcpynA 4986->5023 4989 4017b6 4991 405c1f 3 API calls 4989->4991 4990 4017a9 4992 406587 5 API calls 4990->4992 4993 4017bc lstrcatA 4991->4993 5015 4017c8 4992->5015 4993->4990 4994 406620 2 API calls 4994->5015 4995 401809 4996 405dfb 2 API calls 4995->4996 4996->5015 4998 4017df CompareFileTime 4998->5015 4999 4018a3 5001 4053d1 28 API calls 4999->5001 5000 40187a 5004 4053d1 28 API calls 5000->5004 5010 40188f 5000->5010 5003 4018ad 5001->5003 5002 40628d lstrcpynA 5002->5015 5005 403168 35 API calls 5003->5005 5004->5010 5006 4018c0 5005->5006 5007 4018d4 SetFileTime 5006->5007 5009 4018e6 FindCloseChangeNotification 5006->5009 5007->5009 5008 406320 21 API calls 5008->5015 5009->5010 5011 4018f7 5009->5011 5012 4018fc 5011->5012 5013 40190f 5011->5013 5016 406320 21 API calls 5012->5016 5014 406320 21 API calls 5013->5014 5017 401917 5014->5017 5015->4994 5015->4995 5015->4998 5015->4999 5015->5000 5015->5002 5015->5008 5018 4059a3 MessageBoxIndirectA 5015->5018 5021 405e20 GetFileAttributesA CreateFileA 5015->5021 5019 401904 lstrcatA 5016->5019 5017->5010 5020 4059a3 MessageBoxIndirectA 5017->5020 5018->5015 5019->5017 5020->5010 5021->5015 5022->4990 5023->4989 5233 40167e 5234 402c5e 21 API calls 5233->5234 5235 401684 5234->5235 5236 406620 2 API calls 5235->5236 5237 40168a 5236->5237 5238 40197e 5239 402c3c 21 API calls 5238->5239 5240 401985 5239->5240 5241 402c3c 21 API calls 5240->5241 5242 401992 5241->5242 5243 402c5e 21 API calls 5242->5243 5244 4019a9 lstrlenA 5243->5244 5246 4019b9 5244->5246 5245 4019f9 5246->5245 5250 40628d lstrcpynA 5246->5250 5248 4019e9 5248->5245 5249 4019ee lstrlenA 5248->5249 5249->5245 5250->5248 5251 6ed522ea 5252 6ed52354 5251->5252 5253 6ed5235f GlobalAlloc 5252->5253 5254 6ed5237e 5252->5254 5253->5252 5255 401000 5256 401037 BeginPaint GetClientRect 5255->5256 5257 40100c DefWindowProcA 5255->5257 5259 4010f3 5256->5259 5260 401179 5257->5260 5261 401073 CreateBrushIndirect FillRect DeleteObject 5259->5261 5262 4010fc 5259->5262 5261->5259 5263 401102 CreateFontIndirectA 5262->5263 5264 401167 EndPaint 5262->5264 5263->5264 5265 401112 6 API calls 5263->5265 5264->5260 5265->5264 5266 401502 5267 401507 5266->5267 5268 40152d 5266->5268 5269 402c3c 21 API calls 5267->5269 5269->5268 5270 401a83 5271 402c3c 21 API calls 5270->5271 5272 401a8c 5271->5272 5273 402c3c 21 API calls 5272->5273 5274 401a33 5273->5274 5275 401588 5276 402a67 5275->5276 5279 4061eb wsprintfA 5276->5279 5278 402a6c 5279->5278 5280 401b88 5281 402c5e 21 API calls 5280->5281 5282 401b8f 5281->5282 5283 402c3c 21 API calls 5282->5283 5284 401b98 wsprintfA 5283->5284 5285 402aea 5284->5285 5286 401d8a 5287 401d90 5286->5287 5288 401d9d GetDlgItem 5286->5288 5289 402c3c 21 API calls 5287->5289 5290 401d97 5288->5290 5289->5290 5291 401dde GetClientRect LoadImageA SendMessageA 5290->5291 5292 402c5e 21 API calls 5290->5292 5294 401e3f 5291->5294 5296 401e4b 5291->5296 5292->5291 5295 401e44 DeleteObject 5294->5295 5294->5296 5295->5296 5297 40278b 5298 402791 5297->5298 5299 402799 FindClose 5298->5299 5300 402aea 5298->5300 5299->5300 4196 40240d 4197 402c5e 21 API calls 4196->4197 4198 40241e 4197->4198 4199 402c5e 21 API calls 4198->4199 4200 402427 4199->4200 4201 402c5e 21 API calls 4200->4201 4202 402431 GetPrivateProfileStringA 4201->4202 5301 40280d 5302 402c5e 21 API calls 5301->5302 5303 402819 5302->5303 5304 40282f 5303->5304 5305 402c5e 21 API calls 5303->5305 5306 405dfb 2 API calls 5304->5306 5305->5304 5307 402835 5306->5307 5329 405e20 GetFileAttributesA CreateFileA 5307->5329 5309 402842 5310 4028fe 5309->5310 5313 4028e6 5309->5313 5314 40285d GlobalAlloc 5309->5314 5311 402905 DeleteFileA 5310->5311 5312 402918 5310->5312 5311->5312 5316 403168 35 API calls 5313->5316 5314->5313 5315 402876 5314->5315 5330 403390 SetFilePointer 5315->5330 5318 4028f3 CloseHandle 5316->5318 5318->5310 5319 40287c 5320 40337a ReadFile 5319->5320 5321 402885 GlobalAlloc 5320->5321 5322 402895 5321->5322 5323 4028cf 5321->5323 5324 403168 35 API calls 5322->5324 5325 405ec7 WriteFile 5323->5325 5328 4028a2 5324->5328 5326 4028db GlobalFree 5325->5326 5326->5313 5327 4028c6 GlobalFree 5327->5323 5328->5327 5329->5309 5330->5319 4234 40550f 4235 405531 GetDlgItem GetDlgItem GetDlgItem 4234->4235 4236 4056ba 4234->4236 4280 404362 SendMessageA 4235->4280 4238 4056c2 GetDlgItem CreateThread FindCloseChangeNotification 4236->4238 4239 4056ea 4236->4239 4238->4239 4303 4054a3 OleInitialize 4238->4303 4241 405718 4239->4241 4242 405700 ShowWindow ShowWindow 4239->4242 4243 405739 4239->4243 4240 4055a1 4247 4055a8 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4240->4247 4244 405720 4241->4244 4245 405773 4241->4245 4285 404362 SendMessageA 4242->4285 4289 404394 4243->4289 4249 405728 4244->4249 4250 40574c ShowWindow 4244->4250 4245->4243 4256 405780 SendMessageA 4245->4256 4254 405616 4247->4254 4255 4055fa SendMessageA SendMessageA 4247->4255 4286 404306 4249->4286 4252 40576c 4250->4252 4253 40575e 4250->4253 4251 405745 4259 404306 SendMessageA 4252->4259 4258 4053d1 28 API calls 4253->4258 4260 405629 4254->4260 4261 40561b SendMessageA 4254->4261 4255->4254 4256->4251 4262 405799 CreatePopupMenu 4256->4262 4258->4252 4259->4245 4281 40432d 4260->4281 4261->4260 4263 406320 21 API calls 4262->4263 4265 4057a9 AppendMenuA 4263->4265 4267 4057c7 GetWindowRect 4265->4267 4268 4057da TrackPopupMenu 4265->4268 4266 405639 4269 405642 ShowWindow 4266->4269 4270 405676 GetDlgItem SendMessageA 4266->4270 4267->4268 4268->4251 4272 4057f6 4268->4272 4273 405665 4269->4273 4274 405658 ShowWindow 4269->4274 4270->4251 4271 40569d SendMessageA SendMessageA 4270->4271 4271->4251 4275 405815 SendMessageA 4272->4275 4284 404362 SendMessageA 4273->4284 4274->4273 4275->4275 4276 405832 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4275->4276 4278 405854 SendMessageA 4276->4278 4278->4278 4279 405876 GlobalUnlock SetClipboardData CloseClipboard 4278->4279 4279->4251 4280->4240 4282 406320 21 API calls 4281->4282 4283 404338 SetDlgItemTextA 4282->4283 4283->4266 4284->4270 4285->4241 4287 404313 SendMessageA 4286->4287 4288 40430d 4286->4288 4287->4243 4288->4287 4290 404457 4289->4290 4291 4043ac GetWindowLongA 4289->4291 4290->4251 4291->4290 4292 4043c1 4291->4292 4292->4290 4293 4043f1 4292->4293 4294 4043ee GetSysColor 4292->4294 4295 404401 SetBkMode 4293->4295 4296 4043f7 SetTextColor 4293->4296 4294->4293 4297 404419 GetSysColor 4295->4297 4298 40441f 4295->4298 4296->4295 4297->4298 4299 404430 4298->4299 4300 404426 SetBkColor 4298->4300 4299->4290 4301 404443 DeleteObject 4299->4301 4302 40444a CreateBrushIndirect 4299->4302 4300->4299 4301->4302 4302->4290 4310 404379 4303->4310 4305 4054c6 4309 4054ed 4305->4309 4313 401389 4305->4313 4306 404379 SendMessageA 4307 4054ff OleUninitialize 4306->4307 4309->4306 4311 404391 4310->4311 4312 404382 SendMessageA 4310->4312 4311->4305 4312->4311 4314 401390 4313->4314 4315 4013fe 4314->4315 4316 4013cb MulDiv SendMessageA 4314->4316 4315->4305 4316->4314 4317 40168f 4318 402c5e 21 API calls 4317->4318 4319 401696 4318->4319 4320 402c5e 21 API calls 4319->4320 4321 40169f 4320->4321 4322 402c5e 21 API calls 4321->4322 4323 4016a8 MoveFileA 4322->4323 4324 4016b4 4323->4324 4325 4016bb 4323->4325 4327 401423 28 API calls 4324->4327 4329 40230f 4325->4329 4331 406620 FindFirstFileA 4325->4331 4327->4329 4332 4016ca 4331->4332 4333 406636 FindClose 4331->4333 4332->4329 4334 406066 MoveFileExA 4332->4334 4333->4332 4335 406087 4334->4335 4336 40607a 4334->4336 4335->4324 4338 405ef6 4336->4338 4339 405f42 GetShortPathNameA 4338->4339 4340 405f1c 4338->4340 4342 406061 4339->4342 4343 405f57 4339->4343 4365 405e20 GetFileAttributesA CreateFileA 4340->4365 4342->4335 4343->4342 4345 405f5f wsprintfA 4343->4345 4344 405f26 CloseHandle GetShortPathNameA 4344->4342 4346 405f3a 4344->4346 4347 406320 21 API calls 4345->4347 4346->4339 4346->4342 4348 405f87 4347->4348 4366 405e20 GetFileAttributesA CreateFileA 4348->4366 4350 405f94 4350->4342 4351 405fa3 GetFileSize GlobalAlloc 4350->4351 4352 405fc5 4351->4352 4353 40605a CloseHandle 4351->4353 4367 405e98 ReadFile 4352->4367 4353->4342 4358 405fe4 lstrcpyA 4360 406006 4358->4360 4359 405ff8 4361 405d85 4 API calls 4359->4361 4362 40603d SetFilePointer 4360->4362 4361->4360 4374 405ec7 WriteFile 4362->4374 4365->4344 4366->4350 4368 405eb6 4367->4368 4368->4353 4369 405d85 lstrlenA 4368->4369 4370 405dc6 lstrlenA 4369->4370 4371 405dce 4370->4371 4372 405d9f lstrcmpiA 4370->4372 4371->4358 4371->4359 4372->4371 4373 405dbd CharNextA 4372->4373 4373->4370 4375 405ee5 GlobalFree 4374->4375 4375->4353 5331 401490 5332 4053d1 28 API calls 5331->5332 5333 401497 5332->5333 5334 404b10 5335 404b20 5334->5335 5336 404b3c 5334->5336 5345 405987 GetDlgItemTextA 5335->5345 5338 404b42 SHGetPathFromIDListA 5336->5338 5339 404b6f 5336->5339 5341 404b59 SendMessageA 5338->5341 5342 404b52 5338->5342 5340 404b2d SendMessageA 5340->5336 5341->5339 5344 40140b 2 API calls 5342->5344 5344->5341 5345->5340 5346 401a12 5347 402c5e 21 API calls 5346->5347 5348 401a19 5347->5348 5349 402c5e 21 API calls 5348->5349 5350 401a22 5349->5350 5351 401a29 lstrcmpiA 5350->5351 5352 401a3b lstrcmpA 5350->5352 5353 401a2f 5351->5353 5352->5353 5354 401594 5355 4015a4 ShowWindow 5354->5355 5356 4015ab 5354->5356 5355->5356 5357 4015b9 ShowWindow 5356->5357 5358 402aea 5356->5358 5357->5358 5359 6ed51000 5362 6ed5101b 5359->5362 5363 6ed5154b GlobalFree 5362->5363 5364 6ed51020 5363->5364 5365 6ed51024 5364->5365 5366 6ed51027 GlobalAlloc 5364->5366 5367 6ed51572 3 API calls 5365->5367 5366->5365 5368 6ed51019 5367->5368 4762 402318 4763 402c5e 21 API calls 4762->4763 4764 40231e 4763->4764 4765 402c5e 21 API calls 4764->4765 4766 402327 4765->4766 4767 402c5e 21 API calls 4766->4767 4768 402330 4767->4768 4769 406620 2 API calls 4768->4769 4770 402339 4769->4770 4771 40234a lstrlenA lstrlenA 4770->4771 4772 40233d 4770->4772 4774 4053d1 28 API calls 4771->4774 4773 4053d1 28 API calls 4772->4773 4776 402345 4772->4776 4773->4776 4775 402386 SHFileOperationA 4774->4775 4775->4772 4775->4776 5369 404498 5370 4044ae 5369->5370 5372 4045ba 5369->5372 5373 40432d 22 API calls 5370->5373 5371 404629 5374 4046f3 5371->5374 5375 404633 GetDlgItem 5371->5375 5372->5371 5372->5374 5379 4045fe GetDlgItem SendMessageA 5372->5379 5376 404504 5373->5376 5381 404394 8 API calls 5374->5381 5377 4046b1 5375->5377 5378 404649 5375->5378 5380 40432d 22 API calls 5376->5380 5377->5374 5386 4046c3 5377->5386 5378->5377 5385 40466f SendMessageA LoadCursorA SetCursor 5378->5385 5402 40434f KiUserCallbackDispatcher 5379->5402 5383 404511 CheckDlgButton 5380->5383 5384 4046ee 5381->5384 5400 40434f KiUserCallbackDispatcher 5383->5400 5406 40473c 5385->5406 5390 4046c9 SendMessageA 5386->5390 5391 4046da 5386->5391 5387 404624 5403 404718 5387->5403 5390->5391 5391->5384 5392 4046e0 SendMessageA 5391->5392 5392->5384 5394 40452f GetDlgItem 5401 404362 SendMessageA 5394->5401 5397 404545 SendMessageA 5398 404563 GetSysColor 5397->5398 5399 40456c SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5397->5399 5398->5399 5399->5384 5400->5394 5401->5397 5402->5387 5404 404726 5403->5404 5405 40472b SendMessageA 5403->5405 5404->5405 5405->5371 5409 405969 ShellExecuteExA 5406->5409 5408 4046a2 LoadCursorA SetCursor 5408->5377 5409->5408 5410 402198 5411 402c5e 21 API calls 5410->5411 5412 40219f 5411->5412 5413 402c5e 21 API calls 5412->5413 5414 4021a9 5413->5414 5415 402c5e 21 API calls 5414->5415 5416 4021b3 5415->5416 5417 402c5e 21 API calls 5416->5417 5418 4021c0 5417->5418 5419 402c5e 21 API calls 5418->5419 5420 4021ca 5419->5420 5421 40220c CoCreateInstance 5420->5421 5422 402c5e 21 API calls 5420->5422 5425 40222b 5421->5425 5427 4022d9 5421->5427 5422->5421 5423 401423 28 API calls 5424 40230f 5423->5424 5426 4022b9 MultiByteToWideChar 5425->5426 5425->5427 5426->5427 5427->5423 5427->5424 4777 40269a 4778 402c3c 21 API calls 4777->4778 4783 4026a4 4778->4783 4779 402712 4780 405e98 ReadFile 4780->4783 4781 402714 4786 4061eb wsprintfA 4781->4786 4782 402724 4782->4779 4785 40273a SetFilePointer 4782->4785 4783->4779 4783->4780 4783->4781 4783->4782 4785->4779 4786->4779 5428 40239a 5429 4023a1 5428->5429 5430 4023b4 5428->5430 5431 406320 21 API calls 5429->5431 5432 4023ae 5431->5432 5432->5430 5433 4059a3 MessageBoxIndirectA 5432->5433 5433->5430 5434 402a1b 5435 402a22 5434->5435 5436 402a6e 5434->5436 5439 402c3c 21 API calls 5435->5439 5442 402a6c 5435->5442 5437 4066b5 5 API calls 5436->5437 5438 402a75 5437->5438 5440 402c5e 21 API calls 5438->5440 5441 402a30 5439->5441 5443 402a7e 5440->5443 5444 402c3c 21 API calls 5441->5444 5443->5442 5452 4062e0 5443->5452 5446 402a3f 5444->5446 5451 4061eb wsprintfA 5446->5451 5448 402a8c 5448->5442 5456 4062ca 5448->5456 5451->5442 5453 4062eb 5452->5453 5454 40630e IIDFromString 5453->5454 5455 406307 5453->5455 5454->5448 5455->5448 5459 4062af WideCharToMultiByte 5456->5459 5458 402aad CoTaskMemFree 5458->5442 5459->5458 5460 40149d 5461 4023b4 5460->5461 5462 4014ab PostQuitMessage 5460->5462 5462->5461 5463 401f1e 5464 402c5e 21 API calls 5463->5464 5465 401f24 5464->5465 5466 402c5e 21 API calls 5465->5466 5467 401f2d 5466->5467 5468 402c5e 21 API calls 5467->5468 5469 401f36 5468->5469 5470 402c5e 21 API calls 5469->5470 5471 401f3f 5470->5471 5472 401423 28 API calls 5471->5472 5473 401f46 5472->5473 5480 405969 ShellExecuteExA 5473->5480 5475 401f81 5476 40672a 5 API calls 5475->5476 5478 4027ed 5475->5478 5477 401f9b CloseHandle 5476->5477 5477->5478 5480->5475 4807 401fa0 4808 402c5e 21 API calls 4807->4808 4809 401fa6 4808->4809 4810 4053d1 28 API calls 4809->4810 4811 401fb0 4810->4811 4812 405926 2 API calls 4811->4812 4813 401fb6 4812->4813 4814 401fd7 CloseHandle 4813->4814 4817 4027ed 4813->4817 4822 40672a WaitForSingleObject 4813->4822 4814->4817 4818 401fcb 4819 401fd0 4818->4819 4820 401fd9 4818->4820 4827 4061eb wsprintfA 4819->4827 4820->4814 4823 406744 4822->4823 4824 406756 GetExitCodeProcess 4823->4824 4825 4066f1 2 API calls 4823->4825 4824->4818 4826 40674b WaitForSingleObject 4825->4826 4826->4823 4827->4814 5481 402020 5482 402c5e 21 API calls 5481->5482 5483 402027 5482->5483 5484 4066b5 5 API calls 5483->5484 5485 402036 5484->5485 5486 4020be 5485->5486 5487 40204e GlobalAlloc 5485->5487 5487->5486 5488 402062 5487->5488 5489 4066b5 5 API calls 5488->5489 5490 402069 5489->5490 5491 4066b5 5 API calls 5490->5491 5492 402073 5491->5492 5492->5486 5496 4061eb wsprintfA 5492->5496 5494 4020ae 5497 4061eb wsprintfA 5494->5497 5496->5494 5497->5486 5498 401922 5499 401959 5498->5499 5500 402c5e 21 API calls 5499->5500 5501 40195e 5500->5501 5502 405a4f 71 API calls 5501->5502 5503 401967 5502->5503 4828 4024a3 4829 402c5e 21 API calls 4828->4829 4830 4024b5 4829->4830 4831 402c5e 21 API calls 4830->4831 4832 4024bf 4831->4832 4845 402cee 4832->4845 4835 402aea 4836 4024f4 4838 402500 4836->4838 4840 402c3c 21 API calls 4836->4840 4837 402c5e 21 API calls 4839 4024ed lstrlenA 4837->4839 4841 402522 RegSetValueExA 4838->4841 4843 403168 35 API calls 4838->4843 4839->4836 4840->4838 4842 402538 RegCloseKey 4841->4842 4842->4835 4843->4841 4846 402d09 4845->4846 4849 406141 4846->4849 4850 406150 4849->4850 4851 4024cf 4850->4851 4852 40615b RegCreateKeyExA 4850->4852 4851->4835 4851->4836 4851->4837 4852->4851 5504 401d23 5505 402c3c 21 API calls 5504->5505 5506 401d29 IsWindow 5505->5506 5507 401a33 5506->5507 4853 6ed529b1 4854 6ed52a01 4853->4854 4855 6ed529c1 VirtualProtect 4853->4855 4855->4854 5508 401925 5509 402c5e 21 API calls 5508->5509 5510 40192c 5509->5510 5511 4059a3 MessageBoxIndirectA 5510->5511 5512 401935 5511->5512 5513 4027a5 5514 4027ab 5513->5514 5515 4027af FindNextFileA 5514->5515 5518 4027c1 5514->5518 5516 402800 5515->5516 5515->5518 5519 40628d lstrcpynA 5516->5519 5519->5518 5520 6ed5103d 5521 6ed5101b 5 API calls 5520->5521 5522 6ed51056 5521->5522 4871 401bac 4872 401bb9 4871->4872 4873 401bfd 4871->4873 4876 401c41 4872->4876 4881 401bd0 4872->4881 4874 401c01 4873->4874 4875 401c26 GlobalAlloc 4873->4875 4884 4023b4 4874->4884 4890 40628d lstrcpynA 4874->4890 4877 406320 21 API calls 4875->4877 4878 406320 21 API calls 4876->4878 4876->4884 4877->4876 4879 4023ae 4878->4879 4879->4884 4885 4059a3 MessageBoxIndirectA 4879->4885 4891 40628d lstrcpynA 4881->4891 4882 401c13 GlobalFree 4882->4884 4885->4884 4886 401bdf 4892 40628d lstrcpynA 4886->4892 4888 401bee 4893 40628d lstrcpynA 4888->4893 4890->4882 4891->4886 4892->4888 4893->4884 5523 4029af 5524 402c3c 21 API calls 5523->5524 5525 4029b5 5524->5525 5526 4027ed 5525->5526 5527 406320 21 API calls 5525->5527 5527->5526 5528 402631 5529 402c5e 21 API calls 5528->5529 5530 402638 5529->5530 5533 405e20 GetFileAttributesA CreateFileA 5530->5533 5532 402644 5533->5532 5534 404d32 GetDlgItem GetDlgItem 5535 404d88 7 API calls 5534->5535 5546 404faf 5534->5546 5536 404e30 DeleteObject 5535->5536 5537 404e24 SendMessageA 5535->5537 5538 404e3b 5536->5538 5537->5536 5540 404e72 5538->5540 5541 406320 21 API calls 5538->5541 5539 405091 5543 40513d 5539->5543 5549 404fa2 5539->5549 5554 4050ea SendMessageA 5539->5554 5542 40432d 22 API calls 5540->5542 5547 404e54 SendMessageA SendMessageA 5541->5547 5548 404e86 5542->5548 5544 405147 SendMessageA 5543->5544 5545 40514f 5543->5545 5544->5545 5557 405161 ImageList_Destroy 5545->5557 5558 405168 5545->5558 5563 405178 5545->5563 5546->5539 5552 404c80 5 API calls 5546->5552 5570 40501e 5546->5570 5547->5538 5553 40432d 22 API calls 5548->5553 5551 404394 8 API calls 5549->5551 5550 405083 SendMessageA 5550->5539 5556 40533e 5551->5556 5552->5570 5566 404e97 5553->5566 5554->5549 5555 4050ff SendMessageA 5554->5555 5560 405112 5555->5560 5557->5558 5561 405171 GlobalFree 5558->5561 5558->5563 5559 4052f2 5559->5549 5564 405304 ShowWindow GetDlgItem ShowWindow 5559->5564 5572 405123 SendMessageA 5560->5572 5561->5563 5562 404f71 GetWindowLongA SetWindowLongA 5565 404f8a 5562->5565 5563->5559 5567 4051b3 5563->5567 5578 404d00 4 API calls 5563->5578 5564->5549 5568 404fa7 5565->5568 5569 404f8f ShowWindow 5565->5569 5566->5562 5571 404ee9 SendMessageA 5566->5571 5573 404f6c 5566->5573 5576 404f27 SendMessageA 5566->5576 5577 404f3b SendMessageA 5566->5577 5581 4051e1 SendMessageA 5567->5581 5585 4051f7 5567->5585 5587 404362 SendMessageA 5568->5587 5586 404362 SendMessageA 5569->5586 5570->5539 5570->5550 5571->5566 5572->5543 5573->5562 5573->5565 5576->5566 5577->5566 5578->5567 5579 4052bd 5580 4052c8 InvalidateRect 5579->5580 5582 4052d4 5579->5582 5580->5582 5581->5585 5582->5559 5588 404c3b 5582->5588 5584 40526b SendMessageA SendMessageA 5584->5585 5585->5579 5585->5584 5586->5549 5587->5546 5591 404b76 5588->5591 5590 404c50 5590->5559 5592 404b8c 5591->5592 5593 406320 21 API calls 5592->5593 5594 404bf0 5593->5594 5595 406320 21 API calls 5594->5595 5596 404bfb 5595->5596 5597 406320 21 API calls 5596->5597 5598 404c11 lstrlenA wsprintfA SetDlgItemTextA 5597->5598 5598->5590 4894 403e33 4895 403e4b 4894->4895 4896 403fac 4894->4896 4895->4896 4897 403e57 4895->4897 4898 403ffd 4896->4898 4899 403fbd GetDlgItem GetDlgItem 4896->4899 4902 403e62 SetWindowPos 4897->4902 4903 403e75 4897->4903 4901 404057 4898->4901 4911 401389 2 API calls 4898->4911 4900 40432d 22 API calls 4899->4900 4904 403fe7 SetClassLongA 4900->4904 4905 404379 SendMessageA 4901->4905 4912 403fa7 4901->4912 4902->4903 4906 403ec0 4903->4906 4907 403e7e ShowWindow 4903->4907 4908 40140b 2 API calls 4904->4908 4934 404069 4905->4934 4909 403ec8 DestroyWindow 4906->4909 4910 403edf 4906->4910 4913 403f99 4907->4913 4914 403e9e GetWindowLongA 4907->4914 4908->4898 4966 4042b6 4909->4966 4916 403ee4 SetWindowLongA 4910->4916 4917 403ef5 4910->4917 4918 40402f 4911->4918 4919 404394 8 API calls 4913->4919 4914->4913 4915 403eb7 ShowWindow 4914->4915 4915->4906 4916->4912 4917->4913 4921 403f01 GetDlgItem 4917->4921 4918->4901 4922 404033 SendMessageA 4918->4922 4919->4912 4920 4042b8 DestroyWindow EndDialog 4920->4966 4925 403f12 SendMessageA IsWindowEnabled 4921->4925 4926 403f2f 4921->4926 4922->4912 4923 40140b 2 API calls 4923->4934 4924 4042e7 ShowWindow 4924->4912 4925->4912 4925->4926 4928 403f3c 4926->4928 4931 403f83 SendMessageA 4926->4931 4932 403f4f 4926->4932 4939 403f34 4926->4939 4927 406320 21 API calls 4927->4934 4928->4931 4928->4939 4929 404306 SendMessageA 4933 403f6a 4929->4933 4930 40432d 22 API calls 4930->4934 4931->4913 4935 403f57 4932->4935 4936 403f6c 4932->4936 4933->4913 4934->4912 4934->4920 4934->4923 4934->4927 4934->4930 4941 40432d 22 API calls 4934->4941 4957 4041f8 DestroyWindow 4934->4957 4937 40140b 2 API calls 4935->4937 4938 40140b 2 API calls 4936->4938 4937->4939 4940 403f73 4938->4940 4939->4929 4940->4913 4940->4939 4942 4040e4 GetDlgItem 4941->4942 4943 404101 ShowWindow KiUserCallbackDispatcher 4942->4943 4944 4040f9 4942->4944 4967 40434f KiUserCallbackDispatcher 4943->4967 4944->4943 4946 40412b EnableWindow 4951 40413f 4946->4951 4947 404144 GetSystemMenu EnableMenuItem SendMessageA 4948 404174 SendMessageA 4947->4948 4947->4951 4948->4951 4950 403e14 22 API calls 4950->4951 4951->4947 4951->4950 4968 404362 SendMessageA 4951->4968 4969 40628d lstrcpynA 4951->4969 4953 4041a3 lstrlenA 4954 406320 21 API calls 4953->4954 4955 4041b4 SetWindowTextA 4954->4955 4956 401389 2 API calls 4955->4956 4956->4934 4958 404212 CreateDialogParamA 4957->4958 4957->4966 4959 404245 4958->4959 4958->4966 4960 40432d 22 API calls 4959->4960 4961 404250 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4960->4961 4962 401389 2 API calls 4961->4962 4963 404296 4962->4963 4963->4912 4964 40429e ShowWindow 4963->4964 4965 404379 SendMessageA 4964->4965 4965->4966 4966->4912 4966->4924 4967->4946 4968->4951 4969->4953 4970 4025b5 4971 402c9e 21 API calls 4970->4971 4972 4025bf 4971->4972 4973 402c3c 21 API calls 4972->4973 4974 4025c8 4973->4974 4975 4025d6 4974->4975 4980 4027ed 4974->4980 4976 4025e3 RegEnumKeyA 4975->4976 4977 4025ef RegEnumValueA 4975->4977 4978 40260b RegCloseKey 4976->4978 4977->4978 4979 402604 4977->4979 4978->4980 4979->4978 5599 4014b7 5600 4014bd 5599->5600 5601 401389 2 API calls 5600->5601 5602 4014c5 5601->5602 5603 4047bf 5604 4047eb 5603->5604 5605 4047fc 5603->5605 5664 405987 GetDlgItemTextA 5604->5664 5607 404808 GetDlgItem 5605->5607 5609 404867 5605->5609 5608 40481c 5607->5608 5613 404830 SetWindowTextA 5608->5613 5616 405cb8 4 API calls 5608->5616 5610 40494b 5609->5610 5618 406320 21 API calls 5609->5618 5662 404af5 5609->5662 5610->5662 5666 405987 GetDlgItemTextA 5610->5666 5611 4047f6 5612 406587 5 API calls 5611->5612 5612->5605 5617 40432d 22 API calls 5613->5617 5615 404394 8 API calls 5620 404b09 5615->5620 5621 404826 5616->5621 5622 40484c 5617->5622 5623 4048db SHBrowseForFolderA 5618->5623 5619 40497b 5624 405d0d 18 API calls 5619->5624 5621->5613 5627 405c1f 3 API calls 5621->5627 5625 40432d 22 API calls 5622->5625 5623->5610 5626 4048f3 CoTaskMemFree 5623->5626 5630 404981 5624->5630 5628 40485a 5625->5628 5629 405c1f 3 API calls 5626->5629 5627->5613 5665 404362 SendMessageA 5628->5665 5632 404900 5629->5632 5667 40628d lstrcpynA 5630->5667 5635 404937 SetDlgItemTextA 5632->5635 5639 406320 21 API calls 5632->5639 5634 404860 5637 4066b5 5 API calls 5634->5637 5635->5610 5636 404998 5638 4066b5 5 API calls 5636->5638 5637->5609 5645 40499f 5638->5645 5640 40491f lstrcmpiA 5639->5640 5640->5635 5642 404930 lstrcatA 5640->5642 5641 4049db 5668 40628d lstrcpynA 5641->5668 5642->5635 5644 4049e2 5646 405cb8 4 API calls 5644->5646 5645->5641 5650 405c66 2 API calls 5645->5650 5651 404a33 5645->5651 5647 4049e8 GetDiskFreeSpaceA 5646->5647 5649 404a0c MulDiv 5647->5649 5647->5651 5649->5651 5650->5645 5652 404aa4 5651->5652 5654 404c3b 24 API calls 5651->5654 5653 404ac7 5652->5653 5655 40140b 2 API calls 5652->5655 5669 40434f KiUserCallbackDispatcher 5653->5669 5656 404a91 5654->5656 5655->5653 5658 404aa6 SetDlgItemTextA 5656->5658 5659 404a96 5656->5659 5658->5652 5660 404b76 24 API calls 5659->5660 5660->5652 5661 404ae3 5661->5662 5663 404718 SendMessageA 5661->5663 5662->5615 5663->5662 5664->5611 5665->5634 5666->5619 5667->5636 5668->5644 5669->5661

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 4033d8-403428 SetErrorMode GetVersionExA 1 403469 0->1 2 40342a-403444 GetVersionExA 0->2 3 403470 1->3 2->3 4 403446-403465 2->4 5 403472-40347d 3->5 6 403494-40349b 3->6 4->1 7 403490 5->7 8 40347f-40348e 5->8 9 4034a5-4034e5 6->9 10 40349d 6->10 7->6 8->6 11 4034e7-4034ef call 4066b5 9->11 12 4034f8 9->12 10->9 11->12 17 4034f1 11->17 14 4034fd-403511 call 406647 lstrlenA 12->14 19 403513-40352f call 4066b5 * 3 14->19 17->12 26 403540-4035a0 #17 OleInitialize SHGetFileInfoA call 40628d GetCommandLineA call 40628d 19->26 27 403531-403537 19->27 34 4035a2-4035a6 26->34 35 4035ab-4035be call 405c4a CharNextA 26->35 27->26 31 403539 27->31 31->26 34->35 38 40367f-403683 35->38 39 4035c3-4035c6 38->39 40 403689 38->40 42 4035c8-4035cc 39->42 43 4035ce-4035d5 39->43 41 40369d-4036b7 GetTempPathA call 4033a7 40->41 52 4036b9-4036d7 GetWindowsDirectoryA lstrcatA call 4033a7 41->52 53 40370f-403727 DeleteFileA call 402f31 41->53 42->42 42->43 45 4035d7-4035d8 43->45 46 4035dc-4035df 43->46 45->46 47 403670-40367c call 405c4a 46->47 48 4035e5-4035e9 46->48 47->38 67 40367e 47->67 50 403601-40362e 48->50 51 4035eb-4035f1 48->51 57 403640-40366e 50->57 58 403630-403636 50->58 55 4035f3-4035f5 51->55 56 4035f7 51->56 52->53 69 4036d9-403709 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4033a7 52->69 70 4037ba-4037cb call 4039bc OleUninitialize 53->70 71 40372d-403733 53->71 55->50 55->56 56->50 57->47 65 40368b-403698 call 40628d 57->65 62 403638-40363a 58->62 63 40363c 58->63 62->57 62->63 63->57 65->41 67->38 69->53 69->70 82 4037d1-4037e0 call 4059a3 ExitProcess 70->82 83 403928-40392e 70->83 74 403735-403740 call 405c4a 71->74 75 4037ab-4037b2 call 403a96 71->75 86 403742-40376b 74->86 87 403776-40377f 74->87 80 4037b7 75->80 80->70 84 403930-403945 GetCurrentProcess OpenProcessToken 83->84 85 4039a6-4039ae 83->85 89 403976-403984 call 4066b5 84->89 90 403947-403970 LookupPrivilegeValueA AdjustTokenPrivileges 84->90 95 4039b0 85->95 96 4039b3-4039b6 ExitProcess 85->96 91 40376d-40376f 86->91 92 403781-40378f call 405d0d 87->92 93 4037e6-40380a call 40590e lstrlenA call 40628d 87->93 104 403992-40399d ExitWindowsEx 89->104 105 403986-403990 89->105 90->89 91->87 98 403771-403774 91->98 92->70 106 403791-4037a7 call 40628d * 2 92->106 114 40381b-403830 93->114 115 40380c-403816 call 40628d 93->115 95->96 98->87 98->91 104->85 108 40399f-4039a1 call 40140b 104->108 105->104 105->108 106->75 108->85 118 403835 114->118 115->114 119 403839-403865 wsprintfA call 406320 118->119 123 403867-40386c call 405897 119->123 124 40386e call 4058f1 119->124 128 403873-403875 123->128 124->128 129 403877-403881 GetFileAttributesA 128->129 130 4038af-4038ce SetCurrentDirectoryA call 406066 CopyFileA 128->130 132 4038a0-4038a8 129->132 133 403883-40388c DeleteFileA 129->133 130->70 137 4038d4-4038f5 call 406066 call 406320 call 405926 130->137 132->118 136 4038aa 132->136 133->132 135 40388e-40389e call 405a4f 133->135 135->119 135->132 136->70 146 4038f7-4038ff 137->146 147 403918-403923 CloseHandle 137->147 146->70 148 403905-40390d call 406620 146->148 147->70 148->119 151 403913 148->151 151->70
                                        APIs
                                        • SetErrorMode.KERNELBASE(00008001), ref: 004033FB
                                        • GetVersionExA.KERNEL32(?), ref: 00403424
                                        • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                        • #17.COMCTL32(?,00000008,0000000A,0000000C), ref: 00403541
                                        • OleInitialize.OLE32(00000000), ref: 00403548
                                        • SHGetFileInfoA.SHELL32(00429448,00000000,?,00000160,00000000,?,00000008,0000000A,0000000C), ref: 00403566
                                        • GetCommandLineA.KERNEL32(humpende Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040357B
                                        • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",00000020,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",00000000,?,00000008,0000000A,0000000C), ref: 004035B5
                                        • GetTempPathA.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00000020,?,00000008,0000000A,0000000C), ref: 004036AE
                                        • GetWindowsDirectoryA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C), ref: 004036BF
                                        • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 004036CB
                                        • GetTempPathA.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 004036DF
                                        • lstrcatA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 004036E7
                                        • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 004036F8
                                        • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\,?,00000008,0000000A,0000000C), ref: 00403700
                                        • DeleteFileA.KERNELBASE(1033,?,00000008,0000000A,0000000C), ref: 00403714
                                        • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C), ref: 004037BF
                                        • ExitProcess.KERNEL32 ref: 004037E0
                                        • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",00000000,?,?,00000008,0000000A,0000000C), ref: 004037EF
                                        • wsprintfA.USER32 ref: 00403846
                                        • GetFileAttributesA.KERNEL32(00431400,C:\Users\user~1\AppData\Local\Temp\,00431400,?,0000000C), ref: 00403878
                                        • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                        • SetCurrentDirectoryA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,00431400,?,0000000C), ref: 004038B0
                                        • CopyFileA.KERNEL32(C:\Users\user\Desktop\Order 00293884800595.bat.exe,00431400,00000001), ref: 004038C6
                                        • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                        • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C), ref: 00403936
                                        • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                        • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                        • ExitProcess.KERNEL32 ref: 004039B6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                        • String ID: "$"C:\Users\user\Desktop\Order 00293884800595.bat.exe"$1033$A$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne$C:\Users\user\Desktop$C:\Users\user\Desktop\Order 00293884800595.bat.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$humpende Setup$~nsu%X.tmp
                                        • API String ID: 2956269667-1635272484
                                        • Opcode ID: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                        • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                        • Opcode Fuzzy Hash: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                        • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 152 40550f-40552b 153 405531-4055f8 GetDlgItem * 3 call 404362 call 404c53 GetClientRect GetSystemMetrics SendMessageA * 2 152->153 154 4056ba-4056c0 152->154 175 405616-405619 153->175 176 4055fa-405614 SendMessageA * 2 153->176 156 4056c2-4056e4 GetDlgItem CreateThread FindCloseChangeNotification 154->156 157 4056ea-4056f6 154->157 156->157 159 405718-40571e 157->159 160 4056f8-4056fe 157->160 164 405720-405726 159->164 165 405773-405776 159->165 162 405700-405713 ShowWindow * 2 call 404362 160->162 163 405739-405740 call 404394 160->163 162->159 172 405745-405749 163->172 170 405728-405734 call 404306 164->170 171 40574c-40575c ShowWindow 164->171 165->163 168 405778-40577e 165->168 168->163 177 405780-405793 SendMessageA 168->177 170->163 173 40576c-40576e call 404306 171->173 174 40575e-405767 call 4053d1 171->174 173->165 174->173 181 405629-405640 call 40432d 175->181 182 40561b-405627 SendMessageA 175->182 176->175 183 405890-405892 177->183 184 405799-4057c5 CreatePopupMenu call 406320 AppendMenuA 177->184 191 405642-405656 ShowWindow 181->191 192 405676-405697 GetDlgItem SendMessageA 181->192 182->181 183->172 189 4057c7-4057d7 GetWindowRect 184->189 190 4057da-4057f0 TrackPopupMenu 184->190 189->190 190->183 194 4057f6-405810 190->194 195 405665 191->195 196 405658-405663 ShowWindow 191->196 192->183 193 40569d-4056b5 SendMessageA * 2 192->193 193->183 197 405815-405830 SendMessageA 194->197 198 40566b-405671 call 404362 195->198 196->198 197->197 199 405832-405852 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 197->199 198->192 201 405854-405874 SendMessageA 199->201 201->201 202 405876-40588a GlobalUnlock SetClipboardData CloseClipboard 201->202 202->183
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                        • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                        • GetClientRect.USER32(?,?), ref: 004055BA
                                        • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                        • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                        • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                        • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                        • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                        • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                        • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                        • ShowWindow.USER32(?,00000008), ref: 0040565D
                                        • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                        • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                        • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                        • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                        • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                          • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                        • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                        • CreateThread.KERNELBASE(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                        • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004056E4
                                        • ShowWindow.USER32(00000000), ref: 00405707
                                        • ShowWindow.USER32(?,00000008), ref: 0040570E
                                        • ShowWindow.USER32(00000008), ref: 00405754
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                        • CreatePopupMenu.USER32 ref: 00405799
                                        • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004057AE
                                        • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004057E7
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                        • OpenClipboard.USER32(00000000), ref: 00405833
                                        • EmptyClipboard.USER32 ref: 00405839
                                        • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                        • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                        • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                        • SetClipboardData.USER32(00000001,00000000), ref: 00405884
                                        • CloseClipboard.USER32 ref: 0040588A
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                        • String ID:
                                        • API String ID: 4154960007-0
                                        • Opcode ID: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                        • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                        • Opcode Fuzzy Hash: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                        • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 516 405a4f-405a75 call 405d0d 519 405a77-405a89 DeleteFileA 516->519 520 405a8e-405a95 516->520 521 405c18-405c1c 519->521 522 405a97-405a99 520->522 523 405aa8-405ab8 call 40628d 520->523 524 405bc6-405bcb 522->524 525 405a9f-405aa2 522->525 531 405ac7-405ac8 call 405c66 523->531 532 405aba-405ac5 lstrcatA 523->532 524->521 527 405bcd-405bd0 524->527 525->523 525->524 529 405bd2-405bd8 527->529 530 405bda-405be2 call 406620 527->530 529->521 530->521 540 405be4-405bf8 call 405c1f call 405a07 530->540 534 405acd-405ad0 531->534 532->534 537 405ad2-405ad9 534->537 538 405adb-405ae1 lstrcatA 534->538 537->538 539 405ae6-405b04 lstrlenA FindFirstFileA 537->539 538->539 541 405b0a-405b21 call 405c4a 539->541 542 405bbc-405bc0 539->542 555 405c10-405c13 call 4053d1 540->555 556 405bfa-405bfd 540->556 549 405b23-405b27 541->549 550 405b2c-405b2f 541->550 542->524 544 405bc2 542->544 544->524 549->550 552 405b29 549->552 553 405b31-405b36 550->553 554 405b42-405b50 call 40628d 550->554 552->550 558 405b38-405b3a 553->558 559 405b9b-405bad FindNextFileA 553->559 566 405b52-405b5a 554->566 567 405b67-405b72 call 405a07 554->567 555->521 556->529 561 405bff-405c0e call 4053d1 call 406066 556->561 558->554 562 405b3c-405b40 558->562 559->541 564 405bb3-405bb6 FindClose 559->564 561->521 562->554 562->559 564->542 566->559 571 405b5c-405b65 call 405a4f 566->571 576 405b93-405b96 call 4053d1 567->576 577 405b74-405b77 567->577 571->559 576->559 578 405b79-405b89 call 4053d1 call 406066 577->578 579 405b8b-405b91 577->579 578->559 579->559
                                        APIs
                                        • DeleteFileA.KERNELBASE(?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405A78
                                        • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405AC0
                                        • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405AE1
                                        • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405AE7
                                        • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405AF8
                                        • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                        • FindClose.KERNEL32(00000000), ref: 00405BB6
                                        Strings
                                        • "C:\Users\user\Desktop\Order 00293884800595.bat.exe", xrefs: 00405A58
                                        • \*.*, xrefs: 00405ABA
                                        • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405A5C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: "C:\Users\user\Desktop\Order 00293884800595.bat.exe"$C:\Users\user~1\AppData\Local\Temp\$\*.*
                                        • API String ID: 2035342205-1624504076
                                        • Opcode ID: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                        • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                        • Opcode Fuzzy Hash: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                        • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE
                                        APIs
                                        • FindFirstFileA.KERNELBASE(771B3410,0042BCD8,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00405D50,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,00405A6F,?,771B3410,C:\Users\user~1\AppData\Local\Temp\), ref: 0040662B
                                        • FindClose.KERNEL32(00000000), ref: 00406637
                                        Strings
                                        • C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp, xrefs: 00406620
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp
                                        • API String ID: 2295610775-79576773
                                        • Opcode ID: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                        • Instruction ID: 21071efbed15a2f64541de492f8ee2fd881da0b051754d52d90be6cd238fbd17
                                        • Opcode Fuzzy Hash: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                        • Instruction Fuzzy Hash: 08D012355490205BC64017396F0C85BBA599F163717118E37F8A6F12E0CB758C7296DC

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 203 403e33-403e45 204 403e4b-403e51 203->204 205 403fac-403fbb 203->205 204->205 206 403e57-403e60 204->206 207 40400a-40401f 205->207 208 403fbd-404005 GetDlgItem * 2 call 40432d SetClassLongA call 40140b 205->208 212 403e62-403e6f SetWindowPos 206->212 213 403e75-403e7c 206->213 210 404021-404024 207->210 211 40405f-404064 call 404379 207->211 208->207 215 404026-404031 call 401389 210->215 216 404057-404059 210->216 225 404069-404084 211->225 212->213 218 403ec0-403ec6 213->218 219 403e7e-403e98 ShowWindow 213->219 215->216 242 404033-404052 SendMessageA 215->242 216->211 224 4042fa 216->224 221 403ec8-403eda DestroyWindow 218->221 222 403edf-403ee2 218->222 226 403f99-403fa7 call 404394 219->226 227 403e9e-403eb1 GetWindowLongA 219->227 230 4042d7-4042dd 221->230 232 403ee4-403ef0 SetWindowLongA 222->232 233 403ef5-403efb 222->233 231 4042fc-404303 224->231 236 404086-404088 call 40140b 225->236 237 40408d-404093 225->237 226->231 227->226 228 403eb7-403eba ShowWindow 227->228 228->218 230->224 238 4042df-4042e5 230->238 232->231 233->226 241 403f01-403f10 GetDlgItem 233->241 236->237 239 4042b8-4042d1 DestroyWindow EndDialog 237->239 240 404099-4040a4 237->240 238->224 245 4042e7-4042f0 ShowWindow 238->245 239->230 240->239 246 4040aa-4040f7 call 406320 call 40432d * 3 GetDlgItem 240->246 247 403f12-403f29 SendMessageA IsWindowEnabled 241->247 248 403f2f-403f32 241->248 242->231 245->224 275 404101-40413d ShowWindow KiUserCallbackDispatcher call 40434f EnableWindow 246->275 276 4040f9-4040fe 246->276 247->224 247->248 250 403f34-403f35 248->250 251 403f37-403f3a 248->251 253 403f65-403f6a call 404306 250->253 254 403f48-403f4d 251->254 255 403f3c-403f42 251->255 253->226 258 403f83-403f93 SendMessageA 254->258 260 403f4f-403f55 254->260 255->258 259 403f44-403f46 255->259 258->226 259->253 263 403f57-403f5d call 40140b 260->263 264 403f6c-403f75 call 40140b 260->264 271 403f63 263->271 264->226 273 403f77-403f81 264->273 271->253 273->271 279 404142 275->279 280 40413f-404140 275->280 276->275 281 404144-404172 GetSystemMenu EnableMenuItem SendMessageA 279->281 280->281 282 404174-404185 SendMessageA 281->282 283 404187 281->283 284 40418d-4041c7 call 404362 call 403e14 call 40628d lstrlenA call 406320 SetWindowTextA call 401389 282->284 283->284 284->225 295 4041cd-4041cf 284->295 295->225 296 4041d5-4041d9 295->296 297 4041f8-40420c DestroyWindow 296->297 298 4041db-4041e1 296->298 297->230 300 404212-40423f CreateDialogParamA 297->300 298->224 299 4041e7-4041ed 298->299 299->225 301 4041f3 299->301 300->230 302 404245-40429c call 40432d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 300->302 301->224 302->224 307 40429e-4042b1 ShowWindow call 404379 302->307 309 4042b6 307->309 309->230
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                        • ShowWindow.USER32(?), ref: 00403E8F
                                        • GetWindowLongA.USER32(?,000000F0), ref: 00403EA1
                                        • ShowWindow.USER32(?,00000004), ref: 00403EBA
                                        • DestroyWindow.USER32 ref: 00403ECE
                                        • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                        • GetDlgItem.USER32(?,?), ref: 00403F06
                                        • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                        • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                        • GetDlgItem.USER32(?,00000001), ref: 00403FCC
                                        • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                        • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                        • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00404041
                                        • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                        • ShowWindow.USER32(00000000,?), ref: 00404108
                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040411A
                                        • EnableWindow.USER32(?,?), ref: 00404135
                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040414B
                                        • EnableMenuItem.USER32(00000000), ref: 00404152
                                        • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 0040416A
                                        • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                        • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                        • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                        • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                        • String ID:
                                        • API String ID: 121052019-0
                                        • Opcode ID: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                        • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                        • Opcode Fuzzy Hash: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                        • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 310 403a96-403aae call 4066b5 313 403ab0-403ac0 call 4061eb 310->313 314 403ac2-403af3 call 406174 310->314 323 403b16-403b3f call 403d5b call 405d0d 313->323 319 403af5-403b06 call 406174 314->319 320 403b0b-403b11 lstrcatA 314->320 319->320 320->323 328 403b45-403b4a 323->328 329 403bc6-403bce call 405d0d 323->329 328->329 331 403b4c-403b70 call 406174 328->331 335 403bd0-403bd7 call 406320 329->335 336 403bdc-403c01 LoadImageA 329->336 331->329 337 403b72-403b74 331->337 335->336 339 403c82-403c8a call 40140b 336->339 340 403c03-403c33 RegisterClassA 336->340 341 403b85-403b91 lstrlenA 337->341 342 403b76-403b83 call 405c4a 337->342 353 403c94-403c9f call 403d5b 339->353 354 403c8c-403c8f 339->354 343 403d51 340->343 344 403c39-403c7d SystemParametersInfoA CreateWindowExA 340->344 348 403b93-403ba1 lstrcmpiA 341->348 349 403bb9-403bc1 call 405c1f call 40628d 341->349 342->341 347 403d53-403d5a 343->347 344->339 348->349 352 403ba3-403bad GetFileAttributesA 348->352 349->329 356 403bb3-403bb4 call 405c66 352->356 357 403baf-403bb1 352->357 363 403ca5-403cbf ShowWindow call 406647 353->363 364 403d28-403d29 call 4054a3 353->364 354->347 356->349 357->349 357->356 369 403cc1-403cc6 call 406647 363->369 370 403ccb-403cdd GetClassInfoA 363->370 368 403d2e-403d30 364->368 371 403d32-403d38 368->371 372 403d4a-403d4c call 40140b 368->372 369->370 375 403cf5-403d18 DialogBoxParamA call 40140b 370->375 376 403cdf-403cef GetClassInfoA RegisterClassA 370->376 371->354 377 403d3e-403d45 call 40140b 371->377 372->343 381 403d1d-403d26 call 4039e6 375->381 376->375 377->354 381->347
                                        APIs
                                          • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                          • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                        • lstrcatA.KERNEL32(1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,771B3410,C:\Users\user~1\AppData\Local\Temp\,?,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",0000000A,0000000C), ref: 00403B11
                                        • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,771B3410), ref: 00403B86
                                        • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                        • GetFileAttributesA.KERNEL32(Call,?,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",0000000A,0000000C), ref: 00403BA4
                                        • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes), ref: 00403BED
                                          • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                        • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                        • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403C42
                                        • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                        • ShowWindow.USER32(00000005,00000000,?,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",0000000A,0000000C), ref: 00403CAD
                                        • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                        • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                        • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                        • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: "C:\Users\user\Desktop\Order 00293884800595.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                        • API String ID: 1975747703-1890796673
                                        • Opcode ID: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                        • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                        • Opcode Fuzzy Hash: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                        • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 384 402f31-402f7f GetTickCount GetModuleFileNameA call 405e20 387 402f81-402f86 384->387 388 402f8b-402fb9 call 40628d call 405c66 call 40628d GetFileSize 384->388 389 403161-403165 387->389 396 4030a4-4030b2 call 402ecd 388->396 397 402fbf 388->397 403 4030b4-4030b7 396->403 404 403107-40310c 396->404 399 402fc4-402fdb 397->399 401 402fdd 399->401 402 402fdf-402fe8 call 40337a 399->402 401->402 410 40310e-403116 call 402ecd 402->410 411 402fee-402ff5 402->411 406 4030b9-4030d1 call 403390 call 40337a 403->406 407 4030db-403105 GlobalAlloc call 403390 call 403168 403->407 404->389 406->404 434 4030d3-4030d9 406->434 407->404 432 403118-403129 407->432 410->404 416 403071-403075 411->416 417 402ff7-40300b call 405ddb 411->417 421 403077-40307e call 402ecd 416->421 422 40307f-403085 416->422 417->422 431 40300d-403014 417->431 421->422 428 403094-40309c 422->428 429 403087-403091 call 40676c 422->429 428->399 433 4030a2 428->433 429->428 431->422 437 403016-40301d 431->437 438 403131-403136 432->438 439 40312b 432->439 433->396 434->404 434->407 437->422 440 40301f-403026 437->440 441 403137-40313d 438->441 439->438 440->422 442 403028-40302f 440->442 441->441 443 40313f-40315a SetFilePointer call 405ddb 441->443 442->422 444 403031-403051 442->444 447 40315f 443->447 444->404 446 403057-40305b 444->446 448 403063-40306b 446->448 449 40305d-403061 446->449 447->389 448->422 450 40306d-40306f 448->450 449->433 449->448 450->422
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00402F42
                                        • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Order 00293884800595.bat.exe,00000400,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F5E
                                          • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                          • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                        • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Order 00293884800595.bat.exe,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008), ref: 00402FAA
                                        • GlobalAlloc.KERNELBASE(00000040,00000008,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 004030E0
                                        Strings
                                        • soft, xrefs: 0040301F
                                        • Null, xrefs: 00403028
                                        • C:\Users\user\Desktop, xrefs: 00402F8C, 00402F91, 00402F97
                                        • 8TA, xrefs: 00402FBF
                                        • "C:\Users\user\Desktop\Order 00293884800595.bat.exe", xrefs: 00402F37
                                        • Error launching installer, xrefs: 00402F81
                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403107
                                        • Inst, xrefs: 00403016
                                        • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00402F38
                                        • C:\Users\user\Desktop\Order 00293884800595.bat.exe, xrefs: 00402F48, 00402F57, 00402F6B, 00402F8B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                        • String ID: "C:\Users\user\Desktop\Order 00293884800595.bat.exe"$8TA$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Order 00293884800595.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                        • API String ID: 2803837635-4176357633
                                        • Opcode ID: f49f85fbe7888e3b10c39431673b010741fca75b5d582ad2466d93653721041e
                                        • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                        • Opcode Fuzzy Hash: f49f85fbe7888e3b10c39431673b010741fca75b5d582ad2466d93653721041e
                                        • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 451 406320-40632b 452 40632d-40633c 451->452 453 40633e-406353 451->453 452->453 454 406564-406568 453->454 455 406359-406364 453->455 456 406376-406380 454->456 457 40656e-406578 454->457 455->454 458 40636a-406371 455->458 456->457 459 406386-40638d 456->459 460 406583-406584 457->460 461 40657a-40657e call 40628d 457->461 458->454 462 406393-4063c9 459->462 463 406557 459->463 461->460 465 406501-406504 462->465 466 4063cf-4063d9 462->466 467 406561-406563 463->467 468 406559-40655f 463->468 471 406534-406537 465->471 472 406506-406509 465->472 469 4063f6 466->469 470 4063db-4063e4 466->470 467->454 468->454 476 4063fd-406405 469->476 470->469 475 4063e6-4063e9 470->475 473 406545-406555 lstrlenA 471->473 474 406539-406540 call 406320 471->474 477 406519-406525 call 40628d 472->477 478 40650b-406517 call 4061eb 472->478 473->454 474->473 475->469 480 4063eb-4063ee 475->480 481 406407 476->481 482 40640e-406410 476->482 489 40652a-406530 477->489 478->489 480->469 485 4063f0-4063f4 480->485 481->482 486 406412-40642d call 406174 482->486 487 406447-40644a 482->487 485->476 498 406432-406435 486->498 491 40644c-406458 GetSystemDirectoryA 487->491 492 40645d-406460 487->492 489->473 490 406532 489->490 494 4064f9-4064ff call 406587 490->494 495 4064e3-4064e6 491->495 496 406471-406474 492->496 497 406462-40646e GetWindowsDirectoryA 492->497 494->473 495->494 499 4064e8-4064ec 495->499 496->495 501 406476-406494 496->501 497->496 498->499 502 40643b-406442 call 406320 498->502 499->494 503 4064ee-4064f4 lstrcatA 499->503 505 406496-406499 501->505 506 4064ab-4064c3 call 4066b5 501->506 502->495 503->494 505->506 509 40649b-40649f 505->509 514 4064c5-4064d8 SHGetPathFromIDListA CoTaskMemFree 506->514 515 4064da-4064e1 506->515 512 4064a7-4064a9 509->512 512->495 512->506 514->495 514->515 515->495 515->501
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406452
                                        • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00000000), ref: 00406468
                                        • SHGetPathFromIDListA.SHELL32(00000000,Call,?,T@,00000007,?,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000), ref: 004064C7
                                        • CoTaskMemFree.OLE32(00000000,?,T@,00000007,?,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000), ref: 004064D0
                                        • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000), ref: 004064F4
                                        • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00000000,00424440,771B23A0), ref: 00406546
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                        • String ID: T@$Call$Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                        • API String ID: 4024019347-32556617
                                        • Opcode ID: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                        • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                        • Opcode Fuzzy Hash: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                        • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 585 40177e-4017a1 call 402c5e call 405c8c 590 4017a3-4017a9 call 40628d 585->590 591 4017ab-4017bd call 40628d call 405c1f lstrcatA 585->591 596 4017c2-4017c8 call 406587 590->596 591->596 601 4017cd-4017d1 596->601 602 4017d3-4017dd call 406620 601->602 603 401804-401807 601->603 610 4017ef-401801 602->610 611 4017df-4017ed CompareFileTime 602->611 605 401809-40180a call 405dfb 603->605 606 40180f-40182b call 405e20 603->606 605->606 613 4018a3-4018cc call 4053d1 call 403168 606->613 614 40182d-401830 606->614 610->603 611->610 628 4018d4-4018e0 SetFileTime 613->628 629 4018ce-4018d2 613->629 615 401832-401874 call 40628d * 2 call 406320 call 40628d call 4059a3 614->615 616 401885-40188f call 4053d1 614->616 615->601 650 40187a-40187b 615->650 626 401898-40189e 616->626 630 402af3 626->630 632 4018e6-4018f1 FindCloseChangeNotification 628->632 629->628 629->632 634 402af5-402af9 630->634 635 4018f7-4018fa 632->635 636 402aea-402aed 632->636 638 4018fc-40190d call 406320 lstrcatA 635->638 639 40190f-401912 call 406320 635->639 636->630 643 401917-4023af 638->643 639->643 648 4023b4-4023b9 643->648 649 4023af call 4059a3 643->649 648->634 649->648 650->626 651 40187d-40187e 650->651 651->616
                                        APIs
                                        • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne,00000000,00000000,00000031), ref: 004017BD
                                        • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne,00000000,00000000,00000031), ref: 004017E7
                                          • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,humpende Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                          • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0), ref: 0040542D
                                          • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll), ref: 0040543F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                        • String ID: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp$C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne$Call
                                        • API String ID: 1941528284-2935475996
                                        • Opcode ID: 625538039a129191562edbeeeefb1e0ae03e74452835c0c2dc64025a2d1f3986
                                        • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                        • Opcode Fuzzy Hash: 625538039a129191562edbeeeefb1e0ae03e74452835c0c2dc64025a2d1f3986
                                        • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 652 4053d1-4053e6 653 40549c-4054a0 652->653 654 4053ec-4053fe 652->654 655 405400-405404 call 406320 654->655 656 405409-405415 lstrlenA 654->656 655->656 658 405432-405436 656->658 659 405417-405427 lstrlenA 656->659 660 405445-405449 658->660 661 405438-40543f SetWindowTextA 658->661 659->653 662 405429-40542d lstrcatA 659->662 663 40544b-40548d SendMessageA * 3 660->663 664 40548f-405491 660->664 661->660 662->658 663->664 664->653 665 405493-405496 664->665 665->653
                                        APIs
                                        • lstrlenA.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                        • lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                        • lstrcatA.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0), ref: 0040542D
                                        • SetWindowTextA.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll), ref: 0040543F
                                        • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                        • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                        • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                        • String ID: Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll
                                        • API String ID: 2531174081-376490971
                                        • Opcode ID: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                        • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                        • Opcode Fuzzy Hash: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                        • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 666 403168-40317c 667 403185-40318e 666->667 668 40317e 666->668 669 403190 667->669 670 403197-40319c 667->670 668->667 669->670 671 4031ac-4031b9 call 40337a 670->671 672 40319e-4031a7 call 403390 670->672 676 403368 671->676 677 4031bf-4031c3 671->677 672->671 678 40336a-40336b 676->678 679 403313-403315 677->679 680 4031c9-403212 GetTickCount 677->680 683 403373-403377 678->683 681 403355-403358 679->681 682 403317-40331a 679->682 684 403370 680->684 685 403218-403220 680->685 686 40335a 681->686 687 40335d-403366 call 40337a 681->687 682->684 688 40331c 682->688 684->683 689 403222 685->689 690 403225-403233 call 40337a 685->690 686->687 687->676 698 40336d 687->698 692 40331f-403325 688->692 689->690 690->676 700 403239-403242 690->700 695 403327 692->695 696 403329-403337 call 40337a 692->696 695->696 696->676 704 403339-403345 call 405ec7 696->704 698->684 702 403248-403268 call 4067da 700->702 707 40330b-40330d 702->707 708 40326e-403281 GetTickCount 702->708 710 403347-403351 704->710 711 40330f-403311 704->711 707->678 712 403283-40328b 708->712 713 4032c6-4032c8 708->713 710->692 714 403353 710->714 711->678 715 403293-4032be MulDiv wsprintfA call 4053d1 712->715 716 40328d-403291 712->716 717 4032ca-4032ce 713->717 718 4032ff-403303 713->718 714->684 723 4032c3 715->723 716->713 716->715 721 4032d0-4032d7 call 405ec7 717->721 722 4032e5-4032f0 717->722 718->685 719 403309 718->719 719->684 727 4032dc-4032de 721->727 725 4032f3-4032f7 722->725 723->713 725->702 726 4032fd 725->726 726->684 727->711 728 4032e0-4032e3 727->728 728->725
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CountTick$wsprintf
                                        • String ID: ... %d%%$@DB
                                        • API String ID: 551687249-1316549817
                                        • Opcode ID: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                        • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                        • Opcode Fuzzy Hash: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                        • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 729 406647-406667 GetSystemDirectoryA 730 406669 729->730 731 40666b-40666d 729->731 730->731 732 40667d-40667f 731->732 733 40666f-406677 731->733 735 406680-4066b2 wsprintfA LoadLibraryExA 732->735 733->732 734 406679-40667b 733->734 734->735
                                        APIs
                                        • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                        • wsprintfA.USER32 ref: 00406697
                                        • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004066AB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                        • String ID: %s%s.dll$UXTHEME$\
                                        • API String ID: 2200240437-4240819195
                                        • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                        • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                        • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                        • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 736 4020ca-4020d6 737 402191-402193 736->737 738 4020dc-4020f2 call 402c5e * 2 736->738 740 40230a-40230f call 401423 737->740 748 402101-40210f LoadLibraryExA 738->748 749 4020f4-4020ff GetModuleHandleA 738->749 745 402aea-402af9 740->745 751 402111-40211e GetProcAddress 748->751 752 40218a-40218c 748->752 749->748 749->751 753 402120-402126 751->753 754 40215d-402162 call 4053d1 751->754 752->740 756 402128-402134 call 401423 753->756 757 40213f-402156 call 6ed5176b 753->757 758 402167-40216a 754->758 756->758 766 402136-40213d 756->766 760 402158-40215b 757->760 758->745 761 402170-402178 call 403a36 758->761 760->758 761->745 767 40217e-402185 FreeLibrary 761->767 766->758 767->745
                                        APIs
                                        • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 004020F5
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                          • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0), ref: 0040542D
                                          • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll), ref: 0040543F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                        • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402105
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                        • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040217F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                        • String ID: (VS
                                        • API String ID: 2987980305-3617338582
                                        • Opcode ID: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                        • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                        • Opcode Fuzzy Hash: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                        • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 769 402d60-402d89 call 406113 771 402d8e-402d92 769->771 772 402e43-402e47 771->772 773 402d98-402d9c 771->773 774 402dc1-402dd4 773->774 775 402d9e-402dbf RegEnumValueA 773->775 777 402dfd-402e04 RegEnumKeyA 774->777 775->774 776 402e28-402e36 RegCloseKey 775->776 776->772 778 402dd6-402dd8 777->778 779 402e06-402e18 RegCloseKey call 4066b5 777->779 778->776 781 402dda-402dee call 402d60 778->781 784 402e38-402e3e 779->784 785 402e1a-402e26 RegDeleteKeyA 779->785 781->779 787 402df0-402dfc 781->787 784->772 785->772 787->777
                                        APIs
                                        • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                        • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                        • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CloseEnum$DeleteValue
                                        • String ID:
                                        • API String ID: 1354259210-0
                                        • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                        • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                        • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                        • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 788 6ed5176b-6ed517a7 call 6ed51b28 792 6ed518c4-6ed518c6 788->792 793 6ed517ad-6ed517b1 788->793 794 6ed517b3-6ed517b9 call 6ed5233f 793->794 795 6ed517ba-6ed517c7 call 6ed52381 793->795 794->795 800 6ed517f7-6ed517fe 795->800 801 6ed517c9-6ed517ce 795->801 804 6ed51800-6ed5181c call 6ed52568 call 6ed515e9 call 6ed512f6 GlobalFree 800->804 805 6ed5181e-6ed51822 800->805 802 6ed517d0-6ed517d1 801->802 803 6ed517e9-6ed517ec 801->803 807 6ed517d3-6ed517d4 802->807 808 6ed517d9-6ed517da call 6ed52ac8 802->808 803->800 811 6ed517ee-6ed517ef call 6ed52d53 803->811 829 6ed51873-6ed51877 804->829 809 6ed51824-6ed5186a call 6ed515fb call 6ed52568 805->809 810 6ed5186c-6ed51872 call 6ed52568 805->810 813 6ed517d6-6ed517d7 807->813 814 6ed517e1-6ed517e7 call 6ed52742 807->814 820 6ed517df 808->820 809->829 810->829 823 6ed517f4 811->823 813->800 813->808 828 6ed517f6 814->828 820->823 823->828 828->800 830 6ed518b4-6ed518bb 829->830 831 6ed51879-6ed51887 call 6ed5252e 829->831 830->792 836 6ed518bd-6ed518be GlobalFree 830->836 838 6ed5189f-6ed518a6 831->838 839 6ed51889-6ed5188c 831->839 836->792 838->830 841 6ed518a8-6ed518b3 call 6ed51572 838->841 839->838 840 6ed5188e-6ed51896 839->840 840->838 842 6ed51898-6ed51899 FreeLibrary 840->842 841->830 842->838
                                        APIs
                                          • Part of subcall function 6ED51B28: GlobalFree.KERNEL32(?), ref: 6ED51D99
                                          • Part of subcall function 6ED51B28: GlobalFree.KERNEL32(?), ref: 6ED51D9E
                                          • Part of subcall function 6ED51B28: GlobalFree.KERNEL32(?), ref: 6ED51DA3
                                        • GlobalFree.KERNEL32(00000000), ref: 6ED51816
                                        • FreeLibrary.KERNEL32(?), ref: 6ED51899
                                        • GlobalFree.KERNEL32(00000000), ref: 6ED518BE
                                          • Part of subcall function 6ED5233F: GlobalAlloc.KERNEL32(00000040,?), ref: 6ED52370
                                          • Part of subcall function 6ED52742: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6ED517E7,00000000), ref: 6ED52812
                                          • Part of subcall function 6ED515FB: wsprintfA.USER32 ref: 6ED51629
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3827765683.000000006ED51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6ED50000, based on PE: true
                                        • Associated: 00000001.00000002.3827733798.000000006ED50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827782933.000000006ED54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827798328.000000006ED56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ed50000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Global$Free$Alloc$Librarywsprintf
                                        • String ID:
                                        • API String ID: 3962662361-3916222277
                                        • Opcode ID: 30b001280d5db6cd58165d594f245dc17bc251f8cde412bfd1455ff1a1bc22dd
                                        • Instruction ID: 1f1d5fb45ad8f0d8cf4b64c8c61b67f297d97093b000435a8185a2980f8a5436
                                        • Opcode Fuzzy Hash: 30b001280d5db6cd58165d594f245dc17bc251f8cde412bfd1455ff1a1bc22dd
                                        • Instruction Fuzzy Hash: C5418271400A05EADF419FF88894BD63BACBF01318F0489A9E9569E386DF74D56DC7B0

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 845 4024a3-4024ca call 402c5e * 2 call 402cee 851 4024cf-4024d4 845->851 852 402aea-402af9 851->852 853 4024da-4024e4 851->853 854 4024f4-4024f7 853->854 855 4024e6-4024f3 call 402c5e lstrlenA 853->855 859 4024f9-40250d call 402c3c 854->859 860 40250e-402511 854->860 855->854 859->860 863 402522-402536 RegSetValueExA 860->863 864 402513-40251d call 403168 860->864 865 402538 863->865 866 40253b-402618 RegCloseKey 863->866 864->863 865->866 866->852
                                        APIs
                                        • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00000023,00000011,00000002), ref: 004024EE
                                        • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00000000,00000011,00000002), ref: 0040252E
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00000000,00000011,00000002), ref: 00402612
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CloseValuelstrlen
                                        • String ID: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp
                                        • API String ID: 2655323295-79576773
                                        • Opcode ID: 06b0079c4aef01dc779783f3c5affbdbf4d6b405c4d88886d706ecd77701b95e
                                        • Instruction ID: bcff8488b3c7483af384f27edc247fb8d09a012b63b7e061f1957b9ca53072ec
                                        • Opcode Fuzzy Hash: 06b0079c4aef01dc779783f3c5affbdbf4d6b405c4d88886d706ecd77701b95e
                                        • Instruction Fuzzy Hash: A5118172E04118BFEF10AFA59E49AAE7AB4EB44314F20443FF505F71D1C6B98D829A18
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00405E63
                                        • GetTempFileNameA.KERNELBASE(0000000C,?,00000000,?,?,004033D6,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008), ref: 00405E7D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                                        • API String ID: 1716503409-3083371207
                                        • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                        • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                        • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                        • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                        APIs
                                        • GlobalFree.KERNELBASE(00535628), ref: 00401C1B
                                        • GlobalAlloc.KERNELBASE(00000040,00000404), ref: 00401C2D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree
                                        • String ID: (VS$Call
                                        • API String ID: 3394109436-4229420678
                                        • Opcode ID: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                        • Instruction ID: 9dc913a82bccb3a17233260e0918e107c000b9093c8e114c97909187c283bf28
                                        • Opcode Fuzzy Hash: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                        • Instruction Fuzzy Hash: 292181B2600105EBDB50BFA58E84E5E72E8EB44318711453BF902F32D1DBBCE8169B9D
                                        APIs
                                          • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,0000000C,00405D24,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,00405A6F,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405CC6
                                          • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                          • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                        • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 00401632
                                          • Part of subcall function 00405897: CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                        • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne,00000000,00000000,000000F0), ref: 00401661
                                        Strings
                                        • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne, xrefs: 00401656
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                        • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne
                                        • API String ID: 1892508949-3029371288
                                        • Opcode ID: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                        • Instruction ID: 0b6d2b43488905cbaa276f6c0cac56371e043703d2fe031d841b632f48d4a949
                                        • Opcode Fuzzy Hash: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                        • Instruction Fuzzy Hash: 3911E331904240AFDF307F754D41A7F26B0DA56724B68497FF891B22E2C63D49439A6E
                                        APIs
                                        • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000000,?,?,00406432,80000002), ref: 004061BA
                                        • RegCloseKey.KERNELBASE(?,?,00406432,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?,?,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll), ref: 004061C5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID: Call
                                        • API String ID: 3356406503-1824292864
                                        • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                        • Instruction ID: 11b83480b68dea0a629fd90b3ddfe96452127a043c469d5d543a73811e09722f
                                        • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                        • Instruction Fuzzy Hash: 9A01D472500209ABCF22CF10CD05FDB3FA8EF54354F01403AF915A6191D774CA64CB94
                                        APIs
                                          • Part of subcall function 00406620: FindFirstFileA.KERNELBASE(771B3410,0042BCD8,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00405D50,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,00405A6F,?,771B3410,C:\Users\user~1\AppData\Local\Temp\), ref: 0040662B
                                          • Part of subcall function 00406620: FindClose.KERNEL32(00000000), ref: 00406637
                                        • lstrlenA.KERNEL32 ref: 00402358
                                        • lstrlenA.KERNEL32(00000000), ref: 00402362
                                        • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 0040238A
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: FileFindlstrlen$CloseFirstOperation
                                        • String ID:
                                        • API String ID: 1486964399-0
                                        • Opcode ID: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                        • Instruction ID: 014db6f64816cec2a1970dfcbbf9fa03b0cf1b46d42cec59bb2956c4bbb3b767
                                        • Opcode Fuzzy Hash: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                        • Instruction Fuzzy Hash: 35117071E04209ABDB10EFF58A45A9EB7F8AF00314F10407BA501F72C2D6FDC5428B59
                                        APIs
                                        • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025E7
                                        • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025FA
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00000000,00000011,00000002), ref: 00402612
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Enum$CloseValue
                                        • String ID:
                                        • API String ID: 397863658-0
                                        • Opcode ID: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                        • Instruction ID: cba12c4e2b45f70554d055d57f05f50eb42167a32c5ceb359e12f1818167ad50
                                        • Opcode Fuzzy Hash: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                        • Instruction Fuzzy Hash: 4E01BC71604204AFEB218F54DE98ABF7AACEB40348F10443FF005A61C0DAB84A459A29
                                        APIs
                                        • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402573
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00000000,00000011,00000002), ref: 00402612
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID:
                                        • API String ID: 3356406503-0
                                        • Opcode ID: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                        • Instruction ID: 97fa2cc47e124225833d1b044c3f4c0ff185fe65e0aec06a9837656ed07e9740
                                        • Opcode Fuzzy Hash: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                        • Instruction Fuzzy Hash: 6511C171905205EFDF20CF60CA985AE7AB4EF01344F20883FE446B72C0D6B88A45DA1A
                                        APIs
                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                        • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                        • Instruction ID: 80ce8cba2e1b90c3c9584b4bf9ae45de9eb83361fcac52349235150bfd3c5ac5
                                        • Opcode Fuzzy Hash: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                        • Instruction Fuzzy Hash: C801F4317242209BE7295B399D08B6A36D8E710754F50823FF995F71F1E678CC028B5C
                                        APIs
                                        • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040246F
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00402478
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CloseDeleteValue
                                        • String ID:
                                        • API String ID: 2831762973-0
                                        • Opcode ID: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                        • Instruction ID: 01f6084b7650a9b213f52d22935e9030d34abb49b24569214b94c05b06999087
                                        • Opcode Fuzzy Hash: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                        • Instruction Fuzzy Hash: D3F0B132604121AFDB60EBA49F4DA7F72A99B40314F15003FF101B71C1D9F84D42466E
                                        APIs
                                        • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A56
                                        • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A69
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: EnvironmentExpandStringslstrcmp
                                        • String ID:
                                        • API String ID: 1938659011-0
                                        • Opcode ID: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                        • Instruction ID: 106b93b956adcb394031d7b68410eec4a4f19a4829598155c7958b8f8b1c482a
                                        • Opcode Fuzzy Hash: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                        • Instruction Fuzzy Hash: E8F08231B01201EBCB20CF659E48AAF7EE8DF51354B10403BE145F6190D6788643DF5C
                                        APIs
                                        • CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                        • GetLastError.KERNEL32 ref: 004058E7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                        • Instruction ID: 6d4ac730157cfa02be50de44a6d7979ff339f577f95dd1204a0ac4d64297c34f
                                        • Opcode Fuzzy Hash: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                        • Instruction Fuzzy Hash: A3F0F971C0024DDADB00DFA4D5487DEBBB4AF04305F00802AD841B6280D7B882588B99
                                        APIs
                                        • ShowWindow.USER32(00000000,00000000), ref: 00401F08
                                        • EnableWindow.USER32(00000000,00000000), ref: 00401F13
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Window$EnableShow
                                        • String ID:
                                        • API String ID: 1136574915-0
                                        • Opcode ID: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                        • Instruction ID: ee44cb40e53ee45f72a0237e1ac7dd9bbdf9d48109a1395b289766a98c9c438f
                                        • Opcode Fuzzy Hash: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                        • Instruction Fuzzy Hash: C9E04872A082049FEF64EBA4FE9556F77F4EB50365B20447FE101F11C2DA7849428A5D
                                        APIs
                                        • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                        • CloseHandle.KERNEL32(?), ref: 0040595C
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess
                                        • String ID:
                                        • API String ID: 3712363035-0
                                        • Opcode ID: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                        • Instruction ID: 59d3833cbd0ccaca5dcead9257bf18f7f56651039fadea8639d530792baa2c48
                                        • Opcode Fuzzy Hash: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                        • Instruction Fuzzy Hash: 4DE09AB4A00209BFFB109F65AD09F7B776CE704714F418425B914F2151EB7498148A7C
                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                          • Part of subcall function 00406647: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                          • Part of subcall function 00406647: wsprintfA.USER32 ref: 00406697
                                          • Part of subcall function 00406647: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004066AB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                        • String ID:
                                        • API String ID: 2547128583-0
                                        • Opcode ID: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                        • Instruction ID: a472cff2ba870c31c69f4352ad77424fb7bed112d4ffd52c95bf20a34481097e
                                        • Opcode Fuzzy Hash: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                        • Instruction Fuzzy Hash: BAE08C73A04210ABD610A6709E0883B73ACAF897413030C3EF952F2240DB3ADC32966E
                                        APIs
                                        • GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                        • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: File$AttributesCreate
                                        • String ID:
                                        • API String ID: 415043291-0
                                        • Opcode ID: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                        • Instruction ID: 0febe3887fb1e567d40345103610fd6f3e8d71b3c6328ccb34cdb50f288ecb70
                                        • Opcode Fuzzy Hash: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                        • Instruction Fuzzy Hash: 23D09E31254301AFEF099F20DE16F2E7AA2EB84B00F11952CB682A41E0DA7158299B15
                                        APIs
                                        • CreateDirectoryA.KERNELBASE(?,00000000,004033CB,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004058F7
                                        • GetLastError.KERNEL32(?,00000008,0000000A,0000000C), ref: 00405905
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                        • Instruction ID: 226d66ac6a6a747d722d053d5b09978fff7ae735be90135577c6d3bd4ef0b281
                                        • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                        • Instruction Fuzzy Hash: F9C04CB120490ADED6505B319F0971B7A51AB50751F175839A586E40A0DB348455DD2E
                                        APIs
                                        • EnumWindows.USER32(00000000), ref: 6ED52B87
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3827765683.000000006ED51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6ED50000, based on PE: true
                                        • Associated: 00000001.00000002.3827733798.000000006ED50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827782933.000000006ED54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827798328.000000006ED56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ed50000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: EnumWindows
                                        • String ID:
                                        • API String ID: 1129996299-0
                                        • Opcode ID: edde1c9b432b6fabc4655c2305285c68d8f16570bc41cdfd406129e8d9540d46
                                        • Instruction ID: 6e1ad7da4bdcad264fd3fc2a4de094d42d53a3c8a6065a6002e6b2a2b27690b6
                                        • Opcode Fuzzy Hash: edde1c9b432b6fabc4655c2305285c68d8f16570bc41cdfd406129e8d9540d46
                                        • Instruction Fuzzy Hash: F5412B72904604DBEF219FA8DC81B9A37B8EB4536DF208825E505C7314D739D5AA8BA1
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: wsprintf
                                        • String ID:
                                        • API String ID: 2111968516-0
                                        • Opcode ID: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                        • Instruction ID: c5fbe62f9b4e2cb89eed07bb10574c4b4a04671343a68c93ee4f329e73b59f15
                                        • Opcode Fuzzy Hash: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                        • Instruction Fuzzy Hash: 3521B530D04289EEDF318B6886586EEBBB09F01314F14407FE4D1B72E2C6BC8985CB69
                                        APIs
                                        • MoveFileA.KERNEL32(00000000,00000000), ref: 004016AA
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: FileMove
                                        • String ID:
                                        • API String ID: 3562171763-0
                                        • Opcode ID: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                        • Instruction ID: 67493920040547a329b99de5d89bb6d269ebd8b6645208cc7e8d7a7b283b3978
                                        • Opcode Fuzzy Hash: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                        • Instruction Fuzzy Hash: 09F0B431608125A7DF20BB765F5DE5F52A49B41378B20423BF212B21D1DABDC643856E
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402776
                                          • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: FilePointerwsprintf
                                        • String ID:
                                        • API String ID: 327478801-0
                                        • Opcode ID: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                        • Instruction ID: 00adb5ebf99275c5c47ff66d1c826bee854e75ad94e87541b3f98b02de3c6d9f
                                        • Opcode Fuzzy Hash: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                        • Instruction Fuzzy Hash: E3E09272A04104AFDF50FBA4AE49DAF76B8EB40359B10043FF202F00C2CA7C4A538A2D
                                        APIs
                                        • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402402
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: PrivateProfileStringWrite
                                        • String ID:
                                        • API String ID: 390214022-0
                                        • Opcode ID: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                        • Instruction ID: f24de8215b53ecbcf80a61348f6bfc7870897c54b3e6c90e9d08f7162164e460
                                        • Opcode Fuzzy Hash: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                        • Instruction Fuzzy Hash: 9DE04F3160413A6BEB6036B11F8D97F2159AB84314B14053EBA11B62C6D9FC8E8352A9
                                        APIs
                                        • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402D0F,00000000,?,?), ref: 0040616A
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                        • Instruction ID: bbdc12591f07ec5b960d4a172b59ed2570ed34ba37628b65f55bcc9503456b15
                                        • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                        • Instruction Fuzzy Hash: 7AE0E6B2020109BEEF099F60DC1AD7B772DE708310F01492EFA06D4151E6B5E9705634
                                        APIs
                                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403343,00000000,0041D440,000000FF,0041D440,000000FF,000000FF,00000004,00000000), ref: 00405EDB
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                        • Instruction ID: 0d77a24040528495e1d5683a333844bda4a24a81b27895c3293bddb668a77566
                                        • Opcode Fuzzy Hash: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                        • Instruction Fuzzy Hash: 20E0EC3221065EABDF509F55DC00EEB7B6CEB05360F004837F965E2150D631EA219BE9
                                        APIs
                                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040338D,00000000,00000000,004031B7,000000FF,00000004,00000000,00000000,00000000), ref: 00405EAC
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                        • Instruction ID: c4f2c5db2c8838af9825f3b875f3a0ad88d5b51994199861a780369f0be58439
                                        • Opcode Fuzzy Hash: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                        • Instruction Fuzzy Hash: E4E04F32210619ABDF109F60DC04EAB3B6CEB00351F000432F954E2140D230E9118AE4
                                        APIs
                                        • VirtualProtect.KERNELBASE(6ED5504C,00000004,00000040,6ED5503C), ref: 6ED529CF
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3827765683.000000006ED51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6ED50000, based on PE: true
                                        • Associated: 00000001.00000002.3827733798.000000006ED50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827782933.000000006ED54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827798328.000000006ED56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ed50000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: ProtectVirtual
                                        • String ID:
                                        • API String ID: 544645111-0
                                        • Opcode ID: 8cb3076eddcef2ef5e5423b819c263ecb300e3c8ecd1976e6eea270223cce026
                                        • Instruction ID: fd9b80d9e09f0a16ec36596f37d0f6c466bf34b9147d17a3b6311faf10151e89
                                        • Opcode Fuzzy Hash: 8cb3076eddcef2ef5e5423b819c263ecb300e3c8ecd1976e6eea270223cce026
                                        • Instruction Fuzzy Hash: 18F0C9B0914B80DEEBA2CF7CC84470A3FF0BB1A3A5B11452AE14DDA341E334505A8B91
                                        APIs
                                        • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402440
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: PrivateProfileString
                                        • String ID:
                                        • API String ID: 1096422788-0
                                        • Opcode ID: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                        • Instruction ID: 16d05768d70be94792168112439c0a82a49a1a045ba9b991e9e4b5323ac17763
                                        • Opcode Fuzzy Hash: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                        • Instruction Fuzzy Hash: 2CE04F3190821DBAEB007FA08F09AAD2A69AF01720F10002AFA507A0D1E6B98583971D
                                        APIs
                                        • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,004061A1,?,?,?,?,00000000,?), ref: 00406137
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Open
                                        • String ID:
                                        • API String ID: 71445658-0
                                        • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                        • Instruction ID: 4278cf0171cf0b678593f71500b3925c4415a8e9ce87015ff7d519d2eb21bae6
                                        • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                        • Instruction Fuzzy Hash: BCD0123204020DBBDF119E90AD01FAB3B1DEB48350F014826FE07A8091D775D570A724
                                        APIs
                                        • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015CD
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                        • Instruction ID: 7d2cdf6a56bb8b2c4d8e447006d96498fe5724c9cded2cbb68f68f822827988b
                                        • Opcode Fuzzy Hash: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                        • Instruction Fuzzy Hash: BED01732708214DBDF60DBA8AF08A9FB3A4AB10328B20413BD211F21D1D6B9C5469B2D
                                        APIs
                                        • SendMessageA.USER32(00010414,00000000,00000000,00000000), ref: 0040438B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                        • Instruction ID: f513ac05e70e3adf76b651c0ca8ec4e95b66ff2fdc1b64d79a05bcbbe3c40a95
                                        • Opcode Fuzzy Hash: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                        • Instruction Fuzzy Hash: 4DC09BB17403027BFE209B529E45F077798D790700F1554397754F54D0C774D410D62C
                                        APIs
                                        • SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                        • Instruction ID: 50a7fc5ec129452a525cde7c4fd9a9aa290cced010421ab9f43a5acdc6dad314
                                        • Opcode Fuzzy Hash: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                        • Instruction Fuzzy Hash: 33B0127A781601BBDE615B40DF09F457EB2E768701F408039B348240F0CEB200A9DB2C
                                        APIs
                                        • ShellExecuteExA.SHELL32(?,00404774,?), ref: 00405978
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: ExecuteShell
                                        • String ID:
                                        • API String ID: 587946157-0
                                        • Opcode ID: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                        • Instruction ID: 923d99ad9cc7c2cd2e65252a1a37f78a8d30594c4c7a615bb4925eb6a4e84790
                                        • Opcode Fuzzy Hash: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                        • Instruction Fuzzy Hash: 27C092B2000200DFE301CF90CB08F067BF8AF54306F028068E184DA060C7788840CB29
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 0040339E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                        • Instruction ID: 699dda5fb03a211c19396a68767747e6c986426da1756d7c47186a7ffa8d2f84
                                        • Opcode Fuzzy Hash: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                        • Instruction Fuzzy Hash: EBB01231140300BFDA214F00DF09F057B21AB94710F10C034B384780F086711075EB0E
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,0040412B), ref: 00404359
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                        • Instruction ID: b84ed7fd3cc5f3c3e9fcd53eb4babc11f88d3e7fa425116ebe2a9639eb74f9e6
                                        • Opcode Fuzzy Hash: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                        • Instruction Fuzzy Hash: 28A00176505500AFCA12AB50EF1980ABB66ABA4741B818479A685601358B768831EB1B
                                        APIs
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                          • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                          • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,00000000,00424440,771B23A0), ref: 0040542D
                                          • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp\System.dll), ref: 0040543F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                          • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                          • Part of subcall function 00405926: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                          • Part of subcall function 00405926: CloseHandle.KERNEL32(?), ref: 0040595C
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FE5
                                          • Part of subcall function 0040672A: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040673B
                                          • Part of subcall function 0040672A: GetExitCodeProcess.KERNEL32(?,?), ref: 0040675D
                                          • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                        • String ID:
                                        • API String ID: 2972824698-0
                                        • Opcode ID: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                        • Instruction ID: 2907458289dc89520fdc1db2e5a40f60bb15031deda838765eaf0f6b46983df9
                                        • Opcode Fuzzy Hash: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                        • Instruction Fuzzy Hash: 0EF05B31905112DBCF20ABA55D849EF71E4DB0135CB11413FF501F21D2D7BC4A46DAAE
                                        APIs
                                        • Sleep.KERNELBASE(00000000), ref: 004014E9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Sleep
                                        • String ID:
                                        • API String ID: 3472027048-0
                                        • Opcode ID: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                        • Instruction ID: 2b610f9d6ca2559d84a6cccd890523da06de060bf9d54f72eb9b50da0c514afd
                                        • Opcode Fuzzy Hash: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                        • Instruction Fuzzy Hash: 1CD05E73B142009BDB60DBB8BEC445F73E4E7403257304837E502E2092E5788946861C
                                        APIs
                                        • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                        • SetWindowTextA.USER32(00000000,-00430000), ref: 00404838
                                        • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                        • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                        • lstrcmpiA.KERNEL32(Call,0042A488), ref: 00404926
                                        • lstrcatA.KERNEL32(-00430000,Call), ref: 00404932
                                        • SetDlgItemTextA.USER32(?,000003FB,-00430000), ref: 00404944
                                          • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                          • Part of subcall function 00406587: CharNextA.USER32(0000000C,*?|<>/":,00000000,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                          • Part of subcall function 00406587: CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                          • Part of subcall function 00406587: CharNextA.USER32(0000000C,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                          • Part of subcall function 00406587: CharPrevA.USER32(0000000C,0000000C,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                        • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,-00430000,00000001,00429458,-00430000,-00430000,000003FB,-00430000), ref: 00404A02
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                          • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,-00430000), ref: 00404C14
                                          • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                          • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call
                                        • API String ID: 2624150263-773142602
                                        • Opcode ID: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                        • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                        • Opcode Fuzzy Hash: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                        • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                        APIs
                                          • Part of subcall function 6ED512A5: GlobalAlloc.KERNEL32(00000040,6ED512C3,?,6ED5135F,-6ED5504B,6ED511C0,-000000A0), ref: 6ED512AD
                                        • GlobalAlloc.KERNEL32(00000040,000014A4), ref: 6ED51C54
                                        • lstrcpyA.KERNEL32(00000008,?), ref: 6ED51C9C
                                        • lstrcpyA.KERNEL32(00000408,?), ref: 6ED51CA6
                                        • GlobalFree.KERNEL32(00000000), ref: 6ED51CB9
                                        • GlobalFree.KERNEL32(?), ref: 6ED51D99
                                        • GlobalFree.KERNEL32(?), ref: 6ED51D9E
                                        • GlobalFree.KERNEL32(?), ref: 6ED51DA3
                                        • GlobalFree.KERNEL32(00000000), ref: 6ED51F8A
                                        • lstrcpyA.KERNEL32(?,?), ref: 6ED52128
                                        • GetModuleHandleA.KERNEL32(00000008), ref: 6ED521A4
                                        • LoadLibraryA.KERNEL32(00000008), ref: 6ED521B5
                                        • GetProcAddress.KERNEL32(?,?), ref: 6ED5220E
                                        • lstrlenA.KERNEL32(00000408), ref: 6ED52228
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3827765683.000000006ED51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6ED50000, based on PE: true
                                        • Associated: 00000001.00000002.3827733798.000000006ED50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827782933.000000006ED54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827798328.000000006ED56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ed50000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                        • String ID:
                                        • API String ID: 245916457-0
                                        • Opcode ID: 29a778bfdc29ec720df313e654c862bb5362e5694d7f289e4bf996b318f01f18
                                        • Instruction ID: 5b7c7ec8cc115cd666928e0444a6fcdf0a18b5305e39768e980a683e20227b06
                                        • Opcode Fuzzy Hash: 29a778bfdc29ec720df313e654c862bb5362e5694d7f289e4bf996b318f01f18
                                        • Instruction Fuzzy Hash: C422A071D54A06DEDF508FE8C8907EEBBF4BB06309F10892ED1A5A3380D77495AACB50
                                        APIs
                                        • CoCreateInstance.OLE32(0040851C,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040221D
                                        • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022CF
                                        Strings
                                        • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne, xrefs: 0040225D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: ByteCharCreateInstanceMultiWide
                                        • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne
                                        • API String ID: 123533781-3029371288
                                        • Opcode ID: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                        • Instruction ID: 9693176738af107330769ac86e8646dde0b712c02a361864b0ed1875b7ced88a
                                        • Opcode Fuzzy Hash: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                        • Instruction Fuzzy Hash: DB511971A00208AFDF00EFA4CA88A9D7BB5FF48314F2045BAF505FB2D1DA799981CB54
                                        APIs
                                        • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027DE
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: FileFindFirst
                                        • String ID:
                                        • API String ID: 1974802433-0
                                        • Opcode ID: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                        • Instruction ID: 474e59c826447b87e47a37c01b73ad662870a85b7ff57bc711f4e8679485c19e
                                        • Opcode Fuzzy Hash: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                        • Instruction Fuzzy Hash: 9CF0A771605110DFDB51EBA49E49AEE77689F21314F6005BBE141F20C2C6B889469B2E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                        • Instruction ID: 8768c5d39ca9d5d04b1d74764d0b3cf6a08d2071900a395e822ff8491b177041
                                        • Opcode Fuzzy Hash: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                        • Instruction Fuzzy Hash: D0E18B7190470ACFDB24CF58C880BAAB7F1FB44305F15842EE497A72D1E738AA95CB14
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                        • Instruction ID: 112ec8b08e22b9c6c3aeb56eb94a2e19ac2cef272eed527e1014fed5102c6f46
                                        • Opcode Fuzzy Hash: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                        • Instruction Fuzzy Hash: 33C13631E04219DBCF18CF68D8905EEBBB2BF98314F25866AD85677380D734A942CF95
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                        • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404DA5
                                        • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                        • SetWindowLongA.USER32(?,000000FC,00405345), ref: 00404DD6
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404DE8
                                        • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                        • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                        • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                        • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404E2E
                                        • DeleteObject.GDI32(00000110), ref: 00404E33
                                        • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                        • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                        • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                          • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                        • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                        • GetWindowLongA.USER32(?,000000F0), ref: 00404F76
                                        • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404F84
                                        • ShowWindow.USER32(?,00000005), ref: 00404F94
                                        • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                        • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                        • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00405109
                                        • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 0040512D
                                        • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                        • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                        • GlobalFree.KERNEL32(?), ref: 00405172
                                        • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                        • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                        • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 004052CE
                                        • ShowWindow.USER32(?,00000000), ref: 0040531C
                                        • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                        • ShowWindow.USER32(00000000), ref: 0040532E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $M$N
                                        • API String ID: 2564846305-813528018
                                        • Opcode ID: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                        • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                        • Opcode Fuzzy Hash: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                        • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                        APIs
                                        • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404523
                                        • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                        • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404555
                                        • GetSysColor.USER32(?), ref: 00404566
                                        • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                        • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                        • lstrlenA.KERNEL32(?), ref: 00404587
                                        • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                        • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                        • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                        • SendMessageA.USER32(00000000), ref: 00404610
                                        • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                        • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                        • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                        • SetCursor.USER32(00000000), ref: 00404693
                                        • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                        • SetCursor.USER32(00000000), ref: 004046AC
                                        • SendMessageA.USER32(00000111,00000001,00000000), ref: 004046D8
                                        • SendMessageA.USER32(00000010,00000000,00000000), ref: 004046EC
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                        • String ID: Call$N$cD@
                                        • API String ID: 3103080414-3938186718
                                        • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                        • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                        • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                        • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                        APIs
                                        • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                        • DeleteObject.GDI32(?), ref: 004010ED
                                        • CreateFontIndirectA.GDI32(?), ref: 00401105
                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                        • DrawTextA.USER32(00000000,humpende Setup,000000FF,00000010,00000820), ref: 00401156
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                        • DeleteObject.GDI32(?), ref: 00401165
                                        • EndPaint.USER32(?,?), ref: 0040116E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F$humpende Setup
                                        • API String ID: 941294808-3363781941
                                        • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                        • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                        • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                        • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                        APIs
                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                        • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                          • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                          • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                        • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                        • wsprintfA.USER32 ref: 00405F6B
                                        • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,00000004,0042C618,?,?,?,?,?), ref: 00405FA6
                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FB5
                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                        • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                        • GlobalFree.KERNEL32(00000000), ref: 00406054
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                          • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                          • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                        • String ID: %s=%s$[Rename]
                                        • API String ID: 2171350718-1727408572
                                        • Opcode ID: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                        • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                        • Opcode Fuzzy Hash: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                        • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                        APIs
                                        • CharNextA.USER32(0000000C,*?|<>/":,00000000,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                        • CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                        • CharNextA.USER32(0000000C,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                        • CharPrevA.USER32(0000000C,0000000C,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                        Strings
                                        • "C:\Users\user\Desktop\Order 00293884800595.bat.exe", xrefs: 00406587
                                        • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00406588
                                        • *?|<>/":, xrefs: 004065CF
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: "C:\Users\user\Desktop\Order 00293884800595.bat.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                                        • API String ID: 589700163-2211029518
                                        • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                        • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                        • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                        • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                        APIs
                                        • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                        • GetSysColor.USER32(00000000), ref: 004043EF
                                        • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                        • SetBkMode.GDI32(?,?), ref: 00404407
                                        • GetSysColor.USER32(?), ref: 0040441A
                                        • SetBkColor.GDI32(?,?), ref: 0040442A
                                        • DeleteObject.GDI32(?), ref: 00404444
                                        • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                        • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                        • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                        • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                        APIs
                                          • Part of subcall function 6ED512A5: GlobalAlloc.KERNEL32(00000040,6ED512C3,?,6ED5135F,-6ED5504B,6ED511C0,-000000A0), ref: 6ED512AD
                                        • GlobalFree.KERNEL32(?), ref: 6ED5266E
                                        • GlobalFree.KERNEL32(00000000), ref: 6ED526A8
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3827765683.000000006ED51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6ED50000, based on PE: true
                                        • Associated: 00000001.00000002.3827733798.000000006ED50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827782933.000000006ED54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827798328.000000006ED56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ed50000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Global$Free$Alloc
                                        • String ID:
                                        • API String ID: 1780285237-0
                                        • Opcode ID: 95fd54f586f85f629a5dbf0db937d7d9accd08a2a8519b8cff882116093fd3bc
                                        • Instruction ID: b3f7336a0378cce54cd4f47595192e46c1a7485caa3c98b003125db1642b1bf4
                                        • Opcode Fuzzy Hash: 95fd54f586f85f629a5dbf0db937d7d9accd08a2a8519b8cff882116093fd3bc
                                        • Instruction Fuzzy Hash: FF41AE71608641EFEF058F98CC94C6E77BAEB86319B54492EF54187310DB319C2ACB62
                                        APIs
                                        • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                        • GetMessagePos.USER32 ref: 00404CA3
                                        • ScreenToClient.USER32(?,?), ref: 00404CBD
                                        • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                        • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                        • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                        • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                        • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                        APIs
                                        • GetDC.USER32(?), ref: 00401E5D
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                        • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                        • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                        • String ID: Tahoma
                                        • API String ID: 3808545654-3580928618
                                        • Opcode ID: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                        • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                        • Opcode Fuzzy Hash: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                        • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                        APIs
                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E65
                                        • MulDiv.KERNEL32(0007BE29,00000064,0007BE2D), ref: 00402E90
                                        • wsprintfA.USER32 ref: 00402EA0
                                        • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                        • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                        Strings
                                        • verifying installer: %d%%, xrefs: 00402E9A
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: verifying installer: %d%%
                                        • API String ID: 1451636040-82062127
                                        • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                        • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                        • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                        • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                        APIs
                                        • GlobalFree.KERNEL32(00000000), ref: 6ED524D7
                                          • Part of subcall function 6ED512B4: lstrcpynA.KERNEL32(00000000,?,6ED5135F,-6ED5504B,6ED511C0,-000000A0), ref: 6ED512C4
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6ED52452
                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6ED52467
                                        • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6ED52478
                                        • CLSIDFromString.OLE32(00000000,00000000), ref: 6ED52486
                                        • GlobalFree.KERNEL32(00000000), ref: 6ED5248D
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3827765683.000000006ED51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6ED50000, based on PE: true
                                        • Associated: 00000001.00000002.3827733798.000000006ED50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827782933.000000006ED54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827798328.000000006ED56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ed50000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                        • String ID:
                                        • API String ID: 3730416702-0
                                        • Opcode ID: 95d83cb9042aa152dbd93f25f00ac227f1e43b931ae86b4d81ac9091ba8e910f
                                        • Instruction ID: ca982362e24cedb1c92d6c1afcc75a51d4b43bf90b5137198199466abd7702f4
                                        • Opcode Fuzzy Hash: 95d83cb9042aa152dbd93f25f00ac227f1e43b931ae86b4d81ac9091ba8e910f
                                        • Instruction Fuzzy Hash: 4541A0B1508701DFEB108FA99844B6A73F8FB51319F10492EE586CBB80E770D96DCB61
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040286E
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040288A
                                        • GlobalFree.KERNEL32(?), ref: 004028C9
                                        • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028F8
                                        • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040290B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                        • String ID:
                                        • API String ID: 2667972263-0
                                        • Opcode ID: f9d8bf5d5987790022c70f7326850f96b9b02ebc48a317f88317c3e1387ee75d
                                        • Instruction ID: f5f6ffd272893f167dd8362f30c9a288e23aa0477cfe19fc00766ec7197ba147
                                        • Opcode Fuzzy Hash: f9d8bf5d5987790022c70f7326850f96b9b02ebc48a317f88317c3e1387ee75d
                                        • Instruction Fuzzy Hash: EA319E32C00124BBEF216FA5CE48D9E7A79EF04364F10823AF554B72E1CB7949419FA8
                                        APIs
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3827765683.000000006ED51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6ED50000, based on PE: true
                                        • Associated: 00000001.00000002.3827733798.000000006ED50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827782933.000000006ED54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827798328.000000006ED56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ed50000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: FreeGlobal
                                        • String ID:
                                        • API String ID: 2979337801-0
                                        • Opcode ID: 2438fe63b0916217985ca148881b45963ab3c5b5a13aac7561152240ecda6f65
                                        • Instruction ID: 6bcededb8bbb43e837b0edb33327d31a7557339a98849ccb3b40a7e5b6ae0d09
                                        • Opcode Fuzzy Hash: 2438fe63b0916217985ca148881b45963ab3c5b5a13aac7561152240ecda6f65
                                        • Instruction Fuzzy Hash: 5D51C331D18D1AEEDF428FF98D406BD7BB9AB46358F10056AD454A3304C731DAAF8BA1
                                        APIs
                                        • GetDlgItem.USER32(?,?), ref: 00401DA3
                                        • GetClientRect.USER32(?,?), ref: 00401DF1
                                        • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                        • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                        • DeleteObject.GDI32(00000000), ref: 00401E45
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                        • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                        • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                        • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                        APIs
                                        • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                        • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                        • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                        • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                        • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                        APIs
                                        • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,-00430000), ref: 00404C14
                                        • wsprintfA.USER32 ref: 00404C1C
                                        • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s
                                        • API String ID: 3540041739-3551169577
                                        • Opcode ID: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                        • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                        • Opcode Fuzzy Hash: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                        • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                        APIs
                                          • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,humpende Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                          • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,0000000C,00405D24,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,00405A6F,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405CC6
                                          • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                          • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                        • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,00405A6F,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405D60
                                        • GetFileAttributesA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,00405A6F,?,771B3410,C:\Users\user~1\AppData\Local\Temp\), ref: 00405D70
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                        • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp
                                        • API String ID: 3248276644-3347330934
                                        • Opcode ID: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                        • Instruction ID: 935e679f1c1c714b0e3911a5d698b339edd04cd04073ee9c7d5fe0644536c501
                                        • Opcode Fuzzy Hash: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                        • Instruction Fuzzy Hash: FCF02831105E511AE62233352C0DAAF1A44CE93364719857FF855B12D2DB3C89479D7D
                                        APIs
                                        • FreeLibrary.KERNEL32(6ED50000,771B3410,00000000,C:\Users\user~1\AppData\Local\Temp\,004039D9,004037BF,?,?,00000008,0000000A,0000000C), ref: 00403A1B
                                        • GlobalFree.KERNEL32(004FE570), ref: 00403A22
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Free$GlobalLibrary
                                        • String ID: C:\Users\user~1\AppData\Local\Temp\$pO
                                        • API String ID: 1100898210-3733841283
                                        • Opcode ID: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                        • Instruction ID: 5c739cdb98e40ae8c0dfefb52ad11f1475293c83533685fd3a033b9eca192303
                                        • Opcode Fuzzy Hash: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                        • Instruction Fuzzy Hash: 16E01D3361513057CA315F45FD0579A77685F58B27F09403AE8807715587745D434FD9
                                        APIs
                                        • lstrlenA.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,004033C5,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00405C25
                                        • CharPrevA.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,004033C5,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00405C2E
                                        • lstrcatA.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C), ref: 00405C3F
                                        Strings
                                        • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405C1F
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrcatlstrlen
                                        • String ID: C:\Users\user~1\AppData\Local\Temp\
                                        • API String ID: 2659869361-2382934351
                                        • Opcode ID: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                        • Instruction ID: 5ecf558490c9fc18ca768c1c77fe203d25deaeb0153a8833875816b6af26cf17
                                        • Opcode Fuzzy Hash: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                        • Instruction Fuzzy Hash: 98D0A772505A306BE50136565D09ECB1A088F4231570500AFF140B2191C67C0C5147FD
                                        APIs
                                        • CharNextA.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,0000000C,00405D24,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp,771B3410,?,C:\Users\user~1\AppData\Local\Temp\,00405A6F,?,771B3410,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405CC6
                                        • CharNextA.USER32(00000000), ref: 00405CCB
                                        • CharNextA.USER32(00000000), ref: 00405CDF
                                        Strings
                                        • C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp, xrefs: 00405CB9
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CharNext
                                        • String ID: C:\Users\user~1\AppData\Local\Temp\nssFF7B.tmp
                                        • API String ID: 3213498283-79576773
                                        • Opcode ID: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                        • Instruction ID: ee8b6173ba6a0b3c7a77adf62d8f17896d3fbd5398f7dd7aaac8169870cad506
                                        • Opcode Fuzzy Hash: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                        • Instruction Fuzzy Hash: 42F02B51908FA02BFB3252246C48B775B8CDF95715F048477D5407B2C2C27C6C414F9A
                                        APIs
                                        • DestroyWindow.USER32(00000000,00000000,004030AB,00000001,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402EE0
                                        • GetTickCount.KERNEL32 ref: 00402EFE
                                        • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                        • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F29
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                        • String ID:
                                        • API String ID: 2102729457-0
                                        • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                        • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                        • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                        • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 00405374
                                        • CallWindowProcA.USER32(?,?,?,?), ref: 004053C5
                                          • Part of subcall function 00404379: SendMessageA.USER32(00010414,00000000,00000000,00000000), ref: 0040438B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Window$CallMessageProcSendVisible
                                        • String ID:
                                        • API String ID: 3748168415-3916222277
                                        • Opcode ID: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                        • Instruction ID: 98c6722e6a54b641667f931c9e29074c60bd52ab0debc5010bc9b6450a54dc72
                                        • Opcode Fuzzy Hash: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                        • Instruction Fuzzy Hash: 9201B171100608AFFF205F11ED84A6B3A26EB84794F50413BFE407A1D1C3B98C629E5E
                                        APIs
                                        • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Order 00293884800595.bat.exe,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A), ref: 00405C6C
                                        • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Order 00293884800595.bat.exe,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?), ref: 00405C7A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrlen
                                        • String ID: C:\Users\user\Desktop
                                        • API String ID: 2709904686-3976562730
                                        • Opcode ID: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                        • Instruction ID: c418d430c32a25fd64e5672735cb35cda0f462e3a1cf334074a775347c04a98e
                                        • Opcode Fuzzy Hash: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                        • Instruction Fuzzy Hash: 62D0A7B240CEB02FF70362108D00B9F6A48CF13704F0904A7E080E2190C27C0C4147AD
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6ED5116B
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 6ED511D8
                                        • GlobalFree.KERNEL32(?), ref: 6ED51286
                                        • GlobalFree.KERNEL32(00000000), ref: 6ED5129B
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3827765683.000000006ED51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6ED50000, based on PE: true
                                        • Associated: 00000001.00000002.3827733798.000000006ED50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827782933.000000006ED54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        • Associated: 00000001.00000002.3827798328.000000006ED56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_6ed50000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree
                                        • String ID:
                                        • API String ID: 3394109436-0
                                        • Opcode ID: a8e0514d9645a09d5c65412ba81561e5f189952dee4af5ce406af230c2b76653
                                        • Instruction ID: fa56a6f0b2433aedd9d52b27d81c547a2991ef60249322d3e0ccda133fd336d2
                                        • Opcode Fuzzy Hash: a8e0514d9645a09d5c65412ba81561e5f189952dee4af5ce406af230c2b76653
                                        • Instruction Fuzzy Hash: 01519E75504B06DFEF41CFA8C995B6A7BF8FB0A344B440859E555CB350D730E82ACB51
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                        • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.3804344879.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000001.00000002.3804320605.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804368987.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804391121.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000001.00000002.3804510730.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_400000_Order 00293884800595.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                        • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                        • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                        • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C