Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
debit-note-19-08-dn-2024.exe

Overview

General Information

Sample name:debit-note-19-08-dn-2024.exe
Analysis ID:1499056
MD5:5133f0baa9ab594674eae836fd1491c7
SHA1:389ab5a5e7ed520406265e0a1adc14d5ff478c4a
SHA256:e13fd3d42fb6c63fcf7780701282f760bd4aaa6ad1cdb55cc586e1aca8caaf2a
Tags:exe
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • debit-note-19-08-dn-2024.exe (PID: 6616 cmdline: "C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe" MD5: 5133F0BAA9AB594674EAE836FD1491C7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: debit-note-19-08-dn-2024.exe PID: 6616JoeSecurity_GuLoader_3Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: debit-note-19-08-dn-2024.exeReversingLabs: Detection: 50%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
    Source: debit-note-19-08-dn-2024.exeJoe Sandbox ML: detected
    Source: debit-note-19-08-dn-2024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: debit-note-19-08-dn-2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_004057D0 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004057D0
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_0040628B FindFirstFileW,FindClose,0_2_0040628B
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
    Source: debit-note-19-08-dn-2024.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_00405331 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405331
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083B2260 NtAllocateVirtualMemory,0_2_083B2260
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_0040335A EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcmpiW,CreateDirectoryW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_0040335A
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_00404B6E0_2_00404B6E
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_0040659D0_2_0040659D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083738190_2_08373819
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_08391E020_2_08391E02
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_08382A720_2_08382A72
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083735AA0_2_083735AA
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083AE29B0_2_083AE29B
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083B24C90_2_083B24C9
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083AEB330_2_083AEB33
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083815160_2_08381516
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_08382D170_2_08382D17
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083737710_2_08373771
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083AD3510_2_083AD351
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083735AA0_2_083735AA
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083ADF9A0_2_083ADF9A
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083AD9CB0_2_083AD9CB
    Source: debit-note-19-08-dn-2024.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal68.troj.evad.winEXE@1/10@0/0
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_00404635 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404635
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_0040206A CoCreateInstance,0_2_0040206A
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeFile created: C:\Users\user\brugerlicensaftalerneJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeFile created: C:\Users\user\AppData\Local\Temp\nsq44F0.tmpJump to behavior
    Source: debit-note-19-08-dn-2024.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: debit-note-19-08-dn-2024.exeReversingLabs: Detection: 50%
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeFile read: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeFile written: C:\Users\user\AppData\Local\Temp\tmc.iniJump to behavior
    Source: debit-note-19-08-dn-2024.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: Process Memory Space: debit-note-19-08-dn-2024.exe PID: 6616, type: MEMORYSTR
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_004062B2 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062B2
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1C7AF push 00000063h; ret 0_2_07F1C7B1
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083735AA push edx; iretd 0_2_0838013A
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F2135A push eax; iretd 0_2_07F2135B
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1D55C push cs; iretd 0_2_07F1D55D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1ED5C push cs; iretd 0_2_07F1ED5D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1FD5C push cs; iretd 0_2_07F1FD5D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F2055C push cs; iretd 0_2_07F2055D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1FB47 push cs; iretd 0_2_07F1FB5D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1EB4A push cs; iretd 0_2_07F1EB5D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F2034D push cs; iretd 0_2_07F2035D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1D11F pushfd ; ret 0_2_07F1D120
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083AC91E push es; iretd 0_2_083AC9E7
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_0838A55C push es; iretd 0_2_0838A5A2
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1F072 pushfd ; ret 0_2_07F1F07F
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F20878 pushfd ; retf 0_2_07F2087F
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F20466 pushfd ; iretd 0_2_07F2047F
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083735AA push edx; iretd 0_2_0838013A
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F20647 push cs; iretd 0_2_07F2065D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F2004A push cs; iretd 0_2_07F2005D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1E84A push cs; iretd 0_2_07F1E85D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1F84A push cs; iretd 0_2_07F1F85D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_07F1FE4A push cs; iretd 0_2_07F1FE5D
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeFile created: C:\Users\user\AppData\Local\Temp\nso4DFA.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeRDTSC instruction interceptor: First address: 837375C second address: 837375C instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F88E11DC97Fh 0x00000006 test dx, ax 0x00000009 inc ebp 0x0000000a cmp edi, 251CB53Ch 0x00000010 inc ebx 0x00000011 cmp ebx, ecx 0x00000013 rdtsc
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083735AA rdtsc 0_2_083735AA
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nso4DFA.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_004057D0 CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_004057D0
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_0040628B FindFirstFileW,FindClose,0_2_0040628B
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_00402770 FindFirstFileW,0_2_00402770
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeAPI call chain: ExitProcess graph end nodegraph_0-6672
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeAPI call chain: ExitProcess graph end nodegraph_0-6677
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_083735AA rdtsc 0_2_083735AA
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_08373819 LdrInitializeThunk,0_2_08373819
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_004062B2 GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_004062B2
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_0838A55C mov eax, dword ptr fs:[00000030h]0_2_0838A55C
    Source: C:\Users\user\Desktop\debit-note-19-08-dn-2024.exeCode function: 0_2_00405F6A GetVersion,GetSystemDirectoryW,GetWindowsDirectoryW,SHGetSpecialFolderLocation,SHGetPathFromIDListW,CoTaskMemFree,lstrcatW,lstrlenW,0_2_00405F6A
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    DLL Side-Loading
    1
    Masquerading
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
    DLL Side-Loading
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Obfuscated Files or Information
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    debit-note-19-08-dn-2024.exe50%ReversingLabsWin32.Trojan.Guloader
    debit-note-19-08-dn-2024.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nso4DFA.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrordebit-note-19-08-dn-2024.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1499056
    Start date and time:2024-08-26 15:22:06 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 7m 10s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:4
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:debit-note-19-08-dn-2024.exe
    Detection:MAL
    Classification:mal68.troj.evad.winEXE@1/10@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 52
    • Number of non-executed functions: 46
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
    • Excluded IPs from analysis (whitelisted): 20.190.159.71, 20.190.159.23, 40.126.31.73, 20.190.159.68, 20.190.159.64, 40.126.31.67, 40.126.31.71, 20.190.159.2
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
    • VT rate limit hit for: debit-note-19-08-dn-2024.exe
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nso4DFA.tmp\System.dllHE9306_AWBLaser_Single240812144358.exeGet hashmaliciousGuLoaderBrowse
      HE9306_AWBLaser_Single240812144358.exeGet hashmaliciousGuLoaderBrowse
        z41_EX24-772_24.exeGet hashmaliciousGuLoaderBrowse
          z41_EX24-772_24.exeGet hashmaliciousGuLoaderBrowse
            _EX24-772_24341300EX00314559_ARI TEKST#U0130L_KontrolCiktisiEkliListe.exeGet hashmaliciousFormBook, GuLoaderBrowse
              _EX24-772_24341300EX00314559_ARI TEKST#U0130L_KontrolCiktisiEkliListe.exeGet hashmaliciousGuLoaderBrowse
                PROJRCTS_INQUIRY_SPECIFICATIONS_DRAWING_SAMPLES.exeGet hashmaliciousGuLoaderBrowse
                  PROJRCTS_INQUIRY_SPECIFICATIONS_DRAWING_SAMPLES.exeGet hashmaliciousGuLoaderBrowse
                    2024090533201.exeGet hashmaliciousRemcos, GuLoaderBrowse
                      2024090533201.exeGet hashmaliciousGuLoaderBrowse
                        Process:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):49
                        Entropy (8bit):4.75216571132969
                        Encrypted:false
                        SSDEEP:3:a6QLQIfLBJXlFGfv:xQkIPeH
                        MD5:797DA95245047A54F125FBF3B19FA295
                        SHA1:9E46F51C033836343C4099609F35B9B62C290A00
                        SHA-256:A047914D1DB23829E36D3A2A908D83F4B51F5A8194AE090BB9F9AB9F8DDA9128
                        SHA-512:4755C72A469C7C816D7B4A08BFEABFC266AAD029156A301E2592E3AFD16C5DB5FCE44C4475CB83C43B859A06AD069370182FCA5CAFACF4A27D191F4C0AE34A03
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:[Loading]..Start=user32::EnumWindows(i r2 ,i 0)..
                        Process:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):11776
                        Entropy (8bit):5.656006343879828
                        Encrypted:false
                        SSDEEP:192:eP24sihno00Wfl97nH6T2enXwWobpWBTU4VtHT7dmN35OlbSl:T8QIl975eXqlWBrz7YLOlb
                        MD5:3E6BF00B3AC976122F982AE2AADB1C51
                        SHA1:CAAB188F7FDC84D3FDCB2922EDEEB5ED576BD31D
                        SHA-256:4FF9B2678D698677C5D9732678F9CF53F17290E09D053691AAC4CC6E6F595CBE
                        SHA-512:1286F05E6A7E6B691F6E479638E7179897598E171B52EB3A3DC0E830415251069D29416B6D1FFC6D7DCE8DA5625E1479BE06DB9B7179E7776659C5C1AD6AA706
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: HE9306_AWBLaser_Single240812144358.exe, Detection: malicious, Browse
                        • Filename: HE9306_AWBLaser_Single240812144358.exe, Detection: malicious, Browse
                        • Filename: z41_EX24-772_24.exe, Detection: malicious, Browse
                        • Filename: z41_EX24-772_24.exe, Detection: malicious, Browse
                        • Filename: _EX24-772_24341300EX00314559_ARI TEKST#U0130L_KontrolCiktisiEkliListe.exe, Detection: malicious, Browse
                        • Filename: _EX24-772_24341300EX00314559_ARI TEKST#U0130L_KontrolCiktisiEkliListe.exe, Detection: malicious, Browse
                        • Filename: PROJRCTS_INQUIRY_SPECIFICATIONS_DRAWING_SAMPLES.exe, Detection: malicious, Browse
                        • Filename: PROJRCTS_INQUIRY_SPECIFICATIONS_DRAWING_SAMPLES.exe, Detection: malicious, Browse
                        • Filename: 2024090533201.exe, Detection: malicious, Browse
                        • Filename: 2024090533201.exe, Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L....n3T...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..b....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):425059
                        Entropy (8bit):6.492264923451216
                        Encrypted:false
                        SSDEEP:6144:qRP7Sfw7mc55PPLrSwwPxUEf9BUWrTQAyCY4xZyL4i/yrlmh2suWOOufV5a:4P7IcLNwHUWnO4fyL4jrlmhbuXC
                        MD5:56074DE62B2FE4CCC5906532BF729C62
                        SHA1:352E7F71C32F6B974CEE9BE59DCBEA1257EB37BD
                        SHA-256:A7022A661A55C0679DF510D460786911EF9DCF090AB0E2BFDF2AEB5776DF1623
                        SHA-512:E84667D77854B3996F75FE36F5B49B2FE99AB487FC90F32D45C10A0CDBD432167858F954013EAD56ED23FA386B860E15DCBD205631B40E8872713356FC5B3F08
                        Malicious:false
                        Reputation:low
                        Preview:f.......,...................[...................f...........................................................................................................................................................................................................................................G...J...........e...j.........................................................................................................................................../...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):27
                        Entropy (8bit):4.134336113194451
                        Encrypted:false
                        SSDEEP:3:iGAeSMn:lAeZ
                        MD5:7AB6006A78C23C5DEC74C202B85A51A4
                        SHA1:C0FF9305378BE5EC16A18127C171BB9F04D5C640
                        SHA-256:BDDCBC9F6E35E10FA203E176D28CDB86BA3ADD97F2CFFD2BDA7A335B1037B71D
                        SHA-512:40464F667E1CDF9D627642BE51B762245FA62097F09D3739BF94728BC9337E8A296CE4AC18380B1AED405ADB72435A2CD915E3BC37F6840F34781028F3D8AED6
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:[Access]..Setting=Enabled..
                        Process:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):13390
                        Entropy (8bit):4.527773348664665
                        Encrypted:false
                        SSDEEP:192:ZIh2g9y8px5TSdP6V5kT+kU3Dr9W2jEk+SlVUDVN:ah2gwQ5TSF6PktgDrQaHDK
                        MD5:2A2EBC2FA44FD1D75481C6CAAB1695E4
                        SHA1:5A59085A600674418CCFD1B81F6CB58A062D94A7
                        SHA-256:3A505BAA89729E166CF0173A702F15DC34592872BDF6A69105D4DC5677DE21CF
                        SHA-512:200377184F413650F690D424565B7DEE8DEDBB9E58CC84666BA027C5ABF1EBBC6B75BA8BE697F07F1514C1FEDAAB044A532B5BC93D81A9EDBA466F0E1CBE58CD
                        Malicious:false
                        Reputation:low
                        Preview:.....JJJ.........y.........WWW......................NN..>.??.@@........9.......22......Z...I...k...e...r..>n...e...l...3...2...:.**:...C...r...e...a...t.X.e..>F..Zi...l...e...A...(...m... ...r...4... ...,..$ ...i... ...0...x..F8...0...0...0...0...0..^0...0...,... ...i... ...0...,... ...p.OO ...0...,... ...i... ...4...,... ...i... ...0..9x.W.8..t0...,.GG ...i.s. ...0...)...i.......r...8...q...k.I.e...r...n...e.J.l...3...2...:.yy:..VS.3.e...t...F...i...l...e...P...o..[i...n...t...e...r...(...i... ...r...8...,... ..Vi... ...2...3...0...1...2... ...,... ...i... ...0..L,...i... ...0...)...i.......r...4...q...k...e..^r...n...e...l...3...2...:...:...V...i...r...t...u...a...l...A...l...l...o...c...(...i... ...0...,...i... ..{7...0...5...6...5..@8..*8...8...,... ...i..< ...0...x...3...0...0...0..s,... ...i..* ...0..Ox...4...0..=)...p.......r...2...q...k..ye...r...n...e...l...3...2...:...:...R.>.e...a...d...F.||i...l...e...(...i... .D.r...8.SS,... ...i... ...r...2...,... ...i... ...7...0...5...6
                        Process:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):485
                        Entropy (8bit):4.232571417138926
                        Encrypted:false
                        SSDEEP:12:ZvQJDLIkJHTjbxleUuXCrM+loDMsjHoIIFVVUIgib:ZvQvzjlleUuXso9ZWVy6
                        MD5:3AF0252A9A2814A66060B5602FEFB22A
                        SHA1:C03E5A75AC4B95C5FC3631EA80E3182FBAD4F03B
                        SHA-256:2467A15368DFEDFB6156E0C02D2A958DBB18456051665A317CB7628E32FB046F
                        SHA-512:3E0CF8FB7D600FD0E228A24163A54F7820B8575AE2D49C048A0D16A923716AF7AD868C4951C09D2C941EABDF9E6EDA081C16A68338BCFDD46CC5A682EC82ED10
                        Malicious:false
                        Reputation:low
                        Preview:tomandstelte haggling hunknsvsens faq indulgentness dermestid daabsfadene spillereglernes hngerv..aktieprotokols overenskomststridige moonwort exion dolkestdslegender.otomian steading thoracomelus spaltedefinitionernes paracelsist stikkel urkokkens disuses sunniest counterlighted spadeformede depreciative coset..snnekonens soundings karotiner dutte.scoparin unglittery bdestraffes land synkefrdig kadaya..tildragelsers fjerkrfarmenes trailerite differentialize plejeforldre concaves.
                        Process:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):34424
                        Entropy (8bit):3.2127370751221456
                        Encrypted:false
                        SSDEEP:768:XeemGABJJ8rAL0xf2NDjhS8t5L/bKNEwLeRmQTid9:XeXfBJarAL0IlVSutjed9
                        MD5:357C239C8A128101281301765FAE888E
                        SHA1:C06BA64C77BA6E06E4AEF81076946E2E14475719
                        SHA-256:BDFD76CAC29B8F8C3852AE9332E26BAD07838999BC81F50A05CC9513A5DF661F
                        SHA-512:A2B185AF74AAAB903DC7B34FB7C9017D01FA44F0FDB903E3FB68EEE88F783AD5DC9D73731A37B181C911C036950BE193794105250BC277F9F7A38ED0DCDA81A5
                        Malicious:false
                        Reputation:low
                        Preview:................z.-...............,..........s.....+.......@..,.......+n.$........f....H.........u..y..................t.......]...............$..........................|..............<'........n.........RD.......vk...................b.....g........+..........&t...8....&......6.$'...,.............v.0........................e...]./.........,...............................@..G.............../................................-....8.........l.............&S..e...............%.........[|.....A............j.....%............r..........l...........................:.....f7.................................[.......................M.............................g.....n...................h......................7...............1...D...............!....0....b.........!..}.......4......................H...........a......0......................rzG......$.....ty.[..8....t..........................ix[... ..#X~.....................Z_................ ............b.....W...Hq................9....2......
                        Process:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):284395
                        Entropy (8bit):7.494018575020684
                        Encrypted:false
                        SSDEEP:6144:nfw7mc55PPLrSwwPxUEf9BUWrTQAyCY4xZyL4i/yrlmh2sr:fcLNwHUWnO4fyL4jrlmhbr
                        MD5:9CFDB6FACB7D10B9AA1C82CDBB445F33
                        SHA1:391C6DBE051F1ABD8B77D8627C9883E9392485AC
                        SHA-256:0171AB74E03848F6A071617FCC12849E3A61BD966A74A3C94796B7C8041BDA53
                        SHA-512:6C4DAB89FDEDDFB1DA2976EE33B7FE315763CC117351CEC59F0B2E0804B06EA543E0552DF5C2BC987D277B938F9B1DA42A857E63E2FC162CE84B47918C496A46
                        Malicious:false
                        Preview:.....vv......P.X......)))........ii............a......................S..........%%..........;;;;.......................................mmm...^^......"".p........j.........!....HH........XX.........FF..........e........ccccc......v......................bb..{.....[..............h..........n.........HH...............$$$$...............4....X.aa..................Q.@......22.........)................V.................888888....................................###...[[...'........................||.qq....ccc.................................555..........KKK.......=..<.^^..F............{{.^....U...................==.3........................666...".P..-.............%%%............{{{{{{{...11........T...............................................44444.....B...........ll.=.....................X.....................\.....0000..........f........K...hh...........SS.........;.E.N..........._.''..z....l.......T..!!.ww.......777.............A......................W.Q...../...........R.oo..K..NNN.0..
                        Process:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        File Type:DIY-Thermocam raw data (Lepton 3.x), scale 211-0, spot sensor temperature -2251799813685248.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8589934592.000000
                        Category:dropped
                        Size (bytes):46432
                        Entropy (8bit):3.2136461621363517
                        Encrypted:false
                        SSDEEP:768:ASGyNzhlBd5sdPN1A1Qh0prboupWEK6zFx+UHd:n7lBd5QNw9ok/Fx39
                        MD5:AE7B67A58B022BEFCC6C3B1922A12AE3
                        SHA1:ADBF63E7714B4968A236C3BFDC6EBB1ED24DD996
                        SHA-256:6EE65A08717947BA0023F0ABC4E60A08E1A638C067D8DCC9CA7B0645859D916F
                        SHA-512:712018BDF5981A0601728BF4FC2A27971F13E0DAC6AA4774957B91D9631DBCF81B66B85D4216ABA34B243DBD0402FB7BFB11A92B3566278CA7DAC057C1A455CC
                        Malicious:false
                        Preview:......._h1....................Q.................Z........*..a.....!...........W8........%..w.................G........................7.......... .7......e..........................................s...'.....................................y............&i..................H........:...........`....d....%@S.|~....T.........<....4...................j..................................................E...N...e.....x.k...5X........................7.........O-.................................Y."...!.......-................o......4........n..d.................f......./........................7......V...>.....y...C......<.......-.......................4........................)..............................&.w........./.3..........n..u...;......Ad......E...~.....o...~..................................w.................c........."..........\......B..x.........|...>..B.............................0.....E......."...................rB.................................?.............*.......4.xP....
                        Process:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):26080
                        Entropy (8bit):3.20612396093193
                        Encrypted:false
                        SSDEEP:384:p7ctcY4i68lGFjVq4cPpf3NNMG63AzpZWoI64ICEaHFf8CXvRU:pgtgrsGFY4Q3DL63AzpZc+s00pU
                        MD5:6843BC02ED836FABDD0C402C93BD6070
                        SHA1:8CA940C30AAFD3E2B41A54A98E3359A7E70F6F01
                        SHA-256:E8500F97DC807D1A6FFA7D6EC3001C51281398B6BA21DFB66418D4D193E31FFB
                        SHA-512:8995001C1662F7D4BD43EBF2DA40AC17513419FC150901E45E14A72EEF58A032D1F70CAFFED893BEF0AB360968BD132472D2171B3C3C790D8796DAA4A34E2E59
                        Malicious:false
                        Preview:.........`...................'...2........... .#.................8.................x........&....=.......F...."..........x.+....0e.T..........................)........K........z.R..Y....Qr.......................+..........>.$.%....,..5................S....zg.....'.....$......+..D..................M........s........3.....................X...........F.......................D..........................v....3....E.....A....._...................................`............ ....i.....................Q.........._........................C.E...T................................N.....I{.......F......*..4....k................................................x....[......L........................*................#..xt.3......J..................................4....6................................^..R......_...........}..|....._......................8......./..............................................U...............G................u.2..........o.......&........+.........M..............;........
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.93777579175851
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:debit-note-19-08-dn-2024.exe
                        File size:330'962 bytes
                        MD5:5133f0baa9ab594674eae836fd1491c7
                        SHA1:389ab5a5e7ed520406265e0a1adc14d5ff478c4a
                        SHA256:e13fd3d42fb6c63fcf7780701282f760bd4aaa6ad1cdb55cc586e1aca8caaf2a
                        SHA512:0b1be90e58591907084f7262c60b0fb92de18bce2ad5e47aaa3592a9795a7c4d0fd4301c58427588361ac626cd19f59ba1c362b41765765e0b3d1e093fe427e3
                        SSDEEP:6144:XW+7+eMMKlVXkYuF6ECJ4D3aJ6SXfBBJEh3LO3Arcp:XRLKlVXREC2qJLX/JU3yz
                        TLSH:7B6412427ACBC13AFBC25A30DB66DE7AF2B6D604052603473F216FF52931286C569367
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1.D9u.*ju.*ju.*j..ujw.*ju.+j..*j..wjd.*j!..j..*j..,jt.*jRichu.*j........PE..L....n3T.................`...*......Z3.......p....@
                        Icon Hash:3d2e0f95332b3399
                        Entrypoint:0x40335a
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x54336EB4 [Tue Oct 7 04:40:20 2014 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:e221f4f7d36469d53810a4b5f9fc8966
                        Instruction
                        sub esp, 000002D8h
                        push ebx
                        push ebp
                        push esi
                        push edi
                        push 00000020h
                        xor ebp, ebp
                        pop esi
                        mov dword ptr [esp+18h], ebp
                        mov dword ptr [esp+10h], 00409230h
                        mov dword ptr [esp+14h], ebp
                        call dword ptr [00407034h]
                        push 00008001h
                        call dword ptr [004070BCh]
                        push ebp
                        call dword ptr [004072ACh]
                        push 00000009h
                        mov dword ptr [004292B8h], eax
                        call 00007F88E0B836BAh
                        mov dword ptr [00429204h], eax
                        push ebp
                        lea eax, dword ptr [esp+38h]
                        push 000002B4h
                        push eax
                        push ebp
                        push 004206A8h
                        call dword ptr [0040717Ch]
                        push 0040937Ch
                        push 00428200h
                        call 00007F88E0B83325h
                        call dword ptr [00407134h]
                        mov ebx, 00434000h
                        push eax
                        push ebx
                        call 00007F88E0B83313h
                        push ebp
                        call dword ptr [0040710Ch]
                        push 00000022h
                        mov dword ptr [00429200h], eax
                        pop edi
                        mov eax, ebx
                        cmp word ptr [00434000h], di
                        jne 00007F88E0B807A9h
                        mov esi, edi
                        mov eax, 00434002h
                        push esi
                        push eax
                        call 00007F88E0B82D63h
                        push eax
                        call dword ptr [00407240h]
                        mov ecx, eax
                        mov dword ptr [esp+1Ch], ecx
                        jmp 00007F88E0B8089Bh
                        push 00000020h
                        pop edx
                        cmp ax, dx
                        jne 00007F88E0B807A9h
                        inc ecx
                        inc ecx
                        cmp word ptr [ecx], dx
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x74940xb4.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4d0000xb10.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x70000x2b8.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x5ec60x600060ec0c4d80dd6821cdaced6135eddfd5False0.6593424479166666data6.438901783265187IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x70000x13540x14002222fe44ebbadbc32af32dfc9c88e48eFalse0.4306640625data5.037511188789184IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x90000x202f80x60099cdd6cde9adee6bf3b24ee817b4574bFalse0.4830729166666667data3.8340327961758165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x2a0000x230000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x4d0000xb100xc00254b81c9e7cdc6038a0abfd972e7779cFalse0.4134114583333333data4.250827316191816IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x4d1c00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.42473118279569894
                        RT_DIALOG0x4d4a80x100dataEnglishUnited States0.5234375
                        RT_DIALOG0x4d5a80x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x4d6c80xc4dataEnglishUnited States0.5918367346938775
                        RT_DIALOG0x4d7900x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x4d7f00x14dataEnglishUnited States1.2
                        RT_MANIFEST0x4d8080x305XML 1.0 document, ASCII text, with very long lines (773), with no line terminatorsEnglishUnited States0.5614489003880984
                        DLLImport
                        KERNEL32.dllCompareFileTime, SearchPathW, SetFileTime, CloseHandle, GetShortPathNameW, MoveFileW, SetCurrentDirectoryW, GetFileAttributesW, GetLastError, GetFullPathNameW, CreateDirectoryW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, CopyFileW, ExitProcess, SetEnvironmentVariableW, GetWindowsDirectoryW, SetFileAttributesW, ExpandEnvironmentStringsW, SetErrorMode, LoadLibraryW, lstrlenW, lstrcpynW, GetDiskFreeSpaceW, GlobalUnlock, GlobalLock, CreateThread, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, lstrcpyA, lstrcpyW, lstrcatW, GetSystemDirectoryW, GetVersion, GetProcAddress, LoadLibraryA, GetModuleHandleA, GetModuleHandleW, lstrcmpiW, lstrcmpW, WaitForSingleObject, GlobalFree, GlobalAlloc, LoadLibraryExW, GetExitCodeProcess, FreeLibrary, WritePrivateProfileStringW, GetCommandLineW, GetTempPathW, GetPrivateProfileStringW, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, MulDiv, MultiByteToWideChar, WriteFile, lstrlenA, WideCharToMultiByte
                        USER32.dllEndDialog, ScreenToClient, GetWindowRect, RegisterClassW, EnableMenuItem, GetSystemMenu, SetClassLongW, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, wsprintfW, CreateWindowExW, SystemParametersInfoW, AppendMenuW, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, GetDC, SetWindowLongW, LoadImageW, SendMessageTimeoutW, FindWindowExW, EmptyClipboard, OpenClipboard, TrackPopupMenu, EndPaint, ShowWindow, GetDlgItem, IsWindow, SetForegroundWindow
                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                        SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, ShellExecuteW, SHFileOperationW
                        ADVAPI32.dllRegCloseKey, RegOpenKeyExW, RegDeleteKeyW, RegDeleteValueW, RegEnumValueW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                        ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                        VERSION.dllGetFileVersionInfoSizeW, GetFileVersionInfoW, VerQueryValueW
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:09:23:04
                        Start date:26/08/2024
                        Path:C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"
                        Imagebase:0x400000
                        File size:330'962 bytes
                        MD5 hash:5133F0BAA9AB594674EAE836FD1491C7
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:12.6%
                          Dynamic/Decrypted Code Coverage:28.1%
                          Signature Coverage:28.5%
                          Total number of Nodes:1820
                          Total number of Limit Nodes:46
                          execution_graph 7179 10001000 7182 1000101b 7179->7182 7189 10001516 7182->7189 7184 10001020 7185 10001024 7184->7185 7186 10001027 GlobalAlloc 7184->7186 7187 1000153d 3 API calls 7185->7187 7186->7185 7188 10001019 7187->7188 7191 1000151c 7189->7191 7190 10001522 7190->7184 7191->7190 7192 1000152e GlobalFree 7191->7192 7192->7184 7573 401d41 GetDC GetDeviceCaps 7574 402b1d 18 API calls 7573->7574 7575 401d5f MulDiv ReleaseDC 7574->7575 7576 402b1d 18 API calls 7575->7576 7577 401d7e 7576->7577 7578 405f6a 18 API calls 7577->7578 7579 401db7 CreateFontIndirectW 7578->7579 7580 4024e8 7579->7580 5838 403cc2 5839 403e15 5838->5839 5840 403cda 5838->5840 5842 403e66 5839->5842 5843 403e26 GetDlgItem GetDlgItem 5839->5843 5840->5839 5841 403ce6 5840->5841 5845 403cf1 SetWindowPos 5841->5845 5846 403d04 5841->5846 5844 403ec0 5842->5844 5855 401389 2 API calls 5842->5855 5847 40419a 19 API calls 5843->5847 5869 403e10 5844->5869 5908 4041e6 5844->5908 5845->5846 5850 403d21 5846->5850 5851 403d09 ShowWindow 5846->5851 5848 403e50 SetClassLongW 5847->5848 5852 40140b 2 API calls 5848->5852 5853 403d43 5850->5853 5854 403d29 DestroyWindow 5850->5854 5851->5850 5852->5842 5856 403d48 SetWindowLongW 5853->5856 5857 403d59 5853->5857 5907 404123 5854->5907 5858 403e98 5855->5858 5856->5869 5860 403e02 5857->5860 5861 403d65 GetDlgItem 5857->5861 5858->5844 5862 403e9c SendMessageW 5858->5862 5859 404125 DestroyWindow EndDialog 5859->5907 5945 404201 5860->5945 5864 403d95 5861->5864 5865 403d78 SendMessageW IsWindowEnabled 5861->5865 5862->5869 5863 40140b 2 API calls 5875 403ed2 5863->5875 5870 403da2 5864->5870 5872 403de9 SendMessageW 5864->5872 5873 403db5 5864->5873 5881 403d9a 5864->5881 5865->5864 5865->5869 5867 404154 ShowWindow 5867->5869 5870->5872 5870->5881 5872->5860 5876 403dd2 5873->5876 5877 403dbd 5873->5877 5874 403dd0 5874->5860 5875->5859 5875->5863 5875->5869 5878 40419a 19 API calls 5875->5878 5898 404065 DestroyWindow 5875->5898 5911 405f6a 5875->5911 5929 40419a 5875->5929 5879 40140b 2 API calls 5876->5879 5939 40140b 5877->5939 5878->5875 5882 403dd9 5879->5882 5942 404173 5881->5942 5882->5860 5882->5881 5884 403f4d GetDlgItem 5885 403f62 5884->5885 5886 403f6a ShowWindow KiUserCallbackDispatcher 5884->5886 5885->5886 5932 4041bc KiUserCallbackDispatcher 5886->5932 5888 403f94 EnableWindow 5892 403fa8 5888->5892 5889 403fad GetSystemMenu EnableMenuItem SendMessageW 5890 403fdd SendMessageW 5889->5890 5889->5892 5890->5892 5892->5889 5933 4041cf SendMessageW 5892->5933 5934 405f48 lstrcpynW 5892->5934 5894 40400b lstrlenW 5895 405f6a 18 API calls 5894->5895 5896 404021 SetWindowTextW 5895->5896 5935 401389 5896->5935 5899 40407f CreateDialogParamW 5898->5899 5898->5907 5900 4040b2 5899->5900 5899->5907 5901 40419a 19 API calls 5900->5901 5902 4040bd GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5901->5902 5903 401389 2 API calls 5902->5903 5904 404103 5903->5904 5904->5869 5905 40410b ShowWindow 5904->5905 5906 4041e6 SendMessageW 5905->5906 5906->5907 5907->5867 5907->5869 5909 4041fe 5908->5909 5910 4041ef SendMessageW 5908->5910 5909->5875 5910->5909 5926 405f77 5911->5926 5912 4061c2 5913 4061d8 5912->5913 5975 405f48 lstrcpynW 5912->5975 5913->5875 5915 40602a GetVersion 5915->5926 5916 406190 lstrlenW 5916->5926 5917 405f6a 10 API calls 5917->5916 5920 4060a5 GetSystemDirectoryW 5920->5926 5922 4060b8 GetWindowsDirectoryW 5922->5926 5924 405f6a 10 API calls 5924->5926 5925 406131 lstrcatW 5925->5926 5926->5912 5926->5915 5926->5916 5926->5917 5926->5920 5926->5922 5926->5924 5926->5925 5927 4060ec SHGetSpecialFolderLocation 5926->5927 5959 405e15 RegOpenKeyExW 5926->5959 5964 4061dc 5926->5964 5973 405e8f wsprintfW 5926->5973 5974 405f48 lstrcpynW 5926->5974 5927->5926 5928 406104 SHGetPathFromIDListW CoTaskMemFree 5927->5928 5928->5926 5930 405f6a 18 API calls 5929->5930 5931 4041a5 SetDlgItemTextW 5930->5931 5931->5884 5932->5888 5933->5892 5934->5894 5937 401390 5935->5937 5936 4013fe 5936->5875 5937->5936 5938 4013cb MulDiv SendMessageW 5937->5938 5938->5937 5940 401389 2 API calls 5939->5940 5941 401420 5940->5941 5941->5881 5943 404180 SendMessageW 5942->5943 5944 40417a 5942->5944 5943->5874 5944->5943 5946 4042a2 5945->5946 5947 404219 GetWindowLongW 5945->5947 5946->5869 5947->5946 5948 40422a 5947->5948 5949 404239 GetSysColor 5948->5949 5950 40423c 5948->5950 5949->5950 5951 404242 SetTextColor 5950->5951 5952 40424c SetBkMode 5950->5952 5951->5952 5953 404264 GetSysColor 5952->5953 5954 40426a 5952->5954 5953->5954 5955 404271 SetBkColor 5954->5955 5956 40427b 5954->5956 5955->5956 5956->5946 5957 404295 CreateBrushIndirect 5956->5957 5958 40428e DeleteObject 5956->5958 5957->5946 5958->5957 5960 405e89 5959->5960 5961 405e49 RegQueryValueExW 5959->5961 5960->5926 5962 405e6a RegCloseKey 5961->5962 5962->5960 5971 4061e9 5964->5971 5965 40625f 5966 406264 CharPrevW 5965->5966 5969 406285 5965->5969 5966->5965 5967 406252 CharNextW 5967->5965 5967->5971 5969->5926 5970 40623e CharNextW 5970->5971 5971->5965 5971->5967 5971->5970 5972 40624d CharNextW 5971->5972 5976 4059c0 5971->5976 5972->5967 5973->5926 5974->5926 5975->5913 5977 4059c6 5976->5977 5978 4059dc 5977->5978 5979 4059cd CharNextW 5977->5979 5978->5971 5979->5977 7193 401a42 7194 402b1d 18 API calls 7193->7194 7195 401a48 7194->7195 7196 402b1d 18 API calls 7195->7196 7197 4019f0 7196->7197 7401 401cc6 7402 402b1d 18 API calls 7401->7402 7403 401cd9 SetWindowLongW 7402->7403 7404 4029c7 7403->7404 7581 402746 7582 402741 7581->7582 7582->7581 7583 402756 FindNextFileW 7582->7583 7584 4027a8 7583->7584 7586 402761 7583->7586 7587 405f48 lstrcpynW 7584->7587 7587->7586 6156 401dc7 6164 402b1d 6156->6164 6158 401dcd 6159 402b1d 18 API calls 6158->6159 6160 401dd6 6159->6160 6161 401de8 EnableWindow 6160->6161 6162 401ddd ShowWindow 6160->6162 6163 4029c7 6161->6163 6162->6163 6165 405f6a 18 API calls 6164->6165 6166 402b31 6165->6166 6166->6158 7791 401bca 7792 402b1d 18 API calls 7791->7792 7793 401bd1 7792->7793 7794 402b1d 18 API calls 7793->7794 7795 401bdb 7794->7795 7796 401beb 7795->7796 7797 402b3a 18 API calls 7795->7797 7798 401bfb 7796->7798 7801 402b3a 18 API calls 7796->7801 7797->7796 7799 401c06 7798->7799 7800 401c4a 7798->7800 7802 402b1d 18 API calls 7799->7802 7803 402b3a 18 API calls 7800->7803 7801->7798 7804 401c0b 7802->7804 7805 401c4f 7803->7805 7806 402b1d 18 API calls 7804->7806 7807 402b3a 18 API calls 7805->7807 7808 401c14 7806->7808 7809 401c58 FindWindowExW 7807->7809 7810 401c3a SendMessageW 7808->7810 7811 401c1c SendMessageTimeoutW 7808->7811 7812 401c7a 7809->7812 7810->7812 7811->7812 7588 40194b 7589 402b1d 18 API calls 7588->7589 7590 401952 7589->7590 7591 402b1d 18 API calls 7590->7591 7592 40195c 7591->7592 7593 402b3a 18 API calls 7592->7593 7594 401965 7593->7594 7595 401979 lstrlenW 7594->7595 7596 4019b5 7594->7596 7597 401983 7595->7597 7597->7596 7601 405f48 lstrcpynW 7597->7601 7599 40199e 7599->7596 7600 4019ab lstrlenW 7599->7600 7600->7596 7601->7599 7408 4024cc 7409 402b3a 18 API calls 7408->7409 7410 4024d3 7409->7410 7413 405bb4 GetFileAttributesW CreateFileW 7410->7413 7412 4024df 7413->7412 7198 40164d 7199 402b3a 18 API calls 7198->7199 7200 401653 7199->7200 7201 40628b 2 API calls 7200->7201 7202 401659 7201->7202 7813 4019cf 7814 402b3a 18 API calls 7813->7814 7815 4019d6 7814->7815 7816 402b3a 18 API calls 7815->7816 7817 4019df 7816->7817 7818 4019e6 lstrcmpiW 7817->7818 7819 4019f8 lstrcmpW 7817->7819 7820 4019ec 7818->7820 7819->7820 7203 401e51 7204 402b3a 18 API calls 7203->7204 7205 401e57 7204->7205 7206 4051f2 25 API calls 7205->7206 7207 401e61 7206->7207 7208 4056c3 2 API calls 7207->7208 7209 401e67 7208->7209 7210 401ec6 CloseHandle 7209->7210 7211 401e77 WaitForSingleObject 7209->7211 7213 402793 7209->7213 7210->7213 7212 401e89 7211->7212 7214 401e9b GetExitCodeProcess 7212->7214 7215 4062eb 2 API calls 7212->7215 7216 401eb8 7214->7216 7217 401ead 7214->7217 7218 401e90 WaitForSingleObject 7215->7218 7216->7210 7220 405e8f wsprintfW 7217->7220 7218->7212 7220->7216 6309 401752 6310 402b3a 18 API calls 6309->6310 6311 401759 6310->6311 6312 401781 6311->6312 6313 401779 6311->6313 6350 405f48 lstrcpynW 6312->6350 6349 405f48 lstrcpynW 6313->6349 6316 40177f 6319 4061dc 5 API calls 6316->6319 6317 40178c 6318 405993 3 API calls 6317->6318 6320 401792 lstrcatW 6318->6320 6341 40179e 6319->6341 6320->6316 6321 40628b 2 API calls 6321->6341 6322 4017da 6323 405b8f 2 API calls 6322->6323 6323->6341 6325 4017b0 CompareFileTime 6325->6341 6326 401870 6327 4051f2 25 API calls 6326->6327 6329 40187a 6327->6329 6328 401847 6330 4051f2 25 API calls 6328->6330 6336 40185c 6328->6336 6331 403062 46 API calls 6329->6331 6330->6336 6332 40188d 6331->6332 6333 4018a1 SetFileTime 6332->6333 6335 4018b3 FindCloseChangeNotification 6332->6335 6333->6335 6334 405f6a 18 API calls 6334->6341 6335->6336 6337 4018c4 6335->6337 6339 4018c9 6337->6339 6340 4018dc 6337->6340 6338 405f48 lstrcpynW 6338->6341 6342 405f6a 18 API calls 6339->6342 6343 405f6a 18 API calls 6340->6343 6341->6321 6341->6322 6341->6325 6341->6326 6341->6328 6341->6334 6341->6338 6345 405724 MessageBoxIndirectW 6341->6345 6348 405bb4 GetFileAttributesW CreateFileW 6341->6348 6346 4018d1 lstrcatW 6342->6346 6344 4018e4 6343->6344 6344->6336 6347 405724 MessageBoxIndirectW 6344->6347 6345->6341 6346->6344 6347->6336 6348->6341 6349->6316 6350->6317 6351 402253 6352 40225b 6351->6352 6356 402261 6351->6356 6353 402b3a 18 API calls 6352->6353 6353->6356 6354 402b3a 18 API calls 6357 40226f 6354->6357 6355 40227d 6359 402b3a 18 API calls 6355->6359 6356->6354 6356->6357 6357->6355 6358 402b3a 18 API calls 6357->6358 6358->6355 6360 402286 WritePrivateProfileStringW 6359->6360 6374 402454 6384 402c44 6374->6384 6376 40245e 6377 402b1d 18 API calls 6376->6377 6378 402467 6377->6378 6379 40248b RegEnumValueW 6378->6379 6380 40247f RegEnumKeyW 6378->6380 6382 402793 6378->6382 6381 4024a4 RegCloseKey 6379->6381 6379->6382 6380->6381 6381->6382 6385 402b3a 18 API calls 6384->6385 6386 402c5d 6385->6386 6387 402c6b RegOpenKeyExW 6386->6387 6387->6376 7414 401ed4 7415 402b3a 18 API calls 7414->7415 7416 401edb 7415->7416 7417 40628b 2 API calls 7416->7417 7418 401ee1 7417->7418 7420 401ef2 7418->7420 7421 405e8f wsprintfW 7418->7421 7421->7420 6388 4022d5 6389 402305 6388->6389 6390 4022da 6388->6390 6391 402b3a 18 API calls 6389->6391 6392 402c44 19 API calls 6390->6392 6393 40230c 6391->6393 6394 4022e1 6392->6394 6400 402b7a RegOpenKeyExW 6393->6400 6395 4022eb 6394->6395 6399 402322 6394->6399 6396 402b3a 18 API calls 6395->6396 6398 4022f2 RegDeleteValueW RegCloseKey 6396->6398 6398->6399 6401 402c0e 6400->6401 6405 402ba5 6400->6405 6401->6399 6402 402bcb RegEnumKeyW 6403 402bdd RegCloseKey 6402->6403 6402->6405 6406 4062b2 3 API calls 6403->6406 6404 402c02 RegCloseKey 6410 402bf1 6404->6410 6405->6402 6405->6403 6405->6404 6407 402b7a 3 API calls 6405->6407 6408 402bed 6406->6408 6407->6405 6409 402c1d RegDeleteKeyW 6408->6409 6408->6410 6409->6410 6410->6401 6418 4014d7 6419 402b1d 18 API calls 6418->6419 6420 4014dd Sleep 6419->6420 6422 4029c7 6420->6422 6637 40335a #17 SetErrorMode OleInitialize 6638 4062b2 3 API calls 6637->6638 6639 40339d SHGetFileInfoW 6638->6639 6712 405f48 lstrcpynW 6639->6712 6641 4033c8 GetCommandLineW 6713 405f48 lstrcpynW 6641->6713 6643 4033da GetModuleHandleW 6644 4033f4 6643->6644 6645 4059c0 CharNextW 6644->6645 6646 403402 CharNextW 6645->6646 6656 403414 6646->6656 6647 403516 6648 40352a GetTempPathW 6647->6648 6714 403326 6648->6714 6650 403542 6651 403546 GetWindowsDirectoryW lstrcatW 6650->6651 6652 40359c DeleteFileW 6650->6652 6654 403326 11 API calls 6651->6654 6722 402dbc GetTickCount GetModuleFileNameW 6652->6722 6653 4059c0 CharNextW 6653->6656 6657 403562 6654->6657 6656->6647 6656->6653 6661 403518 6656->6661 6657->6652 6660 403566 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 6657->6660 6658 4035b0 6659 403663 6658->6659 6662 403653 6658->6662 6666 4059c0 CharNextW 6658->6666 6809 40382d 6659->6809 6665 403326 11 API calls 6660->6665 6806 405f48 lstrcpynW 6661->6806 6752 40391f 6662->6752 6669 403594 6665->6669 6680 4035cf 6666->6680 6669->6652 6669->6659 6670 403772 6672 403815 ExitProcess 6670->6672 6674 4062b2 3 API calls 6670->6674 6671 40367c 6673 405724 MessageBoxIndirectW 6671->6673 6677 40368a ExitProcess 6673->6677 6679 403785 6674->6679 6675 403692 lstrcatW lstrcmpiW 6675->6659 6682 4036ae CreateDirectoryW SetCurrentDirectoryW 6675->6682 6676 40362d 6681 405a9b 18 API calls 6676->6681 6683 4062b2 3 API calls 6679->6683 6680->6675 6680->6676 6684 403639 6681->6684 6685 4036d1 6682->6685 6686 4036c6 6682->6686 6688 40378e 6683->6688 6684->6659 6807 405f48 lstrcpynW 6684->6807 6819 405f48 lstrcpynW 6685->6819 6818 405f48 lstrcpynW 6686->6818 6690 4062b2 3 API calls 6688->6690 6692 403797 6690->6692 6696 4037b5 6692->6696 6701 4037a5 GetCurrentProcess 6692->6701 6693 403648 6808 405f48 lstrcpynW 6693->6808 6695 405f6a 18 API calls 6697 403710 DeleteFileW 6695->6697 6698 4062b2 3 API calls 6696->6698 6699 40371d CopyFileW 6697->6699 6709 4036df 6697->6709 6700 4037ec 6698->6700 6699->6709 6702 403801 ExitWindowsEx 6700->6702 6706 40380e 6700->6706 6701->6696 6702->6672 6702->6706 6703 403766 6704 405de2 40 API calls 6703->6704 6704->6659 6705 405de2 40 API calls 6705->6709 6707 40140b 2 API calls 6706->6707 6707->6672 6708 405f6a 18 API calls 6708->6709 6709->6695 6709->6703 6709->6705 6709->6708 6711 403751 CloseHandle 6709->6711 6820 4056c3 CreateProcessW 6709->6820 6711->6709 6712->6641 6713->6643 6715 4061dc 5 API calls 6714->6715 6717 403332 6715->6717 6716 40333c 6716->6650 6717->6716 6718 405993 3 API calls 6717->6718 6719 403344 CreateDirectoryW 6718->6719 6823 405be3 6719->6823 6827 405bb4 GetFileAttributesW CreateFileW 6722->6827 6724 402dff 6751 402e0c 6724->6751 6828 405f48 lstrcpynW 6724->6828 6726 402e22 6727 4059df 2 API calls 6726->6727 6728 402e28 6727->6728 6829 405f48 lstrcpynW 6728->6829 6730 402e33 GetFileSize 6731 402f34 6730->6731 6749 402e4a 6730->6749 6732 402d1a 33 API calls 6731->6732 6734 402f3b 6732->6734 6733 4032f9 ReadFile 6733->6749 6736 402f77 GlobalAlloc 6734->6736 6734->6751 6831 40330f SetFilePointer 6734->6831 6735 402fcf 6738 402d1a 33 API calls 6735->6738 6737 402f8e 6736->6737 6742 405be3 2 API calls 6737->6742 6738->6751 6740 402f58 6743 4032f9 ReadFile 6740->6743 6741 402d1a 33 API calls 6741->6749 6745 402f9f CreateFileW 6742->6745 6744 402f63 6743->6744 6744->6736 6744->6751 6746 402fd9 6745->6746 6745->6751 6830 40330f SetFilePointer 6746->6830 6748 402fe7 6750 403062 46 API calls 6748->6750 6749->6731 6749->6733 6749->6735 6749->6741 6749->6751 6750->6751 6751->6658 6753 4062b2 3 API calls 6752->6753 6754 403933 6753->6754 6755 403939 GetUserDefaultUILanguage 6754->6755 6756 40394b 6754->6756 6832 405e8f wsprintfW 6755->6832 6757 405e15 3 API calls 6756->6757 6760 40397b 6757->6760 6759 403949 6833 403bf5 6759->6833 6761 40399a lstrcatW 6760->6761 6762 405e15 3 API calls 6760->6762 6761->6759 6762->6761 6765 405a9b 18 API calls 6766 4039cc 6765->6766 6767 403a60 6766->6767 6770 405e15 3 API calls 6766->6770 6768 405a9b 18 API calls 6767->6768 6769 403a66 6768->6769 6771 403a76 LoadImageW 6769->6771 6773 405f6a 18 API calls 6769->6773 6772 4039fe 6770->6772 6774 403b1c 6771->6774 6775 403a9d RegisterClassW 6771->6775 6772->6767 6776 403a1f lstrlenW 6772->6776 6780 4059c0 CharNextW 6772->6780 6773->6771 6779 40140b 2 API calls 6774->6779 6777 403ad3 SystemParametersInfoW CreateWindowExW 6775->6777 6778 403b26 6775->6778 6781 403a53 6776->6781 6782 403a2d lstrcmpiW 6776->6782 6777->6774 6778->6659 6783 403b22 6779->6783 6784 403a1c 6780->6784 6786 405993 3 API calls 6781->6786 6782->6781 6785 403a3d GetFileAttributesW 6782->6785 6783->6778 6788 403bf5 19 API calls 6783->6788 6784->6776 6787 403a49 6785->6787 6789 403a59 6786->6789 6787->6781 6790 4059df 2 API calls 6787->6790 6791 403b33 6788->6791 6842 405f48 lstrcpynW 6789->6842 6790->6781 6793 403bc2 6791->6793 6794 403b3f ShowWindow LoadLibraryW 6791->6794 6795 4052c5 5 API calls 6793->6795 6796 403b65 GetClassInfoW 6794->6796 6797 403b5e LoadLibraryW 6794->6797 6800 403bc8 6795->6800 6798 403b79 GetClassInfoW RegisterClassW 6796->6798 6799 403b8f DialogBoxParamW 6796->6799 6797->6796 6798->6799 6801 40140b 2 API calls 6799->6801 6802 403be4 6800->6802 6803 403bcc 6800->6803 6801->6778 6804 40140b 2 API calls 6802->6804 6803->6778 6805 40140b 2 API calls 6803->6805 6804->6778 6805->6778 6806->6648 6807->6693 6808->6662 6810 403848 6809->6810 6811 40383e CloseHandle 6809->6811 6812 403852 CloseHandle 6810->6812 6813 40385c 6810->6813 6811->6810 6812->6813 6844 40388a 6813->6844 6816 4057d0 71 API calls 6817 40366c OleUninitialize 6816->6817 6817->6670 6817->6671 6818->6685 6819->6709 6821 4056f2 CloseHandle 6820->6821 6822 4056fe 6820->6822 6821->6822 6822->6709 6824 405bf0 GetTickCount GetTempFileNameW 6823->6824 6825 403358 6824->6825 6826 405c26 6824->6826 6825->6650 6826->6824 6826->6825 6827->6724 6828->6726 6829->6730 6830->6748 6831->6740 6832->6759 6834 403c09 6833->6834 6843 405e8f wsprintfW 6834->6843 6836 403c7a 6837 405f6a 18 API calls 6836->6837 6838 403c86 SetWindowTextW 6837->6838 6839 403ca2 6838->6839 6840 4039aa 6838->6840 6839->6840 6841 405f6a 18 API calls 6839->6841 6840->6765 6841->6839 6842->6767 6843->6836 6845 403898 6844->6845 6846 40389d FreeLibrary GlobalFree 6845->6846 6847 403861 6845->6847 6846->6846 6846->6847 6847->6816 7609 40155b 7610 40296d 7609->7610 7613 405e8f wsprintfW 7610->7613 7612 402972 7613->7612 6852 83735aa 6853 83735ea 6852->6853 6873 837fee3 6853->6873 6875 83b2a67 6853->6875 6856 83b246e 6961 83887c2 6856->6961 6858 83b247a 6975 83b24c9 6858->6975 6859 83736f7 6859->6859 6864 837fe94 6859->6864 6865 83ae28c 6859->6865 6868 837fd91 6859->6868 6863 83b24c7 6869 837fe6d 6864->6869 6870 837fef3 6864->6870 6864->6873 6927 8382a72 6864->6927 6884 8373771 6865->6884 6868->6864 6872 83ad980 6868->6872 6900 8381516 6868->6900 6871 837fef5 6870->6871 6943 8391e02 6870->6943 6873->6856 6957 83b2260 6873->6957 6876 83b225b 6875->6876 6877 83b2260 NtAllocateVirtualMemory 6876->6877 6878 83b2aaf 6876->6878 6879 83b246e 6876->6879 6877->6876 6878->6859 6880 83887c2 2 API calls 6879->6880 6881 83b247a 6880->6881 6882 83b24c9 2 API calls 6881->6882 6883 83b24c7 6882->6883 6992 83aeb33 6884->6992 6886 8373789 7016 83adf9a 6886->7016 6888 83737f8 6889 83adf9a 2 API calls 6888->6889 6890 837380b 6889->6890 6894 83b225b 6890->6894 7040 8373819 6890->7040 6891 83b2260 NtAllocateVirtualMemory 6891->6894 6893 83b246e 6896 83887c2 2 API calls 6893->6896 6894->6891 6894->6893 6895 83ae291 6894->6895 6897 83b247a 6896->6897 6898 83b24c9 2 API calls 6897->6898 6899 83b24c7 6898->6899 6904 837fd91 6900->6904 6911 838153d 6900->6911 6901 8381516 2 API calls 6901->6904 6902 8382a72 2 API calls 6903 837fe94 6902->6903 6903->6902 6905 837fe6d 6903->6905 6906 837fef3 6903->6906 6925 837fee3 6903->6925 6904->6901 6904->6903 6910 83ad980 6904->6910 6905->6868 6907 8391e02 2 API calls 6906->6907 6908 837fef5 6906->6908 6907->6908 6908->6868 6909 83b2260 NtAllocateVirtualMemory 6909->6925 6910->6868 6911->6903 6911->6925 7102 83ad9cb 6911->7102 6912 83b246e 6914 83887c2 2 API calls 6912->6914 6916 83b247a 6914->6916 6915 83816c6 6915->6925 7119 83ad93a 6915->7119 6918 83b24c9 2 API calls 6916->6918 6920 83b24c7 6918->6920 6919 8381754 7136 83ad351 6919->7136 6922 8381784 6922->6903 6923 83817d4 6922->6923 6924 83ad351 2 API calls 6923->6924 6924->6925 6925->6868 6925->6909 6925->6912 6926 83818d0 6925->6926 6926->6868 6928 8382d14 6927->6928 6929 8382a84 6927->6929 6928->6864 6931 83b2260 NtAllocateVirtualMemory 6928->6931 6932 83b246e 6928->6932 6930 83ad9cb 2 API calls 6929->6930 6936 8382ad2 6930->6936 6931->6928 6933 83887c2 2 API calls 6932->6933 6934 83b247a 6933->6934 6935 83b24c9 2 API calls 6934->6935 6937 83b24c7 6935->6937 6936->6928 6938 83ad351 2 API calls 6936->6938 6939 8382bb1 6938->6939 6939->6928 6940 8391e02 2 API calls 6939->6940 6941 8382c45 6940->6941 7156 8382d17 6941->7156 6944 8391df8 6943->6944 6944->6943 6945 8391fa3 6944->6945 6946 83adf9a 2 API calls 6944->6946 6950 8391e7d 6944->6950 6945->6871 6947 83b2260 NtAllocateVirtualMemory 6945->6947 6948 83b246e 6945->6948 6946->6950 6947->6945 6952 83887c2 2 API calls 6948->6952 6949 8391f06 6955 83adf9a 2 API calls 6949->6955 6950->6949 6951 83adf9a 2 API calls 6950->6951 6951->6949 6953 83b247a 6952->6953 6954 83b24c9 2 API calls 6953->6954 6956 83b24c7 6954->6956 6955->6945 6958 83b22ce 6957->6958 6959 83b2307 NtAllocateVirtualMemory 6958->6959 6960 83b2318 6959->6960 6962 837fe94 6961->6962 6963 8382a72 2 API calls 6962->6963 6964 837fe6d 6962->6964 6965 837fef3 6962->6965 6968 837fee3 6962->6968 6963->6962 6964->6858 6966 837fef5 6965->6966 6967 8391e02 2 API calls 6965->6967 6966->6858 6967->6966 6969 83b2260 NtAllocateVirtualMemory 6968->6969 6970 83b246e 6968->6970 6969->6968 6971 83887c2 2 API calls 6970->6971 6972 83b247a 6971->6972 6973 83b24c9 2 API calls 6972->6973 6974 83b24c7 6973->6974 6976 83b24e4 6975->6976 6978 837fee3 6975->6978 6976->6978 6979 837fe94 6976->6979 7171 838a55c GetPEB 6976->7171 6977 83b2260 NtAllocateVirtualMemory 6977->6978 6978->6977 6982 83b246e 6978->6982 6986 83b26bd 6978->6986 6979->6978 6980 8382a72 2 API calls 6979->6980 6984 837fe6d 6979->6984 6989 837fef3 6979->6989 6980->6979 6983 83887c2 2 API calls 6982->6983 6985 83b247a 6983->6985 6984->6863 6987 83b24c9 2 API calls 6985->6987 6988 83b24c7 6987->6988 6990 837fef5 6989->6990 6991 8391e02 2 API calls 6989->6991 6990->6863 6991->6990 6993 83aeb47 6992->6993 7009 837fee3 6992->7009 6997 837fe94 6993->6997 7001 83aebdc 6993->7001 7007 8391301 6993->7007 6994 83b2260 NtAllocateVirtualMemory 6994->7009 6995 83b246e 6996 83887c2 2 API calls 6995->6996 6998 83b247a 6996->6998 6999 8382a72 2 API calls 6997->6999 7003 837fe6d 6997->7003 7006 837fef3 6997->7006 6997->7009 7000 83b24c9 2 API calls 6998->7000 6999->6997 7002 83b24c7 7000->7002 7001->6997 7005 83aecce 7001->7005 7001->7009 7070 83aed45 7001->7070 7003->6886 7005->6886 7008 837fef5 7006->7008 7010 8391e02 2 API calls 7006->7010 7007->7009 7013 837fd91 7007->7013 7055 83b214b 7007->7055 7008->6886 7009->6886 7009->6994 7009->6995 7014 83ae468 7009->7014 7010->7008 7012 8381516 2 API calls 7012->7013 7013->6997 7013->7012 7015 83ad980 7013->7015 7014->6886 7015->6886 7018 837fee3 7016->7018 7019 83adfe8 7016->7019 7017 83b2260 NtAllocateVirtualMemory 7017->7018 7018->6888 7018->7017 7021 83b246e 7018->7021 7020 83aeb33 2 API calls 7019->7020 7025 83ae08d 7019->7025 7022 83ae07e 7020->7022 7023 83887c2 2 API calls 7021->7023 7082 83ae29b 7022->7082 7026 83b247a 7023->7026 7025->7018 7028 83ae1ca 7025->7028 7033 837fd91 7025->7033 7027 83b24c9 2 API calls 7026->7027 7029 83b24c7 7027->7029 7030 83ae29b 2 API calls 7028->7030 7030->7018 7031 8381516 2 API calls 7031->7033 7032 8382a72 2 API calls 7034 837fe94 7032->7034 7033->7031 7033->7034 7038 83ad980 7033->7038 7034->7018 7034->7032 7035 837fe6d 7034->7035 7036 837fef3 7034->7036 7035->6888 7037 837fef5 7036->7037 7039 8391e02 2 API calls 7036->7039 7037->6888 7038->6888 7039->7037 7042 837fe94 7040->7042 7052 837384b 7040->7052 7041 83b2260 NtAllocateVirtualMemory 7041->7052 7043 8382a72 2 API calls 7042->7043 7046 837fe6d 7042->7046 7051 837fef3 7042->7051 7042->7052 7043->7042 7044 83738e4 7045 83b246e 7047 83887c2 2 API calls 7045->7047 7046->6894 7048 83b247a 7047->7048 7049 83b24c9 2 API calls 7048->7049 7050 83b24c7 7049->7050 7053 837fef5 7051->7053 7054 8391e02 2 API calls 7051->7054 7052->7041 7052->7044 7052->7045 7053->6894 7054->7053 7056 837fe94 7055->7056 7058 83b2161 7055->7058 7057 8382a72 2 API calls 7056->7057 7059 837fe6d 7056->7059 7060 837fef3 7056->7060 7063 837fee3 7056->7063 7057->7056 7058->7007 7059->7007 7061 837fef5 7060->7061 7062 8391e02 2 API calls 7060->7062 7061->7007 7062->7061 7064 83b2260 NtAllocateVirtualMemory 7063->7064 7065 83b246e 7063->7065 7064->7063 7066 83887c2 2 API calls 7065->7066 7067 83b247a 7066->7067 7068 83b24c9 2 API calls 7067->7068 7069 83b24c7 7068->7069 7072 83aed72 7070->7072 7073 83aee57 7072->7073 7074 83aee5a 7072->7074 7073->7001 7075 83aee8c 7074->7075 7075->7072 7076 83b2260 NtAllocateVirtualMemory 7075->7076 7077 83b246e 7075->7077 7076->7075 7078 83887c2 2 API calls 7077->7078 7079 83b247a 7078->7079 7080 83b24c9 2 API calls 7079->7080 7081 83b24c7 7080->7081 7088 8391301 7082->7088 7089 837fd91 7082->7089 7083 83b214b 2 API calls 7083->7088 7084 8381516 2 API calls 7084->7089 7085 8382a72 2 API calls 7086 837fe94 7085->7086 7086->7085 7090 837fe6d 7086->7090 7091 837fee3 7086->7091 7098 837fef3 7086->7098 7087 83b2260 NtAllocateVirtualMemory 7087->7091 7088->7082 7088->7083 7088->7091 7089->7084 7089->7086 7101 83ad980 7089->7101 7090->7025 7091->7025 7091->7087 7092 83b246e 7091->7092 7094 83ae468 7091->7094 7093 83887c2 2 API calls 7092->7093 7095 83b247a 7093->7095 7094->7025 7096 83b24c9 2 API calls 7095->7096 7097 83b24c7 7096->7097 7099 837fef5 7098->7099 7100 8391e02 2 API calls 7098->7100 7099->7025 7100->7099 7101->7025 7110 837fd91 7102->7110 7103 837fe94 7104 8382a72 2 API calls 7103->7104 7105 837fe6d 7103->7105 7108 837fef3 7103->7108 7111 837fee3 7103->7111 7104->7103 7105->6915 7106 8381516 2 API calls 7106->7110 7107 83b2260 NtAllocateVirtualMemory 7107->7111 7109 837fef5 7108->7109 7112 8391e02 2 API calls 7108->7112 7109->6915 7110->7103 7110->7106 7110->7111 7116 83ad980 7110->7116 7111->6915 7111->7107 7113 83b246e 7111->7113 7112->7109 7114 83887c2 2 API calls 7113->7114 7115 83b247a 7114->7115 7117 83b24c9 2 API calls 7115->7117 7116->6915 7118 83b24c7 7117->7118 7120 83ad980 7119->7120 7123 837fd91 7119->7123 7120->6919 7121 8381516 2 API calls 7121->7123 7122 8382a72 2 API calls 7124 837fe94 7122->7124 7123->7119 7123->7121 7123->7124 7124->7122 7125 837fef3 7124->7125 7126 837fe6d 7124->7126 7130 837fee3 7124->7130 7127 837fef5 7125->7127 7128 8391e02 2 API calls 7125->7128 7126->6919 7127->6919 7128->7127 7129 83b2260 NtAllocateVirtualMemory 7129->7130 7130->7129 7131 83b246e 7130->7131 7132 83887c2 2 API calls 7131->7132 7133 83b247a 7132->7133 7134 83b24c9 2 API calls 7133->7134 7135 83b24c7 7134->7135 7145 8391301 7136->7145 7137 83b2260 NtAllocateVirtualMemory 7151 837fee3 7137->7151 7138 83b246e 7139 83887c2 2 API calls 7138->7139 7140 83b247a 7139->7140 7141 83b24c9 2 API calls 7140->7141 7142 83b24c7 7141->7142 7143 837fe94 7144 8382a72 2 API calls 7143->7144 7147 837fe6d 7143->7147 7149 837fef3 7143->7149 7143->7151 7144->7143 7145->7143 7146 83b214b 2 API calls 7145->7146 7150 837fd91 7145->7150 7145->7151 7146->7145 7147->6922 7148 8381516 2 API calls 7148->7150 7152 837fef5 7149->7152 7153 8391e02 2 API calls 7149->7153 7150->7143 7150->7148 7155 83ad980 7150->7155 7151->6922 7151->7137 7151->7138 7154 83ae468 7151->7154 7152->6922 7153->7152 7154->6922 7155->6922 7164 837fe94 7156->7164 7157 83b2260 NtAllocateVirtualMemory 7161 837fee3 7157->7161 7158 83b246e 7159 83887c2 2 API calls 7158->7159 7160 83b247a 7159->7160 7162 83b24c9 2 API calls 7160->7162 7161->6928 7161->7157 7161->7158 7165 8383238 7161->7165 7163 83b24c7 7162->7163 7164->7161 7166 8382a72 2 API calls 7164->7166 7167 837fe6d 7164->7167 7168 837fef3 7164->7168 7165->6928 7166->7164 7167->6928 7169 8391e02 2 API calls 7168->7169 7170 837fef5 7168->7170 7169->7170 7170->6928 7172 838a58b 7171->7172 7172->6979 7422 4038dd 7423 4038e8 7422->7423 7424 4038ec 7423->7424 7425 4038ef GlobalAlloc 7423->7425 7425->7424 7221 40165e 7222 402b3a 18 API calls 7221->7222 7223 401665 7222->7223 7224 402b3a 18 API calls 7223->7224 7225 40166e 7224->7225 7226 402b3a 18 API calls 7225->7226 7227 401677 MoveFileW 7226->7227 7228 401683 7227->7228 7229 40168a 7227->7229 7230 401423 25 API calls 7228->7230 7231 40628b 2 API calls 7229->7231 7233 402197 7229->7233 7230->7233 7232 401699 7231->7232 7232->7233 7234 405de2 40 API calls 7232->7234 7234->7228 7835 4023e0 7836 402c44 19 API calls 7835->7836 7837 4023ea 7836->7837 7838 402b3a 18 API calls 7837->7838 7839 4023f3 7838->7839 7840 4023fe RegQueryValueExW 7839->7840 7843 402793 7839->7843 7841 402424 RegCloseKey 7840->7841 7842 40241e 7840->7842 7841->7843 7842->7841 7846 405e8f wsprintfW 7842->7846 7846->7841 7426 401ce5 GetDlgItem GetClientRect 7427 402b3a 18 API calls 7426->7427 7428 401d17 LoadImageW SendMessageW 7427->7428 7429 401d35 DeleteObject 7428->7429 7430 4029c7 7428->7430 7429->7430 7614 405166 7615 405176 7614->7615 7616 40518a 7614->7616 7618 40517c 7615->7618 7626 4051d3 7615->7626 7617 405192 IsWindowVisible 7616->7617 7624 4051a9 7616->7624 7619 40519f 7617->7619 7617->7626 7621 4041e6 SendMessageW 7618->7621 7627 404abc SendMessageW 7619->7627 7620 4051d8 CallWindowProcW 7623 405186 7620->7623 7621->7623 7624->7620 7632 404b3c 7624->7632 7626->7620 7628 404b1b SendMessageW 7627->7628 7629 404adf GetMessagePos ScreenToClient SendMessageW 7627->7629 7630 404b13 7628->7630 7629->7630 7631 404b18 7629->7631 7630->7624 7631->7628 7641 405f48 lstrcpynW 7632->7641 7634 404b4f 7642 405e8f wsprintfW 7634->7642 7636 404b59 7637 40140b 2 API calls 7636->7637 7638 404b62 7637->7638 7643 405f48 lstrcpynW 7638->7643 7640 404b69 7640->7626 7641->7634 7642->7636 7643->7640 7431 4042e8 lstrlenW 7432 404307 7431->7432 7433 404309 WideCharToMultiByte 7431->7433 7432->7433 7441 100018a9 7442 100018cc 7441->7442 7443 100018ff GlobalFree 7442->7443 7444 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 7442->7444 7443->7444 7445 10001272 2 API calls 7444->7445 7446 10001a87 GlobalFree GlobalFree 7445->7446 7235 40206a 7236 402b3a 18 API calls 7235->7236 7237 402071 7236->7237 7238 402b3a 18 API calls 7237->7238 7239 40207b 7238->7239 7240 402b3a 18 API calls 7239->7240 7241 402084 7240->7241 7242 402b3a 18 API calls 7241->7242 7243 40208e 7242->7243 7244 402b3a 18 API calls 7243->7244 7245 402098 7244->7245 7246 4020ac CoCreateInstance 7245->7246 7247 402b3a 18 API calls 7245->7247 7250 4020cb 7246->7250 7247->7246 7248 401423 25 API calls 7249 402197 7248->7249 7250->7248 7250->7249 6170 40156b 6171 401584 6170->6171 6172 40157b ShowWindow 6170->6172 6173 401592 ShowWindow 6171->6173 6174 4029c7 6171->6174 6172->6171 6173->6174 7447 4024ee 7448 4024f3 7447->7448 7449 40250c 7447->7449 7450 402b1d 18 API calls 7448->7450 7451 402512 7449->7451 7452 40253e 7449->7452 7457 4024fa 7450->7457 7453 402b3a 18 API calls 7451->7453 7454 402b3a 18 API calls 7452->7454 7456 402519 WideCharToMultiByte lstrlenA 7453->7456 7455 402545 lstrlenW 7454->7455 7455->7457 7456->7457 7458 402567 WriteFile 7457->7458 7459 402793 7457->7459 7458->7459 7644 404b6e GetDlgItem GetDlgItem 7645 404bc0 7 API calls 7644->7645 7652 404dd9 7644->7652 7646 404c63 DeleteObject 7645->7646 7647 404c56 SendMessageW 7645->7647 7648 404c6c 7646->7648 7647->7646 7650 404ca3 7648->7650 7651 405f6a 18 API calls 7648->7651 7649 404ebd 7654 404f69 7649->7654 7659 404f16 SendMessageW 7649->7659 7687 404dcc 7649->7687 7653 40419a 19 API calls 7650->7653 7655 404c85 SendMessageW SendMessageW 7651->7655 7652->7649 7663 404abc 5 API calls 7652->7663 7678 404e4a 7652->7678 7658 404cb7 7653->7658 7656 404f73 SendMessageW 7654->7656 7657 404f7b 7654->7657 7655->7648 7656->7657 7662 404fa4 7657->7662 7668 404f94 7657->7668 7669 404f8d ImageList_Destroy 7657->7669 7664 40419a 19 API calls 7658->7664 7666 404f2b SendMessageW 7659->7666 7659->7687 7660 404201 8 API calls 7667 40515f 7660->7667 7661 404eaf SendMessageW 7661->7649 7665 405113 7662->7665 7686 404b3c 4 API calls 7662->7686 7691 404fdf 7662->7691 7663->7678 7672 404cc5 7664->7672 7674 405125 ShowWindow GetDlgItem ShowWindow 7665->7674 7665->7687 7673 404f3e 7666->7673 7668->7662 7671 404f9d GlobalFree 7668->7671 7669->7668 7670 404d9a GetWindowLongW SetWindowLongW 7675 404db3 7670->7675 7671->7662 7672->7670 7679 404d15 SendMessageW 7672->7679 7681 404d94 7672->7681 7684 404d51 SendMessageW 7672->7684 7685 404d62 SendMessageW 7672->7685 7680 404f4f SendMessageW 7673->7680 7674->7687 7676 404dd1 7675->7676 7677 404db9 ShowWindow 7675->7677 7696 4041cf SendMessageW 7676->7696 7695 4041cf SendMessageW 7677->7695 7678->7649 7678->7661 7679->7672 7680->7654 7681->7670 7681->7675 7684->7672 7685->7672 7686->7691 7687->7660 7688 4050e9 InvalidateRect 7688->7665 7689 4050ff 7688->7689 7692 4049d6 21 API calls 7689->7692 7690 40500d SendMessageW 7694 405023 7690->7694 7691->7690 7691->7694 7692->7665 7693 405097 SendMessageW SendMessageW 7693->7694 7694->7688 7694->7693 7695->7687 7696->7652 7847 4045ee 7848 404624 7847->7848 7849 4045fe 7847->7849 7851 404201 8 API calls 7848->7851 7850 40419a 19 API calls 7849->7850 7852 40460b SetDlgItemTextW 7850->7852 7853 404630 7851->7853 7852->7848 7460 4018ef 7461 401926 7460->7461 7462 402b3a 18 API calls 7461->7462 7463 40192b 7462->7463 7464 4057d0 71 API calls 7463->7464 7465 401934 7464->7465 7697 404970 7698 404980 7697->7698 7699 40499c 7697->7699 7708 405708 GetDlgItemTextW 7698->7708 7701 4049a2 SHGetPathFromIDListW 7699->7701 7702 4049cf 7699->7702 7703 4049b2 7701->7703 7707 4049b9 SendMessageW 7701->7707 7705 40140b 2 API calls 7703->7705 7704 40498d SendMessageW 7704->7699 7705->7707 7707->7702 7708->7704 7709 402770 7710 402b3a 18 API calls 7709->7710 7711 402777 FindFirstFileW 7710->7711 7712 40279f 7711->7712 7716 40278a 7711->7716 7713 4027a8 7712->7713 7717 405e8f wsprintfW 7712->7717 7718 405f48 lstrcpynW 7713->7718 7717->7713 7718->7716 7466 4014f1 SetForegroundWindow 7467 4029c7 7466->7467 7468 4018f2 7469 402b3a 18 API calls 7468->7469 7470 4018f9 7469->7470 7471 405724 MessageBoxIndirectW 7470->7471 7472 401902 7471->7472 6361 402573 6362 402b1d 18 API calls 6361->6362 6368 402582 6362->6368 6363 4026a0 6364 4025c8 ReadFile 6364->6363 6364->6368 6365 405c37 ReadFile 6365->6368 6366 4026a2 6373 405e8f wsprintfW 6366->6373 6367 402608 MultiByteToWideChar 6367->6368 6368->6363 6368->6364 6368->6365 6368->6366 6368->6367 6370 4026b3 6368->6370 6371 40262e SetFilePointer MultiByteToWideChar 6368->6371 6370->6363 6372 4026d4 SetFilePointer 6370->6372 6371->6368 6372->6363 6373->6363 7854 401df3 7855 402b3a 18 API calls 7854->7855 7856 401df9 7855->7856 7857 402b3a 18 API calls 7856->7857 7858 401e02 7857->7858 7859 402b3a 18 API calls 7858->7859 7860 401e0b 7859->7860 7861 402b3a 18 API calls 7860->7861 7862 401e14 7861->7862 7863 401423 25 API calls 7862->7863 7864 401e1b ShellExecuteW 7863->7864 7865 401e4c 7864->7865 7473 100016b6 7474 100016e5 7473->7474 7475 10001b18 22 API calls 7474->7475 7476 100016ec 7475->7476 7477 100016f3 7476->7477 7478 100016ff 7476->7478 7479 10001272 2 API calls 7477->7479 7480 10001726 7478->7480 7481 10001709 7478->7481 7484 100016fd 7479->7484 7482 10001750 7480->7482 7483 1000172c 7480->7483 7485 1000153d 3 API calls 7481->7485 7487 1000153d 3 API calls 7482->7487 7486 100015b4 3 API calls 7483->7486 7488 1000170e 7485->7488 7489 10001731 7486->7489 7487->7484 7490 100015b4 3 API calls 7488->7490 7491 10001272 2 API calls 7489->7491 7492 10001714 7490->7492 7493 10001737 GlobalFree 7491->7493 7494 10001272 2 API calls 7492->7494 7493->7484 7495 1000174b GlobalFree 7493->7495 7496 1000171a GlobalFree 7494->7496 7495->7484 7496->7484 7256 10002238 7257 10002296 7256->7257 7259 100022cc 7256->7259 7258 100022a8 GlobalAlloc 7257->7258 7257->7259 7258->7257 6609 4026f9 6610 402700 6609->6610 6612 402972 6609->6612 6611 402b1d 18 API calls 6610->6611 6613 40270b 6611->6613 6614 402712 SetFilePointer 6613->6614 6614->6612 6615 402722 6614->6615 6617 405e8f wsprintfW 6615->6617 6617->6612 7260 1000103d 7261 1000101b 5 API calls 7260->7261 7262 10001056 7261->7262 7263 402c7f 7264 402c91 SetTimer 7263->7264 7265 402caa 7263->7265 7264->7265 7266 402cf8 7265->7266 7267 402cfe MulDiv 7265->7267 7268 402cb8 wsprintfW SetWindowTextW SetDlgItemTextW 7267->7268 7268->7266 7497 4014ff 7498 401507 7497->7498 7500 40151a 7497->7500 7499 402b1d 18 API calls 7498->7499 7499->7500 7270 401000 7271 401037 BeginPaint GetClientRect 7270->7271 7272 40100c DefWindowProcW 7270->7272 7274 4010f3 7271->7274 7277 401179 7272->7277 7275 401073 CreateBrushIndirect FillRect DeleteObject 7274->7275 7276 4010fc 7274->7276 7275->7274 7278 401102 CreateFontIndirectW 7276->7278 7279 401167 EndPaint 7276->7279 7278->7279 7280 401112 6 API calls 7278->7280 7279->7277 7280->7279 7281 401a00 7282 402b3a 18 API calls 7281->7282 7283 401a09 ExpandEnvironmentStringsW 7282->7283 7284 401a1d 7283->7284 7286 401a30 7283->7286 7285 401a22 lstrcmpW 7284->7285 7284->7286 7285->7286 7719 401b01 7720 402b3a 18 API calls 7719->7720 7721 401b08 7720->7721 7722 402b1d 18 API calls 7721->7722 7723 401b11 wsprintfW 7722->7723 7724 4029c7 7723->7724 6167 100027c7 6168 10002817 6167->6168 6169 100027d7 VirtualProtect 6167->6169 6169->6168 7725 401f08 7726 402b3a 18 API calls 7725->7726 7727 401f0f GetFileVersionInfoSizeW 7726->7727 7728 401f36 GlobalAlloc 7727->7728 7729 401f8c 7727->7729 7728->7729 7730 401f4a GetFileVersionInfoW 7728->7730 7730->7729 7731 401f59 VerQueryValueW 7730->7731 7731->7729 7732 401f72 7731->7732 7736 405e8f wsprintfW 7732->7736 7734 401f7e 7737 405e8f wsprintfW 7734->7737 7736->7734 7737->7729 7501 401c8e 7502 402b1d 18 API calls 7501->7502 7503 401c94 IsWindow 7502->7503 7504 4019f0 7503->7504 7287 1000164f 7288 10001516 GlobalFree 7287->7288 7290 10001667 7288->7290 7289 100016ad GlobalFree 7290->7289 7291 10001682 7290->7291 7292 10001699 VirtualFree 7290->7292 7291->7289 7292->7289 7512 401491 7513 4051f2 25 API calls 7512->7513 7514 401498 7513->7514 6411 402295 6412 402b3a 18 API calls 6411->6412 6413 4022a4 6412->6413 6414 402b3a 18 API calls 6413->6414 6415 4022ad 6414->6415 6416 402b3a 18 API calls 6415->6416 6417 4022b7 GetPrivateProfileStringW 6416->6417 6423 401f98 6424 401faa 6423->6424 6434 40205c 6423->6434 6425 402b3a 18 API calls 6424->6425 6427 401fb1 6425->6427 6426 401423 25 API calls 6432 402197 6426->6432 6428 402b3a 18 API calls 6427->6428 6429 401fba 6428->6429 6430 401fd0 LoadLibraryExW 6429->6430 6431 401fc2 GetModuleHandleW 6429->6431 6433 401fe1 6430->6433 6430->6434 6431->6430 6431->6433 6446 40631e WideCharToMultiByte 6433->6446 6434->6426 6437 401ff2 6439 402011 6437->6439 6440 401ffa 6437->6440 6438 40202b 6441 4051f2 25 API calls 6438->6441 6449 10001759 6439->6449 6491 401423 6440->6491 6443 402002 6441->6443 6443->6432 6444 40204e FreeLibrary 6443->6444 6444->6432 6447 406348 GetProcAddress 6446->6447 6448 401fec 6446->6448 6447->6448 6448->6437 6448->6438 6450 10001789 6449->6450 6494 10001b18 6450->6494 6452 10001790 6453 100018a6 6452->6453 6454 100017a1 6452->6454 6455 100017a8 6452->6455 6453->6443 6543 10002286 6454->6543 6526 100022d0 6455->6526 6460 1000180c 6466 10001812 6460->6466 6467 1000184e 6460->6467 6461 100017ee 6556 100024a9 6461->6556 6462 100017d7 6476 100017cd 6462->6476 6553 10002b5f 6462->6553 6463 100017be 6465 100017c4 6463->6465 6470 100017cf 6463->6470 6465->6476 6537 100028a4 6465->6537 6472 100015b4 3 API calls 6466->6472 6468 100024a9 10 API calls 6467->6468 6474 10001840 6468->6474 6469 100017f4 6567 100015b4 6469->6567 6547 10002645 6470->6547 6478 10001828 6472->6478 6490 10001895 6474->6490 6578 1000246c 6474->6578 6476->6460 6476->6461 6481 100024a9 10 API calls 6478->6481 6480 100017d5 6480->6476 6481->6474 6485 1000189f GlobalFree 6485->6453 6486 10001881 6486->6490 6582 1000153d wsprintfW 6486->6582 6488 1000187a FreeLibrary 6488->6486 6490->6453 6490->6485 6492 4051f2 25 API calls 6491->6492 6493 401431 6492->6493 6493->6443 6585 1000121b GlobalAlloc 6494->6585 6496 10001b3c 6586 1000121b GlobalAlloc 6496->6586 6498 10001d7a GlobalFree GlobalFree GlobalFree 6499 10001d97 6498->6499 6517 10001de1 6498->6517 6501 100020ee 6499->6501 6507 10001dac 6499->6507 6499->6517 6500 10001c1d GlobalAlloc 6522 10001b47 6500->6522 6502 10002110 GetModuleHandleW 6501->6502 6501->6517 6505 10002121 LoadLibraryW 6502->6505 6506 10002136 6502->6506 6503 10001c68 lstrcpyW 6508 10001c72 lstrcpyW 6503->6508 6504 10001c86 GlobalFree 6504->6522 6505->6506 6505->6517 6593 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 6506->6593 6507->6517 6589 1000122c 6507->6589 6508->6522 6510 10002188 6511 10002195 lstrlenW 6510->6511 6510->6517 6594 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 6511->6594 6513 10002148 6513->6510 6525 10002172 GetProcAddress 6513->6525 6514 10002048 6514->6517 6518 10002090 lstrcpyW 6514->6518 6517->6452 6518->6517 6519 10001cc4 6519->6522 6587 1000158f GlobalSize GlobalAlloc 6519->6587 6520 10001f37 GlobalFree 6520->6522 6521 100021af 6521->6517 6522->6498 6522->6500 6522->6503 6522->6504 6522->6508 6522->6514 6522->6517 6522->6519 6522->6520 6524 1000122c 2 API calls 6522->6524 6592 1000121b GlobalAlloc 6522->6592 6524->6522 6525->6510 6533 100022e8 6526->6533 6528 10002415 GlobalFree 6532 100017ae 6528->6532 6528->6533 6529 100023d3 lstrlenW 6529->6528 6536 100023de 6529->6536 6530 100023ba GlobalAlloc CLSIDFromString 6530->6528 6531 1000238f GlobalAlloc WideCharToMultiByte 6531->6528 6532->6462 6532->6463 6532->6476 6533->6528 6533->6529 6533->6530 6533->6531 6534 1000122c GlobalAlloc lstrcpynW 6533->6534 6596 100012ba 6533->6596 6534->6533 6536->6528 6600 100025d9 6536->6600 6539 100028b6 6537->6539 6538 1000295b EnumWindows 6540 10002979 6538->6540 6539->6538 6541 10002a75 6540->6541 6542 10002a6a GetLastError 6540->6542 6541->6476 6542->6541 6544 10002296 6543->6544 6545 100017a7 6543->6545 6544->6545 6546 100022a8 GlobalAlloc 6544->6546 6545->6455 6546->6544 6551 10002661 6547->6551 6548 100026b2 GlobalAlloc 6552 100026d4 6548->6552 6549 100026c5 6550 100026ca GlobalSize 6549->6550 6549->6552 6550->6552 6551->6548 6551->6549 6552->6480 6554 10002b6a 6553->6554 6555 10002baa GlobalFree 6554->6555 6603 1000121b GlobalAlloc 6556->6603 6558 10002530 StringFromGUID2 6564 100024b3 6558->6564 6559 10002541 lstrcpynW 6559->6564 6560 1000250b MultiByteToWideChar 6560->6564 6561 10002571 GlobalFree 6561->6564 6562 10002554 wsprintfW 6562->6564 6563 100025ac GlobalFree 6563->6469 6564->6558 6564->6559 6564->6560 6564->6561 6564->6562 6564->6563 6565 10001272 2 API calls 6564->6565 6604 100012e1 6564->6604 6565->6564 6608 1000121b GlobalAlloc 6567->6608 6569 100015ba 6570 100015c7 lstrcpyW 6569->6570 6572 100015e1 6569->6572 6574 100015fb 6570->6574 6573 100015e6 wsprintfW 6572->6573 6572->6574 6573->6574 6575 10001272 6574->6575 6576 100012b5 GlobalFree 6575->6576 6577 1000127b GlobalAlloc lstrcpynW 6575->6577 6576->6474 6577->6576 6579 10001861 6578->6579 6580 1000247a 6578->6580 6579->6486 6579->6488 6580->6579 6581 10002496 GlobalFree 6580->6581 6581->6580 6583 10001272 2 API calls 6582->6583 6584 1000155e 6583->6584 6584->6490 6585->6496 6586->6522 6588 100015ad 6587->6588 6588->6519 6595 1000121b GlobalAlloc 6589->6595 6591 1000123b lstrcpynW 6591->6517 6592->6522 6593->6513 6594->6521 6595->6591 6597 100012c1 6596->6597 6598 1000122c 2 API calls 6597->6598 6599 100012df 6598->6599 6599->6533 6601 100025e7 VirtualAlloc 6600->6601 6602 1000263d 6600->6602 6601->6602 6602->6536 6603->6564 6605 100012ea 6604->6605 6606 1000130c 6604->6606 6605->6606 6607 100012f0 lstrcpyW 6605->6607 6606->6564 6607->6606 6608->6569 7293 10001058 7295 10001074 7293->7295 7294 100010dd 7295->7294 7296 10001516 GlobalFree 7295->7296 7297 10001092 7295->7297 7296->7297 7298 10001516 GlobalFree 7297->7298 7299 100010a2 7298->7299 7300 100010b2 7299->7300 7301 100010a9 GlobalSize 7299->7301 7302 100010b6 GlobalAlloc 7300->7302 7303 100010c7 7300->7303 7301->7300 7304 1000153d 3 API calls 7302->7304 7305 100010d2 GlobalFree 7303->7305 7304->7303 7305->7294 7738 401718 7739 402b3a 18 API calls 7738->7739 7740 40171f SearchPathW 7739->7740 7741 40173a 7740->7741 6848 40159b 6849 402b3a 18 API calls 6848->6849 6850 4015a2 SetFileAttributesW 6849->6850 6851 4015b4 6850->6851 7873 40659d 7875 406421 7873->7875 7874 406d8c 7875->7874 7876 4064a2 GlobalFree 7875->7876 7877 4064ab GlobalAlloc 7875->7877 7878 406522 GlobalAlloc 7875->7878 7879 406519 GlobalFree 7875->7879 7876->7877 7877->7874 7877->7875 7878->7874 7878->7875 7879->7878 7515 40149e 7516 4014ac PostQuitMessage 7515->7516 7517 40223e 7515->7517 7516->7517 7880 4021a0 7881 402b3a 18 API calls 7880->7881 7882 4021a6 7881->7882 7883 402b3a 18 API calls 7882->7883 7884 4021af 7883->7884 7885 402b3a 18 API calls 7884->7885 7886 4021b8 7885->7886 7887 40628b 2 API calls 7886->7887 7888 4021c1 7887->7888 7889 4021d2 lstrlenW lstrlenW 7888->7889 7890 4021c5 7888->7890 7892 4051f2 25 API calls 7889->7892 7891 4051f2 25 API calls 7890->7891 7894 4021cd 7890->7894 7891->7894 7893 402210 SHFileOperationW 7892->7893 7893->7890 7893->7894 7518 100010e1 7519 10001111 7518->7519 7520 100011d8 GlobalFree 7519->7520 7521 100012ba 2 API calls 7519->7521 7522 100011d3 7519->7522 7523 10001272 2 API calls 7519->7523 7524 10001164 GlobalAlloc 7519->7524 7525 100011f8 GlobalFree 7519->7525 7526 100011c4 GlobalFree 7519->7526 7527 100012e1 lstrcpyW 7519->7527 7521->7519 7522->7520 7523->7526 7524->7519 7525->7519 7526->7519 7527->7519 5980 401b22 5981 401b73 5980->5981 5982 401b2f 5980->5982 5983 401b78 5981->5983 5984 401b9d GlobalAlloc 5981->5984 5985 401bb8 5982->5985 5990 401b46 5982->5990 5994 40223e 5983->5994 6001 405f48 lstrcpynW 5983->6001 5986 405f6a 18 API calls 5984->5986 5987 405f6a 18 API calls 5985->5987 5985->5994 5986->5985 5989 402238 5987->5989 5989->5994 6002 405724 5989->6002 5999 405f48 lstrcpynW 5990->5999 5991 401b8a GlobalFree 5991->5994 5993 401b55 6000 405f48 lstrcpynW 5993->6000 5997 401b64 6006 405f48 lstrcpynW 5997->6006 5999->5993 6000->5997 6001->5991 6003 405739 6002->6003 6004 40574d MessageBoxIndirectW 6003->6004 6005 405785 6003->6005 6004->6005 6005->5994 6006->5994 7895 4029a2 SendMessageW 7896 4029c7 7895->7896 7897 4029bc InvalidateRect 7895->7897 7897->7896 6007 401924 6008 401926 6007->6008 6013 402b3a 6008->6013 6014 402b46 6013->6014 6015 405f6a 18 API calls 6014->6015 6016 402b67 6015->6016 6017 40192b 6016->6017 6018 4061dc 5 API calls 6016->6018 6019 4057d0 6017->6019 6018->6017 6058 405a9b 6019->6058 6022 4057f8 DeleteFileW 6024 401934 6022->6024 6023 40580f 6029 40592f 6023->6029 6072 405f48 lstrcpynW 6023->6072 6026 405835 6027 405848 6026->6027 6028 40583b lstrcatW 6026->6028 6073 4059df lstrlenW 6027->6073 6030 40584e 6028->6030 6029->6024 6102 40628b FindFirstFileW 6029->6102 6033 40585e lstrcatW 6030->6033 6035 405869 lstrlenW FindFirstFileW 6030->6035 6033->6035 6035->6029 6043 40588b 6035->6043 6036 405958 6105 405993 lstrlenW CharPrevW 6036->6105 6039 405912 FindNextFileW 6039->6043 6044 405928 FindClose 6039->6044 6040 405788 5 API calls 6042 40596a 6040->6042 6045 405984 6042->6045 6046 40596e 6042->6046 6043->6039 6053 4058d3 6043->6053 6077 405f48 lstrcpynW 6043->6077 6044->6029 6048 4051f2 25 API calls 6045->6048 6046->6024 6050 4051f2 25 API calls 6046->6050 6048->6024 6049 4057d0 64 API calls 6049->6053 6051 40597b 6050->6051 6052 405de2 40 API calls 6051->6052 6055 405982 6052->6055 6053->6039 6053->6049 6054 4051f2 25 API calls 6053->6054 6078 405788 6053->6078 6086 4051f2 6053->6086 6097 405de2 6053->6097 6054->6039 6055->6024 6108 405f48 lstrcpynW 6058->6108 6060 405aac 6109 405a3e CharNextW CharNextW 6060->6109 6063 4057f0 6063->6022 6063->6023 6064 4061dc 5 API calls 6067 405ac2 6064->6067 6065 405af3 lstrlenW 6066 405afe 6065->6066 6065->6067 6068 405993 3 API calls 6066->6068 6067->6063 6067->6065 6069 40628b 2 API calls 6067->6069 6071 4059df 2 API calls 6067->6071 6070 405b03 GetFileAttributesW 6068->6070 6069->6067 6070->6063 6071->6065 6072->6026 6074 4059ed 6073->6074 6075 4059f3 CharPrevW 6074->6075 6076 4059ff 6074->6076 6075->6074 6075->6076 6076->6030 6077->6043 6115 405b8f GetFileAttributesW 6078->6115 6080 4057b5 6080->6053 6082 4057a3 RemoveDirectoryW 6084 4057b1 6082->6084 6083 4057ab DeleteFileW 6083->6084 6084->6080 6085 4057c1 SetFileAttributesW 6084->6085 6085->6080 6087 40520d 6086->6087 6096 4052af 6086->6096 6088 405229 lstrlenW 6087->6088 6089 405f6a 18 API calls 6087->6089 6090 405252 6088->6090 6091 405237 lstrlenW 6088->6091 6089->6088 6093 405265 6090->6093 6094 405258 SetWindowTextW 6090->6094 6092 405249 lstrcatW 6091->6092 6091->6096 6092->6090 6095 40526b SendMessageW SendMessageW SendMessageW 6093->6095 6093->6096 6094->6093 6095->6096 6096->6053 6118 4062b2 GetModuleHandleA 6097->6118 6101 405e0a 6101->6053 6103 4062a1 FindClose 6102->6103 6104 405954 6102->6104 6103->6104 6104->6024 6104->6036 6106 40595e 6105->6106 6107 4059af lstrcatW 6105->6107 6106->6040 6107->6106 6108->6060 6110 405a5b 6109->6110 6113 405a6d 6109->6113 6112 405a68 CharNextW 6110->6112 6110->6113 6111 405a91 6111->6063 6111->6064 6112->6111 6113->6111 6114 4059c0 CharNextW 6113->6114 6114->6113 6116 405ba1 SetFileAttributesW 6115->6116 6117 405794 6115->6117 6116->6117 6117->6080 6117->6082 6117->6083 6119 4062d9 GetProcAddress 6118->6119 6120 4062ce LoadLibraryA 6118->6120 6121 405de9 6119->6121 6120->6119 6120->6121 6121->6101 6122 405c66 lstrcpyW 6121->6122 6123 405cb5 GetShortPathNameW 6122->6123 6124 405c8f 6122->6124 6126 405cca 6123->6126 6127 405ddc 6123->6127 6147 405bb4 GetFileAttributesW CreateFileW 6124->6147 6126->6127 6129 405cd2 wsprintfA 6126->6129 6127->6101 6128 405c99 CloseHandle GetShortPathNameW 6128->6127 6130 405cad 6128->6130 6131 405f6a 18 API calls 6129->6131 6130->6123 6130->6127 6132 405cfa 6131->6132 6148 405bb4 GetFileAttributesW CreateFileW 6132->6148 6134 405d07 6134->6127 6135 405d16 GetFileSize GlobalAlloc 6134->6135 6136 405dd5 CloseHandle 6135->6136 6137 405d38 6135->6137 6136->6127 6149 405c37 ReadFile 6137->6149 6142 405d57 lstrcpyA 6146 405d79 6142->6146 6143 405d6b 6144 405b19 4 API calls 6143->6144 6144->6146 6145 405db0 SetFilePointer WriteFile GlobalFree 6145->6136 6146->6145 6147->6128 6148->6134 6150 405c55 6149->6150 6150->6136 6151 405b19 lstrlenA 6150->6151 6152 405b5a lstrlenA 6151->6152 6153 405b62 6152->6153 6154 405b33 lstrcmpiA 6152->6154 6153->6142 6153->6143 6154->6153 6155 405b51 CharNextA 6154->6155 6155->6152 7306 402224 7307 40222b 7306->7307 7310 40223e 7306->7310 7308 405f6a 18 API calls 7307->7308 7309 402238 7308->7309 7309->7310 7311 405724 MessageBoxIndirectW 7309->7311 7311->7310 7742 402729 7743 402730 7742->7743 7744 4029c7 7742->7744 7745 402736 FindClose 7743->7745 7745->7744 7535 401cab 7536 402b1d 18 API calls 7535->7536 7537 401cb2 7536->7537 7538 402b1d 18 API calls 7537->7538 7539 401cba GetDlgItem 7538->7539 7540 4024e8 7539->7540 7541 4042ae lstrcpynW lstrlenW 7542 4016af 7543 402b3a 18 API calls 7542->7543 7544 4016b5 GetFullPathNameW 7543->7544 7545 4016cf 7544->7545 7551 4016f1 7544->7551 7548 40628b 2 API calls 7545->7548 7545->7551 7546 401706 GetShortPathNameW 7547 4029c7 7546->7547 7549 4016e1 7548->7549 7549->7551 7552 405f48 lstrcpynW 7549->7552 7551->7546 7551->7547 7552->7551 6175 405331 6176 405352 GetDlgItem GetDlgItem GetDlgItem 6175->6176 6177 4054dd 6175->6177 6221 4041cf SendMessageW 6176->6221 6179 4054e6 GetDlgItem CreateThread FindCloseChangeNotification 6177->6179 6180 40550e 6177->6180 6179->6180 6224 4052c5 OleInitialize 6179->6224 6182 405539 6180->6182 6185 405525 ShowWindow ShowWindow 6180->6185 6186 40555e 6180->6186 6181 4053c3 6191 4053ca GetClientRect GetSystemMetrics SendMessageW SendMessageW 6181->6191 6183 405545 6182->6183 6184 405599 6182->6184 6188 405573 ShowWindow 6183->6188 6189 40554d 6183->6189 6184->6186 6197 4055a7 SendMessageW 6184->6197 6223 4041cf SendMessageW 6185->6223 6190 404201 8 API calls 6186->6190 6193 405593 6188->6193 6194 405585 6188->6194 6192 404173 SendMessageW 6189->6192 6201 40556c 6190->6201 6195 405439 6191->6195 6196 40541d SendMessageW SendMessageW 6191->6196 6192->6186 6203 404173 SendMessageW 6193->6203 6202 4051f2 25 API calls 6194->6202 6198 40544c 6195->6198 6199 40543e SendMessageW 6195->6199 6196->6195 6200 4055c0 CreatePopupMenu 6197->6200 6197->6201 6205 40419a 19 API calls 6198->6205 6199->6198 6204 405f6a 18 API calls 6200->6204 6202->6193 6203->6184 6206 4055d0 AppendMenuW 6204->6206 6207 40545c 6205->6207 6208 405600 TrackPopupMenu 6206->6208 6209 4055ed GetWindowRect 6206->6209 6210 405465 ShowWindow 6207->6210 6211 405499 GetDlgItem SendMessageW 6207->6211 6208->6201 6212 40561b 6208->6212 6209->6208 6213 405488 6210->6213 6214 40547b ShowWindow 6210->6214 6211->6201 6215 4054c0 SendMessageW SendMessageW 6211->6215 6216 405637 SendMessageW 6212->6216 6222 4041cf SendMessageW 6213->6222 6214->6213 6215->6201 6216->6216 6217 405654 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 6216->6217 6219 405679 SendMessageW 6217->6219 6219->6219 6220 4056a2 GlobalUnlock SetClipboardData CloseClipboard 6219->6220 6220->6201 6221->6181 6222->6211 6223->6182 6225 4041e6 SendMessageW 6224->6225 6228 4052e8 6225->6228 6226 4041e6 SendMessageW 6227 405321 OleUninitialize 6226->6227 6229 401389 2 API calls 6228->6229 6230 40530f 6228->6230 6229->6228 6230->6226 6231 402331 6232 402337 6231->6232 6233 402b3a 18 API calls 6232->6233 6234 402349 6233->6234 6235 402b3a 18 API calls 6234->6235 6236 402353 RegCreateKeyExW 6235->6236 6237 4029c7 6236->6237 6238 40237d 6236->6238 6239 402398 6238->6239 6240 402b3a 18 API calls 6238->6240 6241 4023a4 6239->6241 6243 402b1d 18 API calls 6239->6243 6242 40238e lstrlenW 6240->6242 6244 4023bf RegSetValueExW 6241->6244 6248 403062 6241->6248 6242->6239 6243->6241 6246 4023d5 RegCloseKey 6244->6246 6246->6237 6249 403072 SetFilePointer 6248->6249 6250 40308e 6248->6250 6249->6250 6263 40317d GetTickCount 6250->6263 6253 405c37 ReadFile 6254 4030ae 6253->6254 6255 403139 6254->6255 6256 40317d 43 API calls 6254->6256 6255->6244 6257 4030c5 6256->6257 6257->6255 6258 4030d5 6257->6258 6259 40313f ReadFile 6257->6259 6258->6255 6261 405c37 ReadFile 6258->6261 6262 403108 WriteFile 6258->6262 6259->6255 6261->6258 6262->6255 6262->6258 6264 4032e7 6263->6264 6265 4031ac 6263->6265 6266 402d1a 33 API calls 6264->6266 6276 40330f SetFilePointer 6265->6276 6272 403095 6266->6272 6268 4031b7 SetFilePointer 6274 4031dc 6268->6274 6272->6253 6272->6255 6273 403271 WriteFile 6273->6272 6273->6274 6274->6272 6274->6273 6275 4032c8 SetFilePointer 6274->6275 6277 4032f9 6274->6277 6280 4063ee 6274->6280 6287 402d1a 6274->6287 6275->6264 6276->6268 6278 405c37 ReadFile 6277->6278 6279 40330c 6278->6279 6279->6274 6281 406413 6280->6281 6282 40641b 6280->6282 6281->6274 6282->6281 6283 4064a2 GlobalFree 6282->6283 6284 4064ab GlobalAlloc 6282->6284 6285 406522 GlobalAlloc 6282->6285 6286 406519 GlobalFree 6282->6286 6283->6284 6284->6281 6284->6282 6285->6281 6285->6282 6286->6285 6288 402d43 6287->6288 6289 402d2b 6287->6289 6292 402d53 GetTickCount 6288->6292 6293 402d4b 6288->6293 6290 402d34 DestroyWindow 6289->6290 6291 402d3b 6289->6291 6290->6291 6291->6274 6292->6291 6294 402d61 6292->6294 6302 4062eb 6293->6302 6296 402d96 CreateDialogParamW ShowWindow 6294->6296 6297 402d69 6294->6297 6296->6291 6297->6291 6306 402cfe 6297->6306 6299 402d77 wsprintfW 6300 4051f2 25 API calls 6299->6300 6301 402d94 6300->6301 6301->6291 6303 406308 PeekMessageW 6302->6303 6304 406318 6303->6304 6305 4062fe DispatchMessageW 6303->6305 6304->6291 6305->6303 6307 402d0d 6306->6307 6308 402d0f MulDiv 6306->6308 6307->6308 6308->6299 7312 404635 7313 404661 7312->7313 7314 404672 7312->7314 7373 405708 GetDlgItemTextW 7313->7373 7316 40467e GetDlgItem 7314->7316 7322 4046dd 7314->7322 7319 404692 7316->7319 7317 4047c1 7371 404955 7317->7371 7375 405708 GetDlgItemTextW 7317->7375 7318 40466c 7320 4061dc 5 API calls 7318->7320 7321 4046a6 SetWindowTextW 7319->7321 7324 405a3e 4 API calls 7319->7324 7320->7314 7325 40419a 19 API calls 7321->7325 7322->7317 7326 405f6a 18 API calls 7322->7326 7322->7371 7330 40469c 7324->7330 7331 4046c2 7325->7331 7332 404751 SHBrowseForFolderW 7326->7332 7327 4047f1 7333 405a9b 18 API calls 7327->7333 7328 404201 8 API calls 7329 404969 7328->7329 7330->7321 7337 405993 3 API calls 7330->7337 7334 40419a 19 API calls 7331->7334 7332->7317 7335 404769 CoTaskMemFree 7332->7335 7336 4047f7 7333->7336 7338 4046d0 7334->7338 7339 405993 3 API calls 7335->7339 7376 405f48 lstrcpynW 7336->7376 7337->7321 7374 4041cf SendMessageW 7338->7374 7341 404776 7339->7341 7344 4047ad SetDlgItemTextW 7341->7344 7348 405f6a 18 API calls 7341->7348 7343 4046d6 7346 4062b2 3 API calls 7343->7346 7344->7317 7345 40480e 7347 4062b2 3 API calls 7345->7347 7346->7322 7355 404816 7347->7355 7350 404795 lstrcmpiW 7348->7350 7349 404855 7377 405f48 lstrcpynW 7349->7377 7350->7344 7351 4047a6 lstrcatW 7350->7351 7351->7344 7353 40485c 7354 405a3e 4 API calls 7353->7354 7356 404862 GetDiskFreeSpaceW 7354->7356 7355->7349 7359 4059df 2 API calls 7355->7359 7360 4048a7 7355->7360 7358 404885 MulDiv 7356->7358 7356->7360 7358->7360 7359->7355 7361 404904 7360->7361 7378 4049d6 7360->7378 7362 404927 7361->7362 7364 40140b 2 API calls 7361->7364 7386 4041bc KiUserCallbackDispatcher 7362->7386 7364->7362 7365 4048f6 7367 404906 SetDlgItemTextW 7365->7367 7368 4048fb 7365->7368 7367->7361 7370 4049d6 21 API calls 7368->7370 7369 404943 7369->7371 7387 4045ca 7369->7387 7370->7361 7371->7328 7373->7318 7374->7343 7375->7327 7376->7345 7377->7353 7379 4049f3 7378->7379 7380 405f6a 18 API calls 7379->7380 7381 404a28 7380->7381 7382 405f6a 18 API calls 7381->7382 7383 404a33 7382->7383 7384 405f6a 18 API calls 7383->7384 7385 404a64 lstrlenW wsprintfW SetDlgItemTextW 7384->7385 7385->7365 7386->7369 7388 4045d8 7387->7388 7389 4045dd SendMessageW 7387->7389 7388->7389 7389->7371 7898 4027b5 7899 402b3a 18 API calls 7898->7899 7900 4027c3 7899->7900 7901 4027d9 7900->7901 7903 402b3a 18 API calls 7900->7903 7902 405b8f 2 API calls 7901->7902 7904 4027df 7902->7904 7903->7901 7924 405bb4 GetFileAttributesW CreateFileW 7904->7924 7906 4027ec 7907 402895 7906->7907 7908 4027f8 GlobalAlloc 7906->7908 7911 4028b0 7907->7911 7912 40289d DeleteFileW 7907->7912 7909 402811 7908->7909 7910 40288c CloseHandle 7908->7910 7925 40330f SetFilePointer 7909->7925 7910->7907 7912->7911 7914 402817 7915 4032f9 ReadFile 7914->7915 7916 402820 GlobalAlloc 7915->7916 7917 402830 7916->7917 7918 402864 WriteFile GlobalFree 7916->7918 7920 403062 46 API calls 7917->7920 7919 403062 46 API calls 7918->7919 7921 402889 7919->7921 7923 40283d 7920->7923 7921->7910 7922 40285b GlobalFree 7922->7918 7923->7922 7924->7906 7925->7914 7553 4028b6 7554 402b1d 18 API calls 7553->7554 7555 4028bc 7554->7555 7556 4028f8 7555->7556 7557 4028df 7555->7557 7566 402793 7555->7566 7558 402902 7556->7558 7559 40290e 7556->7559 7560 4028e4 7557->7560 7561 4028f5 7557->7561 7562 402b1d 18 API calls 7558->7562 7563 405f6a 18 API calls 7559->7563 7567 405f48 lstrcpynW 7560->7567 7568 405e8f wsprintfW 7561->7568 7562->7566 7563->7566 7567->7566 7568->7566 7746 404337 7747 404469 7746->7747 7748 40434f 7746->7748 7749 4044d3 7747->7749 7751 4045a5 7747->7751 7755 4044a4 GetDlgItem SendMessageW 7747->7755 7752 40419a 19 API calls 7748->7752 7750 4044dd GetDlgItem 7749->7750 7749->7751 7753 404566 7750->7753 7754 4044f7 7750->7754 7757 404201 8 API calls 7751->7757 7756 4043b6 7752->7756 7753->7751 7758 404578 7753->7758 7754->7753 7762 40451d 6 API calls 7754->7762 7777 4041bc KiUserCallbackDispatcher 7755->7777 7760 40419a 19 API calls 7756->7760 7761 4045a0 7757->7761 7763 40458e 7758->7763 7764 40457e SendMessageW 7758->7764 7766 4043c3 CheckDlgButton 7760->7766 7762->7753 7763->7761 7767 404594 SendMessageW 7763->7767 7764->7763 7765 4044ce 7768 4045ca SendMessageW 7765->7768 7775 4041bc KiUserCallbackDispatcher 7766->7775 7767->7761 7768->7749 7770 4043e1 GetDlgItem 7776 4041cf SendMessageW 7770->7776 7772 4043f7 SendMessageW 7773 404414 GetSysColor 7772->7773 7774 40441d SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 7772->7774 7773->7774 7774->7761 7775->7770 7776->7772 7777->7765 7569 4014b8 7570 4014be 7569->7570 7571 401389 2 API calls 7570->7571 7572 4014c6 7571->7572 6618 4015b9 6619 402b3a 18 API calls 6618->6619 6620 4015c0 6619->6620 6621 405a3e 4 API calls 6620->6621 6623 4015c9 6621->6623 6622 401614 6625 401646 6622->6625 6626 401619 6622->6626 6623->6622 6624 4059c0 CharNextW 6623->6624 6628 4015d7 CreateDirectoryW 6624->6628 6630 401423 25 API calls 6625->6630 6627 401423 25 API calls 6626->6627 6629 401620 6627->6629 6628->6623 6631 4015ed GetLastError 6628->6631 6636 405f48 lstrcpynW 6629->6636 6635 40163e 6630->6635 6631->6623 6633 4015fa GetFileAttributesW 6631->6633 6633->6623 6634 40162d SetCurrentDirectoryW 6634->6635 6636->6634 7778 401939 7779 402b3a 18 API calls 7778->7779 7780 401940 lstrlenW 7779->7780 7781 4024e8 7780->7781 7782 40293b 7783 402b1d 18 API calls 7782->7783 7784 402941 7783->7784 7785 402974 7784->7785 7786 402793 7784->7786 7788 40294f 7784->7788 7785->7786 7787 405f6a 18 API calls 7785->7787 7787->7786 7788->7786 7790 405e8f wsprintfW 7788->7790 7790->7786 7173 40173f 7174 402b3a 18 API calls 7173->7174 7175 401746 7174->7175 7176 405be3 2 API calls 7175->7176 7177 40174d 7176->7177 7178 405be3 2 API calls 7177->7178 7178->7177 7397 10002a7f 7398 10002a97 7397->7398 7399 1000158f 2 API calls 7398->7399 7400 10002ab2 7399->7400

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 40335a-4033f2 #17 SetErrorMode OleInitialize call 4062b2 SHGetFileInfoW call 405f48 GetCommandLineW call 405f48 GetModuleHandleW 7 4033f4-4033f6 0->7 8 4033fb-40340f call 4059c0 CharNextW 0->8 7->8 11 40350a-403510 8->11 12 403414-40341a 11->12 13 403516 11->13 15 403423-40342a 12->15 16 40341c-403421 12->16 14 40352a-403544 GetTempPathW call 403326 13->14 25 403546-403564 GetWindowsDirectoryW lstrcatW call 403326 14->25 26 40359c-4035b6 DeleteFileW call 402dbc 14->26 18 403432-403436 15->18 19 40342c-403431 15->19 16->15 16->16 20 4034f7-403506 call 4059c0 18->20 21 40343c-403442 18->21 19->18 20->11 40 403508-403509 20->40 23 403444-40344b 21->23 24 40345c-403495 21->24 28 403452 23->28 29 40344d-403450 23->29 30 4034b2-4034ec 24->30 31 403497-40349c 24->31 25->26 45 403566-403596 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403326 25->45 41 403667-403676 call 40382d OleUninitialize 26->41 42 4035bc-4035c2 26->42 28->24 29->24 29->28 37 4034f4-4034f6 30->37 38 4034ee-4034f2 30->38 31->30 35 40349e-4034a6 31->35 43 4034a8-4034ab 35->43 44 4034ad 35->44 37->20 38->37 46 403518-403525 call 405f48 38->46 40->11 58 403772-403778 41->58 59 40367c-40368c call 405724 ExitProcess 41->59 47 403657-40365e call 40391f 42->47 48 4035c8-4035d3 call 4059c0 42->48 43->30 43->44 44->30 45->26 45->41 46->14 57 403663 47->57 62 403621-40362b 48->62 63 4035d5-40360a 48->63 57->41 60 403815-40381d 58->60 61 40377e-40379b call 4062b2 * 3 58->61 70 403823-403827 ExitProcess 60->70 71 40381f 60->71 94 4037e5-4037f3 call 4062b2 61->94 95 40379d-40379f 61->95 67 403692-4036ac lstrcatW lstrcmpiW 62->67 68 40362d-40363b call 405a9b 62->68 66 40360c-403610 63->66 73 403612-403617 66->73 74 403619-40361d 66->74 67->41 76 4036ae-4036c4 CreateDirectoryW SetCurrentDirectoryW 67->76 68->41 84 40363d-403653 call 405f48 * 2 68->84 71->70 73->74 78 40361f 73->78 74->66 74->78 80 4036d1-4036fa call 405f48 76->80 81 4036c6-4036cc call 405f48 76->81 78->62 89 4036ff-40371b call 405f6a DeleteFileW 80->89 81->80 84->47 100 40375c-403764 89->100 101 40371d-40372d CopyFileW 89->101 105 403801-40380c ExitWindowsEx 94->105 106 4037f5-4037ff 94->106 95->94 99 4037a1-4037a3 95->99 99->94 103 4037a5-4037b7 GetCurrentProcess 99->103 100->89 107 403766-40376d call 405de2 100->107 101->100 104 40372f-40374f call 405de2 call 405f6a call 4056c3 101->104 103->94 116 4037b9-4037db 103->116 104->100 122 403751-403758 CloseHandle 104->122 105->60 110 40380e-403810 call 40140b 105->110 106->105 106->110 107->41 110->60 116->94 122->100
                          APIs
                          • #17.COMCTL32 ref: 00403379
                          • SetErrorMode.KERNELBASE(00008001), ref: 00403384
                          • OleInitialize.OLE32(00000000), ref: 0040338B
                            • Part of subcall function 004062B2: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 004062C4
                            • Part of subcall function 004062B2: LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000009), ref: 004062CF
                            • Part of subcall function 004062B2: GetProcAddress.KERNEL32(00000000,?), ref: 004062E0
                          • SHGetFileInfoW.SHELL32(004206A8,00000000,?,000002B4,00000000), ref: 004033B3
                            • Part of subcall function 00405F48: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F55
                          • GetCommandLineW.KERNEL32(00428200,NSIS Error), ref: 004033C8
                          • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe",00000000), ref: 004033DB
                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe",00000020), ref: 00403403
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,?), ref: 0040353B
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040354C
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 00403558
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040356C
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 00403574
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 00403585
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 0040358D
                          • DeleteFileW.KERNELBASE(1033), ref: 004035A1
                          • OleUninitialize.OLE32(?), ref: 0040366C
                          • ExitProcess.KERNEL32 ref: 0040368C
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp), ref: 00403698
                          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe",00000000,?), ref: 004036A4
                          • CreateDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 004036B0
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 004036B7
                          • DeleteFileW.KERNEL32(0041FEA8,0041FEA8,?,0042A000,?), ref: 00403711
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,0041FEA8,00000001), ref: 00403725
                          • CloseHandle.KERNEL32(00000000,0041FEA8,0041FEA8,?,0041FEA8,00000000), ref: 00403752
                          • GetCurrentProcess.KERNEL32(00000028,00000006,00000006,00000005,00000004), ref: 004037AC
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403804
                          • ExitProcess.KERNEL32 ref: 00403827
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: File$DirectoryExitHandleProcesslstrcat$CurrentDeleteEnvironmentModulePathTempVariableWindows$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextProcUninitializelstrcmpilstrcpyn
                          • String ID: "C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe$C:\Users\user\brugerlicensaftalerne$C:\Users\user\brugerlicensaftalerne\Isidora$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$\Temp$~nsu.tmp
                          • API String ID: 4107622049-2806124946
                          • Opcode ID: 4d4429256b2e22e1563bae374a615e4d58d6fbe71fb0bbfbec444303671cea11
                          • Instruction ID: 39938aed3c042d93969ea090ff24049052e59ae08dabad03a7e97e37c14ef613
                          • Opcode Fuzzy Hash: 4d4429256b2e22e1563bae374a615e4d58d6fbe71fb0bbfbec444303671cea11
                          • Instruction Fuzzy Hash: 8AC12670604311AAD720BF659C49A2B3EACEB8574AF10483FF480B62D2D77D9D41CB6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 123 405331-40534c 124 405352-40541b GetDlgItem * 3 call 4041cf call 404a8f GetClientRect GetSystemMetrics SendMessageW * 2 123->124 125 4054dd-4054e4 123->125 147 405439-40543c 124->147 148 40541d-405437 SendMessageW * 2 124->148 127 4054e6-405508 GetDlgItem CreateThread FindCloseChangeNotification 125->127 128 40550e-40551b 125->128 127->128 130 405539-405543 128->130 131 40551d-405523 128->131 132 405545-40554b 130->132 133 405599-40559d 130->133 135 405525-405534 ShowWindow * 2 call 4041cf 131->135 136 40555e-405567 call 404201 131->136 138 405573-405583 ShowWindow 132->138 139 40554d-405559 call 404173 132->139 133->136 142 40559f-4055a5 133->142 135->130 144 40556c-405570 136->144 145 405593-405594 call 404173 138->145 146 405585-40558e call 4051f2 138->146 139->136 142->136 149 4055a7-4055ba SendMessageW 142->149 145->133 146->145 150 40544c-405463 call 40419a 147->150 151 40543e-40544a SendMessageW 147->151 148->147 152 4055c0-4055eb CreatePopupMenu call 405f6a AppendMenuW 149->152 153 4056bc-4056be 149->153 162 405465-405479 ShowWindow 150->162 163 405499-4054ba GetDlgItem SendMessageW 150->163 151->150 160 405600-405615 TrackPopupMenu 152->160 161 4055ed-4055fd GetWindowRect 152->161 153->144 160->153 164 40561b-405632 160->164 161->160 165 405488 162->165 166 40547b-405486 ShowWindow 162->166 163->153 167 4054c0-4054d8 SendMessageW * 2 163->167 168 405637-405652 SendMessageW 164->168 169 40548e-405494 call 4041cf 165->169 166->169 167->153 168->168 170 405654-405677 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 168->170 169->163 172 405679-4056a0 SendMessageW 170->172 172->172 173 4056a2-4056b6 GlobalUnlock SetClipboardData CloseClipboard 172->173 173->153
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 00405390
                          • GetDlgItem.USER32(?,000003EE), ref: 0040539F
                          • GetClientRect.USER32(?,?), ref: 004053DC
                          • GetSystemMetrics.USER32(00000015), ref: 004053E4
                          • SendMessageW.USER32(?,00001061,00000000,00000002), ref: 00405405
                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405416
                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405429
                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405437
                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040544A
                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040546C
                          • ShowWindow.USER32(?,00000008), ref: 00405480
                          • GetDlgItem.USER32(?,000003EC), ref: 004054A1
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004054B1
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004054CA
                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004054D6
                          • GetDlgItem.USER32(?,000003F8), ref: 004053AE
                            • Part of subcall function 004041CF: SendMessageW.USER32(00000028,?,00000001,00403FFB), ref: 004041DD
                          • GetDlgItem.USER32(?,000003EC), ref: 004054F3
                          • CreateThread.KERNELBASE(00000000,00000000,Function_000052C5,00000000), ref: 00405501
                          • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00405508
                          • ShowWindow.USER32(00000000), ref: 0040552C
                          • ShowWindow.USER32(?,00000008), ref: 00405531
                          • ShowWindow.USER32(00000008), ref: 0040557B
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004055AF
                          • CreatePopupMenu.USER32 ref: 004055C0
                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004055D4
                          • GetWindowRect.USER32(?,?), ref: 004055F4
                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040560D
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405645
                          • OpenClipboard.USER32(00000000), ref: 00405655
                          • EmptyClipboard.USER32 ref: 0040565B
                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405667
                          • GlobalLock.KERNEL32(00000000), ref: 00405671
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405685
                          • GlobalUnlock.KERNEL32(00000000), ref: 004056A5
                          • SetClipboardData.USER32(0000000D,00000000), ref: 004056B0
                          • CloseClipboard.USER32 ref: 004056B6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                          • String ID: {$&B
                          • API String ID: 4154960007-2518801558
                          • Opcode ID: 7775d457d8fde2865fa6d0874cf326612850ae095f4a8d1cd8ac1be61ac30762
                          • Instruction ID: 6f8bb207ab4459f732b66fbe2fdab1c380fd8c459621fe3193bce92f33b6cf64
                          • Opcode Fuzzy Hash: 7775d457d8fde2865fa6d0874cf326612850ae095f4a8d1cd8ac1be61ac30762
                          • Instruction Fuzzy Hash: ECB14A70900208FFDB119F60DD89AAE7B79FB04354F40817AFA05BA1A0C7759E52DF69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 418 405f6a-405f75 419 405f77-405f86 418->419 420 405f88-405f9e 418->420 419->420 421 405fa4-405fb1 420->421 422 4061b6-4061bc 420->422 421->422 423 405fb7-405fbe 421->423 424 4061c2-4061cd 422->424 425 405fc3-405fd0 422->425 423->422 427 4061d8-4061d9 424->427 428 4061cf-4061d3 call 405f48 424->428 425->424 426 405fd6-405fe2 425->426 429 4061a3 426->429 430 405fe8-406024 426->430 428->427 432 4061b1-4061b4 429->432 433 4061a5-4061af 429->433 434 406144-406148 430->434 435 40602a-406035 GetVersion 430->435 432->422 433->422 438 40614a-40614e 434->438 439 40617d-406181 434->439 436 406037-40603b 435->436 437 40604f 435->437 436->437 442 40603d-406041 436->442 445 406056-40605d 437->445 443 406150-40615c call 405e8f 438->443 444 40615e-40616b call 405f48 438->444 440 406190-4061a1 lstrlenW 439->440 441 406183-40618b call 405f6a 439->441 440->422 441->440 442->437 447 406043-406047 442->447 456 406170-406179 443->456 444->456 449 406062-406064 445->449 450 40605f-406061 445->450 447->437 452 406049-40604d 447->452 454 4060a0-4060a3 449->454 455 406066-406083 call 405e15 449->455 450->449 452->445 457 4060b3-4060b6 454->457 458 4060a5-4060b1 GetSystemDirectoryW 454->458 461 406088-40608c 455->461 456->440 460 40617b 456->460 464 406121-406123 457->464 465 4060b8-4060c6 GetWindowsDirectoryW 457->465 463 406125-406129 458->463 462 40613c-406142 call 4061dc 460->462 466 406092-40609b call 405f6a 461->466 467 40612b-40612f 461->467 462->440 463->462 463->467 464->463 468 4060c8-4060d2 464->468 465->464 466->463 467->462 471 406131-406137 lstrcatW 467->471 473 4060d4-4060d7 468->473 474 4060ec-406102 SHGetSpecialFolderLocation 468->474 471->462 473->474 476 4060d9-4060e0 473->476 477 406104-40611b SHGetPathFromIDListW CoTaskMemFree 474->477 478 40611d 474->478 479 4060e8-4060ea 476->479 477->463 477->478 478->464 479->463 479->474
                          APIs
                          • GetVersion.KERNEL32(00000000,004216C8,?,00405229,004216C8,00000000,00000000,00000000), ref: 0040602D
                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004060AB
                          • GetWindowsDirectoryW.KERNEL32(Call,00000400), ref: 004060BE
                          • SHGetSpecialFolderLocation.SHELL32(?,?), ref: 004060FA
                          • SHGetPathFromIDListW.SHELL32(?,Call), ref: 00406108
                          • CoTaskMemFree.OLE32(?), ref: 00406113
                          • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 00406137
                          • lstrlenW.KERNEL32(Call,00000000,004216C8,?,00405229,004216C8,00000000,00000000,00000000), ref: 00406191
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                          • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 900638850-1230650788
                          • Opcode ID: 1bceb9c34b05b27e3618ed90a195e6464c3aae8e072edacfa9e3722d3d9acc23
                          • Instruction ID: 5a47950f0b5222037037379568de6f858daa6aaa62ae53bcd4b1bc7075dc7fd7
                          • Opcode Fuzzy Hash: 1bceb9c34b05b27e3618ed90a195e6464c3aae8e072edacfa9e3722d3d9acc23
                          • Instruction Fuzzy Hash: DE611571A00105ABDF209F24CC40AAF37A5EF55314F52C13BE956BA2E1D73D4AA2CB5E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 480 4057d0-4057f6 call 405a9b 483 4057f8-40580a DeleteFileW 480->483 484 40580f-405816 480->484 485 40598c-405990 483->485 486 405818-40581a 484->486 487 405829-405839 call 405f48 484->487 488 405820-405823 486->488 489 40593a-40593f 486->489 493 405848-405849 call 4059df 487->493 494 40583b-405846 lstrcatW 487->494 488->487 488->489 489->485 491 405941-405944 489->491 495 405946-40594c 491->495 496 40594e-405956 call 40628b 491->496 497 40584e-405852 493->497 494->497 495->485 496->485 504 405958-40596c call 405993 call 405788 496->504 500 405854-40585c 497->500 501 40585e-405864 lstrcatW 497->501 500->501 503 405869-405885 lstrlenW FindFirstFileW 500->503 501->503 505 40588b-405893 503->505 506 40592f-405933 503->506 520 405984-405987 call 4051f2 504->520 521 40596e-405971 504->521 509 4058b3-4058c7 call 405f48 505->509 510 405895-40589d 505->510 506->489 508 405935 506->508 508->489 522 4058c9-4058d1 509->522 523 4058de-4058e9 call 405788 509->523 512 405912-405922 FindNextFileW 510->512 513 40589f-4058a7 510->513 512->505 519 405928-405929 FindClose 512->519 513->509 516 4058a9-4058b1 513->516 516->509 516->512 519->506 520->485 521->495 526 405973-405982 call 4051f2 call 405de2 521->526 522->512 527 4058d3-4058dc call 4057d0 522->527 533 40590a-40590d call 4051f2 523->533 534 4058eb-4058ee 523->534 526->485 527->512 533->512 536 4058f0-405900 call 4051f2 call 405de2 534->536 537 405902-405908 534->537 536->512 537->512
                          APIs
                          • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"), ref: 004057F9
                          • lstrcatW.KERNEL32(Antegrade\Fravristelse213.Sto226,\*.*), ref: 00405841
                          • lstrcatW.KERNEL32(?,00409014), ref: 00405864
                          • lstrlenW.KERNEL32(?,?,00409014,?,Antegrade\Fravristelse213.Sto226,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"), ref: 0040586A
                          • FindFirstFileW.KERNELBASE(Antegrade\Fravristelse213.Sto226,?,?,?,00409014,?,Antegrade\Fravristelse213.Sto226,?,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"), ref: 0040587A
                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 0040591A
                          • FindClose.KERNEL32(00000000), ref: 00405929
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"$Antegrade\Fravristelse213.Sto226$C:\Users\user\AppData\Local\Temp\$\*.*
                          • API String ID: 2035342205-2588867409
                          • Opcode ID: 42d14f137d7c51639dd5450d77468bfd9c1695374b56492c5285f64ee032ed7a
                          • Instruction ID: 2292a97837c012d07e09995a86319137dd3f2048718c0aa8a22e23afcdeedbd0
                          • Opcode Fuzzy Hash: 42d14f137d7c51639dd5450d77468bfd9c1695374b56492c5285f64ee032ed7a
                          • Instruction Fuzzy Hash: BF41C171800914EACF217B668C49BBF7678EB81328F24817BF811761D1D77C4E829E6E
                          APIs
                          • FindFirstFileW.KERNELBASE(?,00425738,Antegrade\Fravristelse213.Sto226,00405AE4,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,00000000,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,?,?,75922EE0,004057F0,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00406296
                          • FindClose.KERNEL32(00000000), ref: 004062A2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: 8WB$Antegrade\Fravristelse213.Sto226
                          • API String ID: 2295610775-220311181
                          • Opcode ID: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                          • Instruction ID: bfad84801e56aa45620b307e7a8f789e26230cc956ed9d1a225fdef78671a1f1
                          • Opcode Fuzzy Hash: ea398e9f6ccb252cf4d9fa8037675df58843bd33ee06a9524947f1dc2dc69440
                          • Instruction Fuzzy Hash: A7D01231A59020ABC6003B38AD0C84B7A989B553317224AB6F426F63E0C37C8C66969D
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a31c6952aff2c2d9e3077db5cda77fcb20a4fa1314c68fe29834e6b9dbef6b62
                          • Instruction ID: 2d3234ddcc30eb1b928d1b3f6e05ca322d860fc2e9c12c5c13e3e91ce8371178
                          • Opcode Fuzzy Hash: a31c6952aff2c2d9e3077db5cda77fcb20a4fa1314c68fe29834e6b9dbef6b62
                          • Instruction Fuzzy Hash: 74F17571D04229CBCF28CFA8C8946ADBBB1FF44305F25856ED456BB281D3785A96CF44
                          APIs
                          • GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 004062C4
                          • LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000009), ref: 004062CF
                          • GetProcAddress.KERNEL32(00000000,?), ref: 004062E0
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: AddressHandleLibraryLoadModuleProc
                          • String ID:
                          • API String ID: 310444273-0
                          • Opcode ID: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                          • Instruction ID: 6db28869a22d2b590e25977263656b8717a92efcd7e963286bbc5c179789795b
                          • Opcode Fuzzy Hash: fea95c0a25b0bbf4266b289da7fdc3055b6cbcb5f703618f179729d09c13f2c5
                          • Instruction Fuzzy Hash: F2E0C236E0C120ABC7225B209E4896B73ACAFE9651305043EF506F6280C774EC229BE9
                          APIs
                          • NtAllocateVirtualMemory.NTDLL ref: 083B2307
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: AllocateMemoryVirtual
                          • String ID:
                          • API String ID: 2167126740-0
                          • Opcode ID: 6dc8fe5d2a5a0c5d78cf17b2b1f8c2fee78e4fd8163ea9a95b50814d9d869165
                          • Instruction ID: a0d4a6602652b248dee18972d602444d7b6eff8ebea74b3bcad55c0bda05a8ed
                          • Opcode Fuzzy Hash: 6dc8fe5d2a5a0c5d78cf17b2b1f8c2fee78e4fd8163ea9a95b50814d9d869165
                          • Instruction Fuzzy Hash: EDF03AB160064ACFCF25DEB8C9943CE37A1AFC9356F10462ACA09DFF04DB3499458B00
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: \V]
                          • API String ID: 0-3082944825
                          • Opcode ID: bd68e6966e3a6c76fff631fa09c498e3ad04800ad2a4193d0c204218ea3ea39e
                          • Instruction ID: a812d494fd32b079bb7b240b45a2e8bc79310fe2090acfc7e4ea9d6de6d4c7b2
                          • Opcode Fuzzy Hash: bd68e6966e3a6c76fff631fa09c498e3ad04800ad2a4193d0c204218ea3ea39e
                          • Instruction Fuzzy Hash: A751FE75608781CFD72A9E38C8543DA7BA2EFC1351F14816EDC549FAA2CB358946C781

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 174 403cc2-403cd4 175 403e15-403e24 174->175 176 403cda-403ce0 174->176 178 403e73-403e88 175->178 179 403e26-403e6e GetDlgItem * 2 call 40419a SetClassLongW call 40140b 175->179 176->175 177 403ce6-403cef 176->177 182 403cf1-403cfe SetWindowPos 177->182 183 403d04-403d07 177->183 180 403ec8-403ecd call 4041e6 178->180 181 403e8a-403e8d 178->181 179->178 196 403ed2-403eed 180->196 186 403ec0-403ec2 181->186 187 403e8f-403e9a call 401389 181->187 182->183 189 403d21-403d27 183->189 190 403d09-403d1b ShowWindow 183->190 186->180 195 404167 186->195 187->186 209 403e9c-403ebb SendMessageW 187->209 192 403d43-403d46 189->192 193 403d29-403d3e DestroyWindow 189->193 190->189 200 403d48-403d54 SetWindowLongW 192->200 201 403d59-403d5f 192->201 199 404144-40414a 193->199 197 404169-404170 195->197 203 403ef6-403efc 196->203 204 403eef-403ef1 call 40140b 196->204 199->195 210 40414c-404152 199->210 200->197 207 403e02-403e10 call 404201 201->207 208 403d65-403d76 GetDlgItem 201->208 205 403f02-403f0d 203->205 206 404125-40413e DestroyWindow EndDialog 203->206 204->203 205->206 212 403f13-403f60 call 405f6a call 40419a * 3 GetDlgItem 205->212 206->199 207->197 213 403d95-403d98 208->213 214 403d78-403d8f SendMessageW IsWindowEnabled 208->214 209->197 210->195 216 404154-40415d ShowWindow 210->216 244 403f62-403f67 212->244 245 403f6a-403fa6 ShowWindow KiUserCallbackDispatcher call 4041bc EnableWindow 212->245 218 403d9a-403d9b 213->218 219 403d9d-403da0 213->219 214->195 214->213 216->195 222 403dcb-403dd0 call 404173 218->222 223 403da2-403da8 219->223 224 403dae-403db3 219->224 222->207 227 403de9-403dfc SendMessageW 223->227 228 403daa-403dac 223->228 224->227 229 403db5-403dbb 224->229 227->207 228->222 232 403dd2-403ddb call 40140b 229->232 233 403dbd-403dc3 call 40140b 229->233 232->207 242 403ddd-403de7 232->242 240 403dc9 233->240 240->222 242->240 244->245 248 403fa8-403fa9 245->248 249 403fab 245->249 250 403fad-403fdb GetSystemMenu EnableMenuItem SendMessageW 248->250 249->250 251 403ff0 250->251 252 403fdd-403fee SendMessageW 250->252 253 403ff6-404034 call 4041cf call 405f48 lstrlenW call 405f6a SetWindowTextW call 401389 251->253 252->253 253->196 262 40403a-40403c 253->262 262->196 263 404042-404046 262->263 264 404065-404079 DestroyWindow 263->264 265 404048-40404e 263->265 264->199 266 40407f-4040ac CreateDialogParamW 264->266 265->195 267 404054-40405a 265->267 266->199 269 4040b2-404109 call 40419a GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 266->269 267->196 268 404060 267->268 268->195 269->195 274 40410b-40411e ShowWindow call 4041e6 269->274 276 404123 274->276 276->199
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403CFE
                          • ShowWindow.USER32(?), ref: 00403D1B
                          • DestroyWindow.USER32 ref: 00403D2F
                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403D4B
                          • GetDlgItem.USER32(?,?), ref: 00403D6C
                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403D80
                          • IsWindowEnabled.USER32(00000000), ref: 00403D87
                          • GetDlgItem.USER32(?,00000001), ref: 00403E35
                          • GetDlgItem.USER32(?,00000002), ref: 00403E3F
                          • SetClassLongW.USER32(?,000000F2,?), ref: 00403E59
                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00403EAA
                          • GetDlgItem.USER32(?,00000003), ref: 00403F50
                          • ShowWindow.USER32(00000000,?), ref: 00403F71
                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403F83
                          • EnableWindow.USER32(?,?), ref: 00403F9E
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403FB4
                          • EnableMenuItem.USER32(00000000), ref: 00403FBB
                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00403FD3
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00403FE6
                          • lstrlenW.KERNEL32(004226E8,?,004226E8,00428200), ref: 0040400F
                          • SetWindowTextW.USER32(?,004226E8), ref: 00404023
                          • ShowWindow.USER32(?,0000000A), ref: 00404157
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                          • String ID: &B
                          • API String ID: 3282139019-3208460036
                          • Opcode ID: df49f6763b05bfa84c1d779e4394ea7a5d72abe941678efbb561a9aecc95dd19
                          • Instruction ID: 615a13079a357bc63dc92eaebf5b97e46402dd0953b19927b77141fc7a078d9b
                          • Opcode Fuzzy Hash: df49f6763b05bfa84c1d779e4394ea7a5d72abe941678efbb561a9aecc95dd19
                          • Instruction Fuzzy Hash: B6C1A371A04201BBDB216F61ED49E2B3AA8FB95705F40093EF601B51F1C7799892DB2E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 277 40391f-403937 call 4062b2 280 403939-403944 GetUserDefaultUILanguage call 405e8f 277->280 281 40394b-403982 call 405e15 277->281 284 403949 280->284 287 403984-403995 call 405e15 281->287 288 40399a-4039a0 lstrcatW 281->288 286 4039a5-4039ce call 403bf5 call 405a9b 284->286 294 403a60-403a68 call 405a9b 286->294 295 4039d4-4039d9 286->295 287->288 288->286 300 403a76-403a9b LoadImageW 294->300 301 403a6a-403a71 call 405f6a 294->301 295->294 296 4039df-403a07 call 405e15 295->296 296->294 303 403a09-403a0d 296->303 305 403b1c-403b24 call 40140b 300->305 306 403a9d-403acd RegisterClassW 300->306 301->300 307 403a1f-403a2b lstrlenW 303->307 308 403a0f-403a1c call 4059c0 303->308 319 403b26-403b29 305->319 320 403b2e-403b39 call 403bf5 305->320 309 403ad3-403b17 SystemParametersInfoW CreateWindowExW 306->309 310 403beb 306->310 314 403a53-403a5b call 405993 call 405f48 307->314 315 403a2d-403a3b lstrcmpiW 307->315 308->307 309->305 312 403bed-403bf4 310->312 314->294 315->314 318 403a3d-403a47 GetFileAttributesW 315->318 322 403a49-403a4b 318->322 323 403a4d-403a4e call 4059df 318->323 319->312 329 403bc2-403bc3 call 4052c5 320->329 330 403b3f-403b5c ShowWindow LoadLibraryW 320->330 322->314 322->323 323->314 336 403bc8-403bca 329->336 332 403b65-403b77 GetClassInfoW 330->332 333 403b5e-403b63 LoadLibraryW 330->333 334 403b79-403b89 GetClassInfoW RegisterClassW 332->334 335 403b8f-403bb2 DialogBoxParamW call 40140b 332->335 333->332 334->335 340 403bb7-403bc0 call 40386f 335->340 338 403be4-403be6 call 40140b 336->338 339 403bcc-403bd2 336->339 338->310 339->319 341 403bd8-403bdf call 40140b 339->341 340->312 341->319
                          APIs
                            • Part of subcall function 004062B2: GetModuleHandleA.KERNEL32(?,?,00000020,0040339D,00000009), ref: 004062C4
                            • Part of subcall function 004062B2: LoadLibraryA.KERNELBASE(?,?,00000020,0040339D,00000009), ref: 004062CF
                            • Part of subcall function 004062B2: GetProcAddress.KERNEL32(00000000,?), ref: 004062E0
                          • GetUserDefaultUILanguage.KERNELBASE(00000002,C:\Users\user\AppData\Local\Temp\,75923420,00000000,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"), ref: 00403939
                            • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                          • lstrcatW.KERNEL32(1033,004226E8), ref: 004039A0
                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\brugerlicensaftalerne,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403A20
                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\brugerlicensaftalerne,1033,004226E8,80000001,Control Panel\Desktop\ResourceLocale,00000000,004226E8,00000000), ref: 00403A33
                          • GetFileAttributesW.KERNEL32(Call), ref: 00403A3E
                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\brugerlicensaftalerne), ref: 00403A87
                          • RegisterClassW.USER32(004281A0), ref: 00403AC4
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403ADC
                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403B11
                          • ShowWindow.USER32(00000005,00000000), ref: 00403B47
                          • LoadLibraryW.KERNELBASE(RichEd20), ref: 00403B58
                          • LoadLibraryW.KERNEL32(RichEd32), ref: 00403B63
                          • GetClassInfoW.USER32(00000000,RichEdit20W,004281A0), ref: 00403B73
                          • GetClassInfoW.USER32(00000000,RichEdit,004281A0), ref: 00403B80
                          • RegisterClassW.USER32(004281A0), ref: 00403B89
                          • DialogBoxParamW.USER32(?,00000000,00403CC2,00000000), ref: 00403BA8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDefaultDialogFileHandleImageLanguageModuleParamParametersProcShowSystemUserlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\brugerlicensaftalerne$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb$&B
                          • API String ID: 2262724009-3522622930
                          • Opcode ID: 9ff61719f6c30c529665ce4dbc08b581b5599c43b58c29c5b92350d035ae6190
                          • Instruction ID: 309fb0296e4a6d1bba18aa3b2e86eaa258190dfd088e540a173f113b23667d40
                          • Opcode Fuzzy Hash: 9ff61719f6c30c529665ce4dbc08b581b5599c43b58c29c5b92350d035ae6190
                          • Instruction Fuzzy Hash: BE61B570644200BED720AF669C46F2B3A7CEB84749F40457FF945B62E2DB796902CA3D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 347 402dbc-402e0a GetTickCount GetModuleFileNameW call 405bb4 350 402e16-402e44 call 405f48 call 4059df call 405f48 GetFileSize 347->350 351 402e0c-402e11 347->351 359 402f34-402f42 call 402d1a 350->359 360 402e4a-402e61 350->360 352 40305b-40305f 351->352 367 403013-403018 359->367 368 402f48-402f4b 359->368 362 402e63 360->362 363 402e65-402e72 call 4032f9 360->363 362->363 369 402e78-402e7e 363->369 370 402fcf-402fd7 call 402d1a 363->370 367->352 371 402f77-402fc3 GlobalAlloc call 4063ce call 405be3 CreateFileW 368->371 372 402f4d-402f65 call 40330f call 4032f9 368->372 373 402e80-402e98 call 405b6f 369->373 374 402efe-402f02 369->374 370->367 398 402fc5-402fca 371->398 399 402fd9-403009 call 40330f call 403062 371->399 372->367 395 402f6b-402f71 372->395 379 402f0b-402f11 373->379 393 402e9a-402ea1 373->393 378 402f04-402f0a call 402d1a 374->378 374->379 378->379 385 402f13-402f21 call 406360 379->385 386 402f24-402f2e 379->386 385->386 386->359 386->360 393->379 397 402ea3-402eaa 393->397 395->367 395->371 397->379 400 402eac-402eb3 397->400 398->352 407 40300e-403011 399->407 400->379 402 402eb5-402ebc 400->402 402->379 404 402ebe-402ede 402->404 404->367 406 402ee4-402ee8 404->406 409 402ef0-402ef8 406->409 410 402eea-402eee 406->410 407->367 408 40301a-40302b 407->408 411 403033-403038 408->411 412 40302d 408->412 409->379 413 402efa-402efc 409->413 410->359 410->409 414 403039-40303f 411->414 412->411 413->379 414->414 415 403041-403059 call 405b6f 414->415 415->352
                          APIs
                          • GetTickCount.KERNEL32 ref: 00402DD0
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,00000400), ref: 00402DEC
                            • Part of subcall function 00405BB4: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,80000000,00000003), ref: 00405BB8
                            • Part of subcall function 00405BB4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BDA
                          • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,80000000,00000003), ref: 00402E35
                          • GlobalAlloc.KERNELBASE(00000040,00409230), ref: 00402F7C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: "C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                          • API String ID: 2803837635-3322023375
                          • Opcode ID: dbc4309bf9e12582ea8865ce62b28691ef8d5c521c6be9f7d6ce07414c4970ed
                          • Instruction ID: b2cc58b1aa553f56ba66d3b0850f03698e33e3340d89f7fe3e9d1fe3a0eb5287
                          • Opcode Fuzzy Hash: dbc4309bf9e12582ea8865ce62b28691ef8d5c521c6be9f7d6ce07414c4970ed
                          • Instruction Fuzzy Hash: 43610371941205ABDB209FA4DD85B9E3BB8EB04354F20447BF605B72D2C7BC9E418BAD

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 544 401752-401777 call 402b3a call 405a0a 549 401781-401793 call 405f48 call 405993 lstrcatW 544->549 550 401779-40177f call 405f48 544->550 555 401798-401799 call 4061dc 549->555 550->555 559 40179e-4017a2 555->559 560 4017a4-4017ae call 40628b 559->560 561 4017d5-4017d8 559->561 568 4017c0-4017d2 560->568 569 4017b0-4017be CompareFileTime 560->569 563 4017e0-4017fc call 405bb4 561->563 564 4017da-4017db call 405b8f 561->564 571 401870-401899 call 4051f2 call 403062 563->571 572 4017fe-401801 563->572 564->563 568->561 569->568 586 4018a1-4018ad SetFileTime 571->586 587 40189b-40189f 571->587 574 401852-40185c call 4051f2 572->574 575 401803-401841 call 405f48 * 2 call 405f6a call 405f48 call 405724 572->575 584 401865-40186b 574->584 575->559 606 401847-401848 575->606 588 4029d0 584->588 590 4018b3-4018be FindCloseChangeNotification 586->590 587->586 587->590 591 4029d2-4029d6 588->591 593 4018c4-4018c7 590->593 594 4029c7-4029ca 590->594 596 4018c9-4018da call 405f6a lstrcatW 593->596 597 4018dc-4018df call 405f6a 593->597 594->588 601 4018e4-402239 596->601 597->601 607 40223e-402243 601->607 608 402239 call 405724 601->608 606->584 609 40184a-40184b 606->609 607->591 608->607 609->574
                          APIs
                          • lstrcatW.KERNEL32(00000000,00000000), ref: 00401793
                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\brugerlicensaftalerne\Isidora,?,?,00000031), ref: 004017B8
                            • Part of subcall function 00405F48: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F55
                            • Part of subcall function 004051F2: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                            • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                            • Part of subcall function 004051F2: lstrcatW.KERNEL32(004216C8,00402D94), ref: 0040524D
                            • Part of subcall function 004051F2: SetWindowTextW.USER32(004216C8,004216C8), ref: 0040525F
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user\AppData\Local\Temp\nso4DFA.tmp$C:\Users\user\AppData\Local\Temp\nso4DFA.tmp\System.dll$C:\Users\user\brugerlicensaftalerne\Isidora$Call
                          • API String ID: 1941528284-3601920934
                          • Opcode ID: 8fd7ff773941625183321c21c1d438156bd1c93f7609a995d7972b8441070f6c
                          • Instruction ID: 22a22a0f5d261001ccd7191b61e6a6ae22ba545f5f0eb33ed6189b5534195358
                          • Opcode Fuzzy Hash: 8fd7ff773941625183321c21c1d438156bd1c93f7609a995d7972b8441070f6c
                          • Instruction Fuzzy Hash: 3341C071900515BACF11BBB5CC86EAF3679EF06369F20423BF422B10E1C73C8A419A6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 610 402573-402588 call 402b1d 613 4029c7-4029ca 610->613 614 40258e-402595 610->614 615 4029d0-4029d6 613->615 616 402597 614->616 617 40259a-40259d 614->617 616->617 619 4025a3-4025b2 call 405ea8 617->619 620 4026e6-4026ee 617->620 619->620 623 4025b8 619->623 620->613 624 4025be-4025c2 623->624 625 402657-402667 call 405c37 624->625 626 4025c8-4025e3 ReadFile 624->626 625->620 633 402669 625->633 626->620 627 4025e9-4025ee 626->627 627->620 629 4025f4-402602 627->629 631 4026a2-4026ae call 405e8f 629->631 632 402608-40261a MultiByteToWideChar 629->632 631->615 632->633 635 40261c-40261f 632->635 636 40266c-40266f 633->636 638 402621-40262c 635->638 636->631 639 402671-402676 636->639 638->636 642 40262e-402653 SetFilePointer MultiByteToWideChar 638->642 640 4026b3-4026b7 639->640 641 402678-40267d 639->641 644 4026d4-4026e0 SetFilePointer 640->644 645 4026b9-4026bd 640->645 641->640 643 40267f-402692 641->643 642->638 646 402655 642->646 643->620 647 402694-40269a 643->647 644->620 648 4026c5-4026d2 645->648 649 4026bf-4026c3 645->649 646->633 647->624 650 4026a0 647->650 648->620 649->644 649->648 650->620
                          APIs
                          • ReadFile.KERNELBASE(?,?,?,?), ref: 004025DB
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402616
                          • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402639
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 0040264F
                            • Part of subcall function 00405C37: ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C4B
                            • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: File$ByteCharMultiReadWide$Pointerwsprintf
                          • String ID: 9
                          • API String ID: 1149667376-2366072709
                          • Opcode ID: 14d7a1a443259207830479a75009ee39c6dacd7ae2e8022bb32dc9fb2f0741b6
                          • Instruction ID: 34008a6f5bb5370994306dbe4266d00811a1d2e87b5126a94146f67fdcf6739f
                          • Opcode Fuzzy Hash: 14d7a1a443259207830479a75009ee39c6dacd7ae2e8022bb32dc9fb2f0741b6
                          • Instruction Fuzzy Hash: 0E51E771E04209ABDF24DF94DE88AAEB779FF04304F50443BE511B62D0D7B99A42CB69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 651 4051f2-405207 652 40520d-40521e 651->652 653 4052be-4052c2 651->653 654 405220-405224 call 405f6a 652->654 655 405229-405235 lstrlenW 652->655 654->655 657 405252-405256 655->657 658 405237-405247 lstrlenW 655->658 660 405265-405269 657->660 661 405258-40525f SetWindowTextW 657->661 658->653 659 405249-40524d lstrcatW 658->659 659->657 662 40526b-4052ad SendMessageW * 3 660->662 663 4052af-4052b1 660->663 661->660 662->663 663->653 664 4052b3-4052b6 663->664 664->653
                          APIs
                          • lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                          • lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                          • lstrcatW.KERNEL32(004216C8,00402D94), ref: 0040524D
                          • SetWindowTextW.USER32(004216C8,004216C8), ref: 0040525F
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID:
                          • API String ID: 2531174081-0
                          • Opcode ID: 241caa620ce1fcc58b3a3595d79cd8debb0f013b3e7c164dabd01d0a25878295
                          • Instruction ID: 09d17c59ce7287a2cbf3dc662f19c44123261f726eb293d34c68041fb2ac0666
                          • Opcode Fuzzy Hash: 241caa620ce1fcc58b3a3595d79cd8debb0f013b3e7c164dabd01d0a25878295
                          • Instruction Fuzzy Hash: CA21A131900558BBCB219FA5DD849DFBFB8EF54310F14807AF904B62A0C3798A81CFA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 665 402331-402377 call 402c2f call 402b3a * 2 RegCreateKeyExW 672 4029c7-4029d6 665->672 673 40237d-402385 665->673 675 402387-402394 call 402b3a lstrlenW 673->675 676 402398-40239b 673->676 675->676 679 4023ab-4023ae 676->679 680 40239d-4023aa call 402b1d 676->680 683 4023b0-4023ba call 403062 679->683 684 4023bf-4023d3 RegSetValueExW 679->684 680->679 683->684 687 4023d5 684->687 688 4023d8-4024b2 RegCloseKey 684->688 687->688 688->672
                          APIs
                          • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040236F
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nso4DFA.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 0040238F
                          • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nso4DFA.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004023CB
                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nso4DFA.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CloseCreateValuelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nso4DFA.tmp
                          • API String ID: 1356686001-2211028983
                          • Opcode ID: 8805ef30542b3f47b4a39dd0cadf8e155504b39143e93a45ad012f161cb1779c
                          • Instruction ID: 1c964708cf89b7fac74d07524040b6b2ab84de1cfba919da144199f52892a02b
                          • Opcode Fuzzy Hash: 8805ef30542b3f47b4a39dd0cadf8e155504b39143e93a45ad012f161cb1779c
                          • Instruction Fuzzy Hash: A51190B1A00108BEEB11EFA4CD89EAFBB7CEB50358F10443AF505B61D1D7B85E409B29

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 690 4015b9-4015cd call 402b3a call 405a3e 695 401614-401617 690->695 696 4015cf-4015eb call 4059c0 CreateDirectoryW 690->696 698 401646-402197 call 401423 695->698 699 401619-401638 call 401423 call 405f48 SetCurrentDirectoryW 695->699 705 40160a-401612 696->705 706 4015ed-4015f8 GetLastError 696->706 712 4029c7-4029d6 698->712 699->712 714 40163e-401641 699->714 705->695 705->696 709 401607 706->709 710 4015fa-401605 GetFileAttributesW 706->710 709->705 710->705 710->709 714->712
                          APIs
                            • Part of subcall function 00405A3E: CharNextW.USER32(?,?,Antegrade\Fravristelse213.Sto226,?,00405AB2,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,?,?,75922EE0,004057F0,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"), ref: 00405A4C
                            • Part of subcall function 00405A3E: CharNextW.USER32(00000000), ref: 00405A51
                            • Part of subcall function 00405A3E: CharNextW.USER32(00000000), ref: 00405A69
                          • CreateDirectoryW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015E3
                          • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015ED
                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 004015FD
                          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\brugerlicensaftalerne\Isidora,?,00000000,000000F0), ref: 00401630
                          Strings
                          • C:\Users\user\brugerlicensaftalerne\Isidora, xrefs: 00401623
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                          • String ID: C:\Users\user\brugerlicensaftalerne\Isidora
                          • API String ID: 3751793516-2633333261
                          • Opcode ID: 563658752a320469cbbf05847d38c43e8d4ffc81c57abf02e21dc30b2d994902
                          • Instruction ID: 602e027c19ef8137931421d3e2870900c2c1aa36f58208ee64056e3add0ea48c
                          • Opcode Fuzzy Hash: 563658752a320469cbbf05847d38c43e8d4ffc81c57abf02e21dc30b2d994902
                          • Instruction Fuzzy Hash: 4F11C271904200EBCF206FA0CD449AE7AB4FF14369B34463BF881B62E1D23D49419A6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 716 402b7a-402ba3 RegOpenKeyExW 717 402ba5-402bb0 716->717 718 402c0e-402c12 716->718 719 402bcb-402bdb RegEnumKeyW 717->719 720 402bb2-402bb5 719->720 721 402bdd-402bef RegCloseKey call 4062b2 719->721 722 402c02-402c05 RegCloseKey 720->722 723 402bb7-402bc9 call 402b7a 720->723 729 402bf1-402c00 721->729 730 402c15-402c1b 721->730 725 402c0b-402c0d 722->725 723->719 723->721 725->718 729->718 730->725 731 402c1d-402c2b RegDeleteKeyW 730->731 731->725 733 402c2d 731->733 733->718
                          APIs
                          • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?), ref: 00402B9B
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402BD7
                          • RegCloseKey.ADVAPI32(?), ref: 00402BE0
                          • RegCloseKey.ADVAPI32(?), ref: 00402C05
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402C23
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Close$DeleteEnumOpen
                          • String ID:
                          • API String ID: 1912718029-0
                          • Opcode ID: b547f4a97addcc1e8c82d95905b84b8973278d2723117ef79469a300e8f1f4e9
                          • Instruction ID: 39c85bfe7ca74ada2351cc0a51ccebcd1f3e21716521df4e7e96f28c7df0de5f
                          • Opcode Fuzzy Hash: b547f4a97addcc1e8c82d95905b84b8973278d2723117ef79469a300e8f1f4e9
                          • Instruction Fuzzy Hash: 5B116A31904008FEEF229F90DE89EAE3B7DFB14348F100476FA01B00A0D3B59E51EA69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 734 10001759-10001795 call 10001b18 738 100018a6-100018a8 734->738 739 1000179b-1000179f 734->739 740 100017a1-100017a7 call 10002286 739->740 741 100017a8-100017b5 call 100022d0 739->741 740->741 746 100017e5-100017ec 741->746 747 100017b7-100017bc 741->747 748 1000180c-10001810 746->748 749 100017ee-1000180a call 100024a9 call 100015b4 call 10001272 GlobalFree 746->749 750 100017d7-100017da 747->750 751 100017be-100017bf 747->751 755 10001812-1000184c call 100015b4 call 100024a9 748->755 756 1000184e-10001854 call 100024a9 748->756 772 10001855-10001859 749->772 750->746 757 100017dc-100017dd call 10002b5f 750->757 753 100017c1-100017c2 751->753 754 100017c7-100017c8 call 100028a4 751->754 760 100017c4-100017c5 753->760 761 100017cf-100017d5 call 10002645 753->761 767 100017cd 754->767 755->772 756->772 770 100017e2 757->770 760->746 760->754 771 100017e4 761->771 767->770 770->771 771->746 776 10001896-1000189d 772->776 777 1000185b-10001869 call 1000246c 772->777 776->738 782 1000189f-100018a0 GlobalFree 776->782 784 10001881-10001888 777->784 785 1000186b-1000186e 777->785 782->738 784->776 787 1000188a-10001895 call 1000153d 784->787 785->784 786 10001870-10001878 785->786 786->784 788 1000187a-1000187b FreeLibrary 786->788 787->776 788->784
                          APIs
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                          • GlobalFree.KERNEL32(00000000), ref: 10001804
                          • FreeLibrary.KERNEL32(?), ref: 1000187B
                          • GlobalFree.KERNEL32(00000000), ref: 100018A0
                            • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,00001020), ref: 100022B8
                            • Part of subcall function 10002645: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B7
                            • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020), ref: 100015CD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4584996770.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4584981457.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585012105.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585025776.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarylstrcpy
                          • String ID:
                          • API String ID: 1791698881-3916222277
                          • Opcode ID: d19b98991503ed1f4222ee02892706a0c20354a75bd4722b3fc13797bb1a772f
                          • Instruction ID: d353a68b508970880cf9150dbe01e0f77130c4103e9cfdf2e47557ee24e57a3c
                          • Opcode Fuzzy Hash: d19b98991503ed1f4222ee02892706a0c20354a75bd4722b3fc13797bb1a772f
                          • Instruction Fuzzy Hash: 5E31BF75804241AAFB14DF749CC9BDA37E8FF053D0F158065FA0A9A08FDF74A9848761

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 791 405e15-405e47 RegOpenKeyExW 792 405e89-405e8c 791->792 793 405e49-405e68 RegQueryValueExW 791->793 794 405e76 793->794 795 405e6a-405e6e 793->795 797 405e79-405e83 RegCloseKey 794->797 796 405e70-405e74 795->796 795->797 796->794 796->797 797->792
                          APIs
                          • RegOpenKeyExW.KERNELBASE(?,?,00000000,?,?,00000002,Call,?,00406088,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E3F
                          • RegQueryValueExW.KERNELBASE(?,?,00000000,?,?,?,?,00406088,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E60
                          • RegCloseKey.KERNELBASE(?,?,00406088,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E83
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: Call
                          • API String ID: 3677997916-1824292864
                          • Opcode ID: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                          • Instruction ID: 600534e839ec184522a2ed62e812a695e1e378dc1a2fe7ff70d8343822b3fb0e
                          • Opcode Fuzzy Hash: 6d49e1ec12a7b24cc87819d5cf70687d25a5c21dfc25d1df192b84af38ef9460
                          • Instruction Fuzzy Hash: A7015A3114020EEACB218F56EC08EEB3BA8EF54390F00413AF944D2220D334DA64CBE5
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405C01
                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403358,1033,C:\Users\user\AppData\Local\Temp\), ref: 00405C1C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-44229769
                          • Opcode ID: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                          • Instruction ID: 094b443934c56d738417ad06ce23117a41e39d67b54f0ae1535361756efc6c0b
                          • Opcode Fuzzy Hash: c429582aea5e4f3fae6c397ed87dacf02ee6c580567254a7da4e12ab8597e880
                          • Instruction Fuzzy Hash: 45F09676A04208BBDB009F59DC05E9BB7B8EB91710F10803AEA01E7151E2B0AD448B54
                          APIs
                          • GetTickCount.KERNEL32 ref: 00403192
                            • Part of subcall function 0040330F: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                          • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000), ref: 004031C5
                          • WriteFile.KERNELBASE(0040BE90,0040C02F,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?), ref: 0040327F
                          • SetFilePointer.KERNELBASE(00004D6E,00000000,00000000,00413E90,00004000,?,00000000,?,00403095,00000004,00000000,00000000,?,?,?,0040300E), ref: 004032D1
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: File$Pointer$CountTickWrite
                          • String ID:
                          • API String ID: 2146148272-0
                          • Opcode ID: 38246e7ae17352d7cedfc7595443620c434811b06811d2a86a618e437c7072d2
                          • Instruction ID: 34320a24581f7621071559271f75aff2a33e70c32c739a51ea230fcf3b1a2f41
                          • Opcode Fuzzy Hash: 38246e7ae17352d7cedfc7595443620c434811b06811d2a86a618e437c7072d2
                          • Instruction Fuzzy Hash: CB418B72504205DFDB109F29EE84AA63BADF74431671441BFE604B22E1C7B96D418BEC
                          APIs
                            • Part of subcall function 004061DC: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 0040623F
                            • Part of subcall function 004061DC: CharNextW.USER32(?,?,?,00000000), ref: 0040624E
                            • Part of subcall function 004061DC: CharNextW.USER32(?,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 00406253
                            • Part of subcall function 004061DC: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 00406266
                          • CreateDirectoryW.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 00403347
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Char$Next$CreateDirectoryPrev
                          • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 4115351271-2030658151
                          • Opcode ID: bbd1dcb3637595afbe6b96ae3bcfafd58112e7b3325432cb54e87bfcccc6df60
                          • Instruction ID: 64a45b222adfb8bd76fd8b495f2d7cf88aee328212c381153bc1e0c9699f7593
                          • Opcode Fuzzy Hash: bbd1dcb3637595afbe6b96ae3bcfafd58112e7b3325432cb54e87bfcccc6df60
                          • Instruction Fuzzy Hash: 22D0C92251AA3135C551372A7D06FCF295C8F0A329F12A477F809B90C2CB7C2A8249FE
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ba6317b19b7b230722eb11252d44c293277e5dc1cbca2e551617393c5194c9d0
                          • Instruction ID: dca007468fed7c27dd914b546e5ea1ac9ab056a0c62ecf1bea7b7831388965f7
                          • Opcode Fuzzy Hash: ba6317b19b7b230722eb11252d44c293277e5dc1cbca2e551617393c5194c9d0
                          • Instruction Fuzzy Hash: 58A14471E00229DBDF28CFA8C8447ADBBB1FF48305F15816AD856BB281C7785A96CF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: db87408b1e9cadcd0a4c6ae5b6f4dd47f3337075cb2a4d2d14f0ff51d5c97f6a
                          • Instruction ID: e31ab10654d3133c4bbe562e0396aaf9f668a3464ceaf5ac7e335a669e1e1d03
                          • Opcode Fuzzy Hash: db87408b1e9cadcd0a4c6ae5b6f4dd47f3337075cb2a4d2d14f0ff51d5c97f6a
                          • Instruction Fuzzy Hash: 8E912371E00228CBEF28CF98C8587ADBBB1FF44305F15816AD856BB291C7785A96DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 165f4b65d4ff5263617aa106d744e60dbd7c4f5d43725cc52d5e79b0d4499ef2
                          • Instruction ID: e0c60a541a5106e25e0a2f50f35f038ee2aa27f15edb78bccdd8f3c871378321
                          • Opcode Fuzzy Hash: 165f4b65d4ff5263617aa106d744e60dbd7c4f5d43725cc52d5e79b0d4499ef2
                          • Instruction Fuzzy Hash: 2C814471D04228DFDF24CFA8C8487ADBBB1FB45305F25816AD456BB281C7789A96CF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 148eda801716ed3d9969b88488a2fa3c6a7092fa608051ce9148cc038319d1b3
                          • Instruction ID: c1f18cc480c27d0a28c5d6dc1e8cd9b1e5e62e2ab7f78041d4dc85e199002e6a
                          • Opcode Fuzzy Hash: 148eda801716ed3d9969b88488a2fa3c6a7092fa608051ce9148cc038319d1b3
                          • Instruction Fuzzy Hash: 9B816731D04228DBDF24CFA8C8487ADBBB1FB44305F25816AD856BB2C1C7785A96DF84
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4983b507bd6312ae2b30a384a7c44b2e85aa51a10719cb6f4e73ba4d3199020d
                          • Instruction ID: 317a4f11872e46a6f39a96627fb546a7164eb21cb9e645d400dda74b69288846
                          • Opcode Fuzzy Hash: 4983b507bd6312ae2b30a384a7c44b2e85aa51a10719cb6f4e73ba4d3199020d
                          • Instruction Fuzzy Hash: 48713471D04228DFEF24CFA8C8447ADBBB1FB48305F15816AD856BB281C7785A96DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 02494a79b55f78bffb2877069ace75a440f4ea31aa61c09e76d6a1b36594b02c
                          • Instruction ID: 7b464a411068ed62169f7738ff9b09ef3af2f2625e32a791141ed05019b82bd1
                          • Opcode Fuzzy Hash: 02494a79b55f78bffb2877069ace75a440f4ea31aa61c09e76d6a1b36594b02c
                          • Instruction Fuzzy Hash: A4714571E04228DFEF28CF98C8447ADBBB1FB48301F15816AD456BB281C7785996DF44
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e250f200d648af3f0bd61970bfe314c861a6b6aa0b25ddc882d3b39d553e7667
                          • Instruction ID: 924b227091e8338000478ad755e115b80dfeef44851b3a3b0f99ac33e872c674
                          • Opcode Fuzzy Hash: e250f200d648af3f0bd61970bfe314c861a6b6aa0b25ddc882d3b39d553e7667
                          • Instruction Fuzzy Hash: 07713571E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7785A96DF44
                          APIs
                          • SetFilePointer.KERNELBASE(00409230,00000000,00000000,00000000,00000000,?,?,?,0040300E,000000FF,00000000,00000000,00409230,?), ref: 00403088
                          • WriteFile.KERNELBASE(00000000,00413E90,?,000000FF,00000000,00413E90,00004000,00409230,00409230,00000004,00000004,00000000,00000000,?,?), ref: 00403115
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: File$PointerWrite
                          • String ID:
                          • API String ID: 539440098-0
                          • Opcode ID: 90118ecf7a9ba7c1b0c512c54543666c71b076bc3a218e086344a49311413f62
                          • Instruction ID: e0bff1d0cfda9ca41153e72f66d50dbc15cd376e58f7be5246e1248deba32b17
                          • Opcode Fuzzy Hash: 90118ecf7a9ba7c1b0c512c54543666c71b076bc3a218e086344a49311413f62
                          • Instruction Fuzzy Hash: A2315971504218EBDF20CF65ED45A9F3FB8EB08755F20807AF904EA1A0D3349E40DBA9
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00401FC3
                            • Part of subcall function 004051F2: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                            • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                            • Part of subcall function 004051F2: lstrcatW.KERNEL32(004216C8,00402D94), ref: 0040524D
                            • Part of subcall function 004051F2: SetWindowTextW.USER32(004216C8,004216C8), ref: 0040525F
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                          • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401FD4
                          • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402051
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                          • String ID:
                          • API String ID: 334405425-0
                          • Opcode ID: a26c5c83f9ef2ad83768ff0d809e7d0ff534900b7dfbbf6279fa786ce326c683
                          • Instruction ID: 409458e37c45ac75b59f5eb787cb01d488d5b476e6d1706a1798d0305ac83909
                          • Opcode Fuzzy Hash: a26c5c83f9ef2ad83768ff0d809e7d0ff534900b7dfbbf6279fa786ce326c683
                          • Instruction Fuzzy Hash: A221C571904215F6CF206FA5CE48ADEBAB4AB04358F70427BF610B51E0D7B98E41DA6E
                          APIs
                          • GlobalFree.KERNEL32(0060B6B0), ref: 00401B92
                          • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401BA4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Global$AllocFree
                          • String ID: Call
                          • API String ID: 3394109436-1824292864
                          • Opcode ID: 6cca73d6d58e2ed98b8b4a396753f334a5877edaabae191e0243757acd9d30f1
                          • Instruction ID: 564068f58b03e261203e6aa09dab7f6fb5d2f7f966de6333b684a5604785f160
                          • Opcode Fuzzy Hash: 6cca73d6d58e2ed98b8b4a396753f334a5877edaabae191e0243757acd9d30f1
                          • Instruction Fuzzy Hash: C02190B2610501ABCB10EBA4DD859AEB3B8EB45318B24443BF141B72D1D77CAC419F6D
                          APIs
                            • Part of subcall function 00402C44: RegOpenKeyExW.ADVAPI32(00000000,00000157,00000000,00000022,00000000,?,?), ref: 00402C6C
                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402483
                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 00402496
                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nso4DFA.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Enum$CloseOpenValue
                          • String ID:
                          • API String ID: 167947723-0
                          • Opcode ID: 08eabb2470022ea022f848a6e11dcf38859f7a65a08fdc0a2d34d61b610d36b3
                          • Instruction ID: 26b43d5caf1540d7dd591319e401bc9d0e282b9307c559b8fc2f3b6a2f24773f
                          • Opcode Fuzzy Hash: 08eabb2470022ea022f848a6e11dcf38859f7a65a08fdc0a2d34d61b610d36b3
                          • Instruction Fuzzy Hash: 31F0D1B1A04204AFEB148FA5DE88EBF767CEF80358F10483EF001A21C0D2B85D419B3A
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4584996770.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4584981457.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585012105.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585025776.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: EnumErrorLastWindows
                          • String ID:
                          • API String ID: 14984897-0
                          • Opcode ID: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                          • Instruction ID: 77f315af6c145f6c632c2ebe68d3f6cdb0cf0445c85f86b19d364da59c27affc
                          • Opcode Fuzzy Hash: 59d19e049e546944b5a660a22879eb7514e0dc07886846df9c342dd830f48687
                          • Instruction Fuzzy Hash: 8851C4B9905214DFFB20DFA4DD8675937A8EB443D0F22C42AEA04E721DCE34E990CB55
                          APIs
                            • Part of subcall function 00402C44: RegOpenKeyExW.ADVAPI32(00000000,00000157,00000000,00000022,00000000,?,?), ref: 00402C6C
                          • RegQueryValueExW.ADVAPI32(00000000,00000000,?,00000800,?,?,?,?,00000033), ref: 00402411
                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nso4DFA.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 004024AC
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID:
                          • API String ID: 3677997916-0
                          • Opcode ID: 1a9fe0657147e393f528c99050b99d89897384afc5368568bb5e959df579fbef
                          • Instruction ID: d7ada52d2c39296e820c3ca3910a3186400bd00b77f85fef4b18c2a42e671548
                          • Opcode Fuzzy Hash: 1a9fe0657147e393f528c99050b99d89897384afc5368568bb5e959df579fbef
                          • Instruction Fuzzy Hash: 53115171915205EEDB14CFA0C6889AFB6B4EF40359F20843FE042A72D0D6B85A41DB5A
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: fdfb5bbf2347fc35bcb13febb1c36166d701c4f92b0c5c73d87b5da78d67bd23
                          • Instruction ID: 092ce593f34d4cefb17b57a654468e4a57f6b0d243feea45f1431905bdcf8400
                          • Opcode Fuzzy Hash: fdfb5bbf2347fc35bcb13febb1c36166d701c4f92b0c5c73d87b5da78d67bd23
                          • Instruction Fuzzy Hash: 6F01F431B24210ABE7295B389C05B6A3698E710314F10863FF911F62F1DA78DC13CB4D
                          APIs
                            • Part of subcall function 00402C44: RegOpenKeyExW.ADVAPI32(00000000,00000157,00000000,00000022,00000000,?,?), ref: 00402C6C
                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004022F4
                          • RegCloseKey.ADVAPI32(00000000), ref: 004022FD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CloseDeleteOpenValue
                          • String ID:
                          • API String ID: 849931509-0
                          • Opcode ID: bd7eda068c5a8c487db824b3b1be550dc0b42a90544fb6549d002859b4f80231
                          • Instruction ID: 38b5be8bce117af921f4e5ecf87b48473febfbb911f594cd731ca38f4e60318c
                          • Opcode Fuzzy Hash: bd7eda068c5a8c487db824b3b1be550dc0b42a90544fb6549d002859b4f80231
                          • Instruction Fuzzy Hash: 30F06272A04210ABEB15AFF59A4EBAE7278DB44318F20453BF201B71D1D5FC5D028A7D
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: ShowWindow
                          • String ID:
                          • API String ID: 1268545403-0
                          • Opcode ID: 1e38a0853b33b15907667b679b343be273cdd0c0ce8fe50ce9f9d5bc537c9385
                          • Instruction ID: 75f1c009598274424d440b05a3ad8c81c52a8946c909ad9098faf089b9281bcd
                          • Opcode Fuzzy Hash: 1e38a0853b33b15907667b679b343be273cdd0c0ce8fe50ce9f9d5bc537c9385
                          • Instruction Fuzzy Hash: 2DE04FB2B101049BCB64CBA8ED808FEB7A5AB48314B60453FE902B3290C675AC11CF28
                          APIs
                          • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DDD
                          • EnableWindow.USER32(00000000,00000000), ref: 00401DE8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Window$EnableShow
                          • String ID:
                          • API String ID: 1136574915-0
                          • Opcode ID: c62722b4de750a969799caa90d9ea8d5cd16caa5ee659d71882de8b6985993d0
                          • Instruction ID: 2c80559432ee8e8f64af81f0c0a70d483a1ba28b218ef0fe4a74e939514edfa0
                          • Opcode Fuzzy Hash: c62722b4de750a969799caa90d9ea8d5cd16caa5ee659d71882de8b6985993d0
                          • Instruction Fuzzy Hash: CEE08CB2B04104DBCB50AFF4AA889DD7378AB90369B20087BF402F10D1C2B86C009A3E
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,80000000,00000003), ref: 00405BB8
                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BDA
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                          • Instruction ID: 50e17d5b3030c5d5ce0b1439250f6e41608f831a0cbc2ce1bc41554210f96241
                          • Opcode Fuzzy Hash: 29e75e61bcb11788d424f4f71b5fd4206a8d95c56bb837550d9b6456a4565c05
                          • Instruction Fuzzy Hash: 48D09E71658201EFFF098F20DE16F2EBBA2EB84B00F10562CB656940E0D6715815DB16
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,00000002,?,?), ref: 00402713
                            • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: FilePointerwsprintf
                          • String ID:
                          • API String ID: 327478801-0
                          • Opcode ID: cb0a79905901771ea4c1f75ea25e576bfed89f1d44749c98cb94dfee4278d200
                          • Instruction ID: 39f0610c8197233a3f531ee04e93b66353018be783afcd240567e016e4194b11
                          • Opcode Fuzzy Hash: cb0a79905901771ea4c1f75ea25e576bfed89f1d44749c98cb94dfee4278d200
                          • Instruction Fuzzy Hash: 29E01AB2B14114AADB01ABE5DD49CFEB66CEB40319F20043BF101F00D1C67959019A7E
                          APIs
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040228A
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWrite
                          • String ID:
                          • API String ID: 390214022-0
                          • Opcode ID: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                          • Instruction ID: 4332bbb19f5efe4f35bb732f6f353b7f8865d75a24debaa01da2fd7198b4a795
                          • Opcode Fuzzy Hash: ec4fb41ec1acd106f93cf616f3cd4c0d3577891546256094c6c4aadbcc0c0451
                          • Instruction Fuzzy Hash: 18E04F329041246ADB113EF20E8DE7F31689B44718B24427FF551BA1C2D5BC1D434669
                          APIs
                          • ReadFile.KERNELBASE(00409230,00000000,00000000,00000000,00000000,00413E90,0040BE90,0040330C,00409230,00409230,004031FE,00413E90,00004000,?,00000000,?), ref: 00405C4B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                          • Instruction ID: 63114739b8f5e766059d8f14c8810c8407dd6dd2a261f9f87ac8566b0288577e
                          • Opcode Fuzzy Hash: 706c1f52c55adc451273f1d2a5d46862a6587a7fe095f8bbabcbc32b8b015297
                          • Instruction Fuzzy Hash: F6E08632104259ABDF10AEA08C04EEB375CEB04350F044436F915E3140D230E9209BA4
                          APIs
                          • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E5
                          Memory Dump Source
                          • Source File: 00000000.00000002.4584996770.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4584981457.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585012105.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585025776.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                          • Instruction ID: 0f6967942ea94a3d6c88e3f350f968197b77ea31d8e69eb9713f4ef8856af232
                          • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                          • Instruction Fuzzy Hash: 47F0A5F15057A0DEF350DF688C847063BE4E3483C4B03852AE3A8F6269EB344454CF19
                          APIs
                          • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 004022C6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID:
                          • API String ID: 1096422788-0
                          • Opcode ID: 72cdf40c1bf6f5db5f4d9709fda42ed23ef015487cba6367b71ebc3a35df21ba
                          • Instruction ID: 80fa8228d7b44b53eec3e7c38ed93a9451a1703e345daa2b135a9f68ba926bbf
                          • Opcode Fuzzy Hash: 72cdf40c1bf6f5db5f4d9709fda42ed23ef015487cba6367b71ebc3a35df21ba
                          • Instruction Fuzzy Hash: 38E04F30800204BADB00AFA0CD49EAE3B78BF11344F20843AF581BB0D1E6B895809759
                          APIs
                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015A6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: b1f67d0bd68f695adc8489e74b7692cd90077e549d5f6d1bde923581f8f3e0ae
                          • Instruction ID: 73733a4af0cc64661bb0b95da8c6c6dbb498264e8b287c2b288e90457a890fe4
                          • Opcode Fuzzy Hash: b1f67d0bd68f695adc8489e74b7692cd90077e549d5f6d1bde923581f8f3e0ae
                          • Instruction Fuzzy Hash: B8D012B2B08100D7CB10DFE59A08ADDB765AB50329F304A77D111F21D0D2B885419A3A
                          APIs
                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                          • Instruction ID: 838c4c0eb33ef43ad7257432987c28a2a788b3f909dd0a51a4998ccc95d90969
                          • Opcode Fuzzy Hash: b125a5c22b87fd8b2e045755239ffd7a4507a0aeed0b74e9a53f3222272f23b7
                          • Instruction Fuzzy Hash: 57C09B717443017BDB308B509D49F1777556754B00F1488397700F50E0CA74E452D62D
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402FE7,?), ref: 0040331D
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                          • Instruction ID: 9708a756cc2c9ae94551e8e9c592081b607f980c3267f7876f2ac268d6c84cd7
                          • Opcode Fuzzy Hash: 3f2450370ff6ec370cb83e2696936d8051f71d6c0ea90f8f087f694b7f33879c
                          • Instruction Fuzzy Hash: B8B01231584200BFDA214F00DE05F057B21A790700F10C030B304381F082712420EB5D
                          APIs
                          • SendMessageW.USER32(00000028,?,00000001,00403FFB), ref: 004041DD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                          • Instruction ID: c6b71f3973dfff953bb7db756b4a53cf392e498aed0f9e65811aff82f73edd61
                          • Opcode Fuzzy Hash: 854be05ff51811c00036400083eb45e7be68dca0691a3475263c9078411ad26b
                          • Instruction Fuzzy Hash: 81B09235684200BADA214B00ED09F867A62A768701F008864B300240B0C6B244A2DB19
                          APIs
                          • KiUserCallbackDispatcher.NTDLL(?,00403F94), ref: 004041C6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CallbackDispatcherUser
                          • String ID:
                          • API String ID: 2492992576-0
                          • Opcode ID: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                          • Instruction ID: 8b53a25d375a508ca0f68064fdc939b5f25de369c98bd294fc40859475f67141
                          • Opcode Fuzzy Hash: 52bdda195f1be107111d33c53c23f47bc3bdbd5ca81d52a4b6bb6385c1bcbce2
                          • Instruction Fuzzy Hash: 02A01132808000ABCA028BA0EF08C0ABB22BBB8300B008A3AB2008003082320820EB0A
                          APIs
                          • Sleep.KERNELBASE(00000000), ref: 004014E6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 8ba86804e83874a1906e97ec6801ccf3b7d57510e6f7f4a869b12a6ffab4bff6
                          • Instruction ID: 43bd389e684fdc992c114de42b340604c9c8a7aa9960d5983178e32e9e1c03f3
                          • Opcode Fuzzy Hash: 8ba86804e83874a1906e97ec6801ccf3b7d57510e6f7f4a869b12a6ffab4bff6
                          • Instruction Fuzzy Hash: 42D0C9B7B141409BDB50EBB8AE8989B73A8E7913297204C73D942F20A1D178D8029A39
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 00404B86
                          • GetDlgItem.USER32(?,00000408), ref: 00404B91
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404BDB
                          • LoadBitmapW.USER32(0000006E), ref: 00404BEE
                          • SetWindowLongW.USER32(?,000000FC,00405166), ref: 00404C07
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404C1B
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404C2D
                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404C43
                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404C4F
                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404C61
                          • DeleteObject.GDI32(00000000), ref: 00404C64
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404C8F
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404C9B
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D31
                          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404D5C
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404D70
                          • GetWindowLongW.USER32(?,000000F0), ref: 00404D9F
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404DAD
                          • ShowWindow.USER32(?,00000005), ref: 00404DBE
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00404EBB
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404F20
                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404F35
                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00404F59
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00404F79
                          • ImageList_Destroy.COMCTL32(?), ref: 00404F8E
                          • GlobalFree.KERNEL32(?), ref: 00404F9E
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405017
                          • SendMessageW.USER32(?,00001102,?,?), ref: 004050C0
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004050CF
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004050EF
                          • ShowWindow.USER32(?,00000000), ref: 0040513D
                          • GetDlgItem.USER32(?,000003FE), ref: 00405148
                          • ShowWindow.USER32(00000000), ref: 0040514F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 1638840714-813528018
                          • Opcode ID: c0ce892580bc14cf4332d57b508c1e8237967f859a0b842146343ba826295983
                          • Instruction ID: c838968d9b53d15d037ad3ebbdc97e0e82191de3b695f5e6670933e8e46a19ea
                          • Opcode Fuzzy Hash: c0ce892580bc14cf4332d57b508c1e8237967f859a0b842146343ba826295983
                          • Instruction Fuzzy Hash: E9026EB0A00209EFDB209F94DC85AAE7BB5FB44314F10857AF610BA2E1C7799D42CF58
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 00404684
                          • SetWindowTextW.USER32(00000000,?), ref: 004046AE
                          • SHBrowseForFolderW.SHELL32(?), ref: 0040475F
                          • CoTaskMemFree.OLE32(00000000), ref: 0040476A
                          • lstrcmpiW.KERNEL32(Call,004226E8,00000000,?,?), ref: 0040479C
                          • lstrcatW.KERNEL32(?,Call), ref: 004047A8
                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 004047BA
                            • Part of subcall function 00405708: GetDlgItemTextW.USER32(?,?,00000400,004047F1), ref: 0040571B
                            • Part of subcall function 004061DC: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 0040623F
                            • Part of subcall function 004061DC: CharNextW.USER32(?,?,?,00000000), ref: 0040624E
                            • Part of subcall function 004061DC: CharNextW.USER32(?,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 00406253
                            • Part of subcall function 004061DC: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 00406266
                          • GetDiskFreeSpaceW.KERNEL32(004206B8,?,?,0000040F,?,004206B8,004206B8,?,00000000,004206B8,?,?,000003FB,?), ref: 0040487B
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404896
                          • SetDlgItemTextW.USER32(00000000,00000400,004206A8), ref: 0040490F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                          • String ID: A$C:\Users\user\brugerlicensaftalerne$Call$&B
                          • API String ID: 2246997448-840817404
                          • Opcode ID: 0ddb93969d7d4b6c2286eeeb01da71e9d9c76c94d99e26f32eb17bb22fa58419
                          • Instruction ID: 6e37369fe6ef7f71d764005b1086c215e28ed7130f32df1ae996be3c53d44702
                          • Opcode Fuzzy Hash: 0ddb93969d7d4b6c2286eeeb01da71e9d9c76c94d99e26f32eb17bb22fa58419
                          • Instruction Fuzzy Hash: A79170F1900219EBDB10AFA1DC85AAF77B8EF85714F10443BF601B62D1D77C9A418B69
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: 5$@NYJ$C$\V]
                          • API String ID: 0-1467138375
                          • Opcode ID: bc86d0d1d9b6a058160d52c7993bfcc76f40009260e2044a645cf0e7857c6290
                          • Instruction ID: b7c299c7ffe5fee660f4392da570862159187f242fec53a71c5b276364060354
                          • Opcode Fuzzy Hash: bc86d0d1d9b6a058160d52c7993bfcc76f40009260e2044a645cf0e7857c6290
                          • Instruction Fuzzy Hash: B0B18632904259CFDF20CE68C8847DA77B1FF86361F59422EDC88AB655C7349D86CB80
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: 5$@NYJ$C$\V]
                          • API String ID: 0-1467138375
                          • Opcode ID: bab15f73c9cf7e303fcc4a99da228337517bdd1a181862b544523f8b8ce96291
                          • Instruction ID: 01c692332c4817058d5bfd494c28687edc3bd69615ad3a7af6b28fa584a45d9e
                          • Opcode Fuzzy Hash: bab15f73c9cf7e303fcc4a99da228337517bdd1a181862b544523f8b8ce96291
                          • Instruction Fuzzy Hash: 1391B936A04355CFDF309EA8C8D87DA37A2BF96352F95402EDD849F652C7748942CB42
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: ``t$Jg$\V]
                          • API String ID: 0-3519095151
                          • Opcode ID: 9ff7f6e451b52de52b5aaf0cd59f4c806b69bca329cbdfbc63ea7362f036c953
                          • Instruction ID: fd80b92bebde9dd2b183e1722caa2e40fe00eaea772a7c18bdbf88bfea9c8640
                          • Opcode Fuzzy Hash: 9ff7f6e451b52de52b5aaf0cd59f4c806b69bca329cbdfbc63ea7362f036c953
                          • Instruction Fuzzy Hash: C8E18776608345CFDF389E38CD687EB37A2AFD5790F55412EDC899B644C7308A46CA42
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: X7q$~n$\V]
                          • API String ID: 0-2304549257
                          • Opcode ID: d4b0f8f56eae113a2b56a839c0f0314b950defeb44ff050763e0025a22a918cd
                          • Instruction ID: aca891aee71396f523345e063e8d56376cb3fba4dfc1c2d8fbef11b94c237908
                          • Opcode Fuzzy Hash: d4b0f8f56eae113a2b56a839c0f0314b950defeb44ff050763e0025a22a918cd
                          • Instruction Fuzzy Hash: 27B17575508399CFCB35EF2988587DA7BA2FF913A1F50812DDC888BA55C7308A86CB51
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: .VU$ze$\V]
                          • API String ID: 0-1780004451
                          • Opcode ID: 02cfafb2af4d2147a00961bc5ac73c44607b3bc48719e53df34af3725082f18b
                          • Instruction ID: 6717852deaf1a9e87160864af7cd4f5b9f9b684bc888d257e1df15a050da870f
                          • Opcode Fuzzy Hash: 02cfafb2af4d2147a00961bc5ac73c44607b3bc48719e53df34af3725082f18b
                          • Instruction Fuzzy Hash: 05B14472509789CFDB35DF68C9187EA3BA1FF91311F94812EDC488BA56C7358A42CB42
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: 5$@NYJ$C
                          • API String ID: 0-2924726793
                          • Opcode ID: 9bb2a6ee4fb8beac34498d9f5f6ed9096355a63b6b7cc0f32dc12632a82a883c
                          • Instruction ID: 310752a306bb83c343b13e7164d826bc152085687ab2ea2c0965e8b1f6da719e
                          • Opcode Fuzzy Hash: 9bb2a6ee4fb8beac34498d9f5f6ed9096355a63b6b7cc0f32dc12632a82a883c
                          • Instruction Fuzzy Hash: 3E91A976904355CFDF218F6488D53EA7BB1FF96312F4A406EC8999F652D3348A42CB81
                          APIs
                          • CoCreateInstance.OLE32(00407474,?,00000001,00407464,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004020BD
                          Strings
                          • C:\Users\user\brugerlicensaftalerne\Isidora, xrefs: 004020FB
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID: C:\Users\user\brugerlicensaftalerne\Isidora
                          • API String ID: 542301482-2633333261
                          • Opcode ID: c3ac8376005eb2128101160bb39d3078d5e8ab7fad74fdd7db3a3b4458e935d7
                          • Instruction ID: 3f054c58238b343a02ca2e9776fd111f4d7efc3a485c04e582207c90830a0c16
                          • Opcode Fuzzy Hash: c3ac8376005eb2128101160bb39d3078d5e8ab7fad74fdd7db3a3b4458e935d7
                          • Instruction Fuzzy Hash: BC414F75A00105BFCB00DFA4C988EAE7BB5BF49318B20416AF505EF2D1D679AD41CB54
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: ?hNK$\V]
                          • API String ID: 0-1299247497
                          • Opcode ID: 1519a193192b630b474dc756e545c3342d3a27c829a69b371f27eab4c735c86d
                          • Instruction ID: db47a161adf7177306c69399b6793c35135009a60da36fe23f8a10378874f90d
                          • Opcode Fuzzy Hash: 1519a193192b630b474dc756e545c3342d3a27c829a69b371f27eab4c735c86d
                          • Instruction Fuzzy Hash: 6EA122366042958BCF30AE7889547EF77E2AFC6750F55422EDC889B654DB308A82CB42
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: e);$~
                          • API String ID: 0-3093011733
                          • Opcode ID: 70c29255e394640e30d9e0b57f08dd21191caa1d39200a68671847d7091659d7
                          • Instruction ID: 870d6cf63a8af6519c529afe0854620d8e277cc4b1aff96f01fd3f634acf2922
                          • Opcode Fuzzy Hash: 70c29255e394640e30d9e0b57f08dd21191caa1d39200a68671847d7091659d7
                          • Instruction Fuzzy Hash: EE810176604786CFDB296D38CDB43E63B926F92391F18422ECC848B686D7358446CB52
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: )=T$\V]
                          • API String ID: 0-798806083
                          • Opcode ID: cfaad1e118a0241d11fc67f09e8facde21e9e24e943019bc05ad9bb3bf385fe8
                          • Instruction ID: 5939b1949a395cc88bcb22bed130d4e746afe453bbf53ea0b2402f01432109ef
                          • Opcode Fuzzy Hash: cfaad1e118a0241d11fc67f09e8facde21e9e24e943019bc05ad9bb3bf385fe8
                          • Instruction Fuzzy Hash: 426145B5604289CFDB34AF288CA97DF33A6AF98350F91412EDC8D9B744D7308A45CB41
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040277F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: c29cc584e89206ddd90cc1717f0c3dadd219838f9a220d036a6385bc3b1c76f5
                          • Instruction ID: 2908b39070a7deba1428861388b98b097f8f9174a2682adf846a4f1dff5e2c07
                          • Opcode Fuzzy Hash: c29cc584e89206ddd90cc1717f0c3dadd219838f9a220d036a6385bc3b1c76f5
                          • Instruction Fuzzy Hash: D5F05EB16101149BCB00DBA4DD499BEB378FF04318F3005BAE151F31D0D6B859409B2A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: \V]
                          • API String ID: 0-3082944825
                          • Opcode ID: db06de5ffb6c32c9369c4aa4edadae22905a59ceadf3a87eae8c17189a0976aa
                          • Instruction ID: 8ccf9818813631d37154009cbc9a30f633f13b648e3fd0ef3ebd3f22f26a2170
                          • Opcode Fuzzy Hash: db06de5ffb6c32c9369c4aa4edadae22905a59ceadf3a87eae8c17189a0976aa
                          • Instruction Fuzzy Hash: A751EA76B443428FDB228F78CCD17DB7BA5EFC3221B68861ADC8987650C3344946C351
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID: 2h)
                          • API String ID: 0-49650515
                          • Opcode ID: 1d81e17bbff65da7992f0a2259d3f77a25a3219315a7af8a185ffd353359f479
                          • Instruction ID: 53d3d9c651994947db89095e257ba71254d893731d9871cb9bbd3a8b52471194
                          • Opcode Fuzzy Hash: 1d81e17bbff65da7992f0a2259d3f77a25a3219315a7af8a185ffd353359f479
                          • Instruction Fuzzy Hash: 78E068692183C5A7C31F9F349876BA27FF37B8B410714429DE0839F381CD2058C2C652
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: eb6af94f5a80a8d598b51203bf55d8216076c9ccde46f2866097b61347b3334c
                          • Instruction ID: ebdda14202ad46f4ae6f35e4af32478fa5327978453b9ffb472a57e5b0e38b66
                          • Opcode Fuzzy Hash: eb6af94f5a80a8d598b51203bf55d8216076c9ccde46f2866097b61347b3334c
                          • Instruction Fuzzy Hash: 4DA1EC72508389CFCB39DF7898602EA7FB5EF86355F14456EC8828BA52CB35C54AC781
                          Memory Dump Source
                          • Source File: 00000000.00000002.4581430279.0000000007F1C000.00000040.00001000.00020000.00000000.sdmp, Offset: 07F1C000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_7f1c000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 52aad167a038e58a6acd28c816ea418b2bde18ccf5ad777fdc080e4d679255a7
                          • Instruction ID: d6b3a336477ed843b3904fdc8447dac65fbd05abc8776290a3441543d2f5a665
                          • Opcode Fuzzy Hash: 52aad167a038e58a6acd28c816ea418b2bde18ccf5ad777fdc080e4d679255a7
                          • Instruction Fuzzy Hash: AB417CA574530A5B9F2C6D2889B23FF32936FD1281B54812FCD4BC7F98DB30C4968512
                          APIs
                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004043D5
                          • GetDlgItem.USER32(?,000003E8), ref: 004043E9
                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404406
                          • GetSysColor.USER32(?), ref: 00404417
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404425
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404433
                          • lstrlenW.KERNEL32(?), ref: 00404438
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00404445
                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 0040445A
                          • GetDlgItem.USER32(?,0000040A), ref: 004044B3
                          • SendMessageW.USER32(00000000), ref: 004044BA
                          • GetDlgItem.USER32(?,000003E8), ref: 004044E5
                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404528
                          • LoadCursorW.USER32(00000000,00007F02), ref: 00404536
                          • SetCursor.USER32(00000000), ref: 00404539
                          • ShellExecuteW.SHELL32(0000070B,open,004271A0,00000000,00000000,00000001), ref: 0040454E
                          • LoadCursorW.USER32(00000000,00007F00), ref: 0040455A
                          • SetCursor.USER32(00000000), ref: 0040455D
                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040458C
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 0040459E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                          • String ID: Call$N$open
                          • API String ID: 3615053054-2563687911
                          • Opcode ID: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                          • Instruction ID: 8b9c65ccee0929ae2cd37a550bbe3266d1c56d3aba5277cbe5cc7d17fb3eae84
                          • Opcode Fuzzy Hash: 3a3e15a46bcef9b8006e363d6ddaa5c0bc478510f2ba28bfd0355cb20498c547
                          • Instruction Fuzzy Hash: 19718FB1A00209FFDB109F60DD85A6A7BA9FB94354F00853AFB01B62D1C778AD51CF99
                          APIs
                          • lstrcpyW.KERNEL32(00425D88,NUL), ref: 00405C76
                          • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,?,00405E0A,?,?,00000001,00405982,?,00000000,000000F1,?), ref: 00405C9A
                          • GetShortPathNameW.KERNEL32(00000000,00425D88,00000400), ref: 00405CA3
                            • Part of subcall function 00405B19: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B29
                            • Part of subcall function 00405B19: lstrlenA.KERNEL32(00405D53,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B5B
                          • GetShortPathNameW.KERNEL32(?,00426588,00000400), ref: 00405CC0
                          • wsprintfA.USER32 ref: 00405CDE
                          • GetFileSize.KERNEL32(00000000,00000000,00426588,C0000000,00000004,00426588,?,?,?,?,?), ref: 00405D19
                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 00405D28
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00405D60
                          • SetFilePointer.KERNEL32(?,00000000,00000000,00000000,00000000,00425988,00000000,-0000000A,00409560,00000000,[Rename],00000000,00000000,00000000), ref: 00405DB6
                          • WriteFile.KERNEL32(?,00000000,00000000,?,00000000), ref: 00405DC8
                          • GlobalFree.KERNEL32(00000000), ref: 00405DCF
                          • CloseHandle.KERNEL32(00000000), ref: 00405DD6
                            • Part of subcall function 00405BB4: GetFileAttributesW.KERNELBASE(00000003,00402DFF,C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,80000000,00000003), ref: 00405BB8
                            • Part of subcall function 00405BB4: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405BDA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizeWritewsprintf
                          • String ID: %ls=%ls$NUL$[Rename]
                          • API String ID: 1265525490-899692902
                          • Opcode ID: 559503feb89d21a9c334d896a0f7a2de64537d5462d12f25622628eabbc9644b
                          • Instruction ID: 10a6a65bcc8db41326b0965a868e5b78be2cc6b43571d182478210b5aa6aebd6
                          • Opcode Fuzzy Hash: 559503feb89d21a9c334d896a0f7a2de64537d5462d12f25622628eabbc9644b
                          • Instruction Fuzzy Hash: E941FE71604A18BFD2206B61AC4CF6B3A6CEF45714F24443BB901B62D2EA78AD018A7D
                          APIs
                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextW.USER32(00000000,00428200,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                          • Instruction ID: fcf32cd20748a1213536d9d4e972d5f65e682a1af5e7fde79162f5b09e182029
                          • Opcode Fuzzy Hash: c8f07ac8fddda19ee2bf7cb4f90658f54556206f608d49a47768e3a2d0e378b6
                          • Instruction Fuzzy Hash: D2418B71804249AFCB058FA5DD459BFBBB9FF44310F00852AF561AA1A0C738EA51DFA5
                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 0040623F
                          • CharNextW.USER32(?,?,?,00000000), ref: 0040624E
                          • CharNextW.USER32(?,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe",C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 00406253
                          • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403332,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 00406266
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 589700163-883859158
                          • Opcode ID: 1606a10478bcb54d9e464e7e1942e813b7f97a0a03c371f366e1e5ab139a473f
                          • Instruction ID: 5b12d47152ff200ae170f947aa1a5954375b24b0904b9d00ef93706c4e891e75
                          • Opcode Fuzzy Hash: 1606a10478bcb54d9e464e7e1942e813b7f97a0a03c371f366e1e5ab139a473f
                          • Instruction Fuzzy Hash: 1311E61580020295DB303B548C44AB772F8EF95750F42807FED9A732C1E77C5CA286BD
                          APIs
                          • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nso4DFA.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nso4DFA.tmp\System.dll,00000400,?,?,00000021), ref: 0040252F
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nso4DFA.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nso4DFA.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nso4DFA.tmp\System.dll,00000400,?,?,00000021), ref: 00402536
                          • WriteFile.KERNEL32(00000000,?,C:\Users\user\AppData\Local\Temp\nso4DFA.tmp\System.dll,00000000,?,?,00000000,00000011), ref: 00402568
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: ByteCharFileMultiWideWritelstrlen
                          • String ID: 8$C:\Users\user\AppData\Local\Temp\nso4DFA.tmp$C:\Users\user\AppData\Local\Temp\nso4DFA.tmp\System.dll
                          • API String ID: 1453599865-760636321
                          • Opcode ID: 6125aa081e30e47da40ee1c37d73e388ad7d86d91ab132d95cfa165a77b7831e
                          • Instruction ID: a0446c0b0672562d506aa58c1ab7e20caafec20b23fb80a76c6cc5bad6f3e06b
                          • Opcode Fuzzy Hash: 6125aa081e30e47da40ee1c37d73e388ad7d86d91ab132d95cfa165a77b7831e
                          • Instruction Fuzzy Hash: C0015271A44214FFD700AFB09E8AEAB7278AF51719F20453BB102B61D1D6BC5E419A2D
                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 0040421E
                          • GetSysColor.USER32(00000000), ref: 0040423A
                          • SetTextColor.GDI32(?,00000000), ref: 00404246
                          • SetBkMode.GDI32(?,?), ref: 00404252
                          • GetSysColor.USER32(?), ref: 00404265
                          • SetBkColor.GDI32(?,?), ref: 00404275
                          • DeleteObject.GDI32(?), ref: 0040428F
                          • CreateBrushIndirect.GDI32(?), ref: 00404299
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                          • Instruction ID: b52404dbcc62fb778985b33cde271554a932a1fc376a4a1675ca0a40f23ca1f0
                          • Opcode Fuzzy Hash: b90be86f4b41523f1c687d93ae3cdfe665fb5c0f546787b0b5a2f8f889851cd4
                          • Instruction Fuzzy Hash: B821A4B1A04704ABCB219F68DD08B4B7BF8AF80700F04896DFD91E22E1C338E804CB65
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 00402809
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402825
                          • GlobalFree.KERNEL32(FFFFFD66), ref: 0040285E
                          • WriteFile.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402870
                          • GlobalFree.KERNEL32(00000000), ref: 00402877
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,000000F0), ref: 0040288F
                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,000000F0), ref: 004028A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                          • String ID:
                          • API String ID: 3294113728-0
                          • Opcode ID: 175540e7daea46f04fdcb39c2d6b9fb6ccbbe72b81495e9a418fab8b18cc96be
                          • Instruction ID: c76d0c3f0677147b44531d70e17f5e21854c5a6159b3e076b4812541e28699f2
                          • Opcode Fuzzy Hash: 175540e7daea46f04fdcb39c2d6b9fb6ccbbe72b81495e9a418fab8b18cc96be
                          • Instruction Fuzzy Hash: C931BF72C00118BBDF11AFA5CE49DAF7E79EF04324F20423AF510762E1C6796E418BA9
                          APIs
                          • DestroyWindow.USER32(00000000,00000000), ref: 00402D35
                          • GetTickCount.KERNEL32 ref: 00402D53
                          • wsprintfW.USER32 ref: 00402D81
                            • Part of subcall function 004051F2: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                            • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                            • Part of subcall function 004051F2: lstrcatW.KERNEL32(004216C8,00402D94), ref: 0040524D
                            • Part of subcall function 004051F2: SetWindowTextW.USER32(004216C8,004216C8), ref: 0040525F
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                          • CreateDialogParamW.USER32(0000006F,00000000,00402C7F,00000000), ref: 00402DA5
                          • ShowWindow.USER32(00000000,00000005), ref: 00402DB3
                            • Part of subcall function 00402CFE: MulDiv.KERNEL32(00000000,00000064,0000019F), ref: 00402D13
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                          • String ID: ... %d%%
                          • API String ID: 722711167-2449383134
                          • Opcode ID: 005642a4020e0a71c09553eb7eb2d495990d68115b85ca719a2b531c3bc6c152
                          • Instruction ID: 6ab1becf65089363c82906b09123353a2bcc309babf83807567d4fce196db36a
                          • Opcode Fuzzy Hash: 005642a4020e0a71c09553eb7eb2d495990d68115b85ca719a2b531c3bc6c152
                          • Instruction Fuzzy Hash: CD015E31909220EBC7616B64EE5DBDB3A68AB00704B14457BF905B11F1C6B85C45CFAE
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404AD7
                          • GetMessagePos.USER32 ref: 00404ADF
                          • ScreenToClient.USER32(?,?), ref: 00404AF9
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404B0B
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404B31
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                          • Instruction ID: 0eecd9b69481b59551465bcf9db52b38cf56a1a0cd5b93a9aa54e622b558eefa
                          • Opcode Fuzzy Hash: 06f6ebea5bc1d9fbd35e9f77c39338462eb0780e6261c6c1cca29060ed6e4b7a
                          • Instruction Fuzzy Hash: 4B015E71E00219BADB10DBA4DD85FFEBBBCAB94711F10012BBB10B61D0D7B4A9018BA5
                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C9D
                          • wsprintfW.USER32 ref: 00402CD1
                          • SetWindowTextW.USER32(?,?), ref: 00402CE1
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402CF3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                          • API String ID: 1451636040-1158693248
                          • Opcode ID: fb2a05d00326c25166bc5f9aaa13d1f718a743be953a9e67bdfa073c3cfab417
                          • Instruction ID: 6313022a6a14420ec29aadc91542e870ad3eb66361cb8d6516b6428425dce57e
                          • Opcode Fuzzy Hash: fb2a05d00326c25166bc5f9aaa13d1f718a743be953a9e67bdfa073c3cfab417
                          • Instruction Fuzzy Hash: 36F01270504108ABEF205F50DD4ABAE3768BB00309F00843AFA16B51D1DBB95959DB59
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 10002416
                            • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                          • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.4584996770.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4584981457.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585012105.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585025776.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                          • String ID:
                          • API String ID: 4216380887-0
                          • Opcode ID: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                          • Instruction ID: a8798eece1b67337def5fc6f06e905ed3cc6fca3e5836deafc22007a072d802d
                          • Opcode Fuzzy Hash: 3b2da28fc6c9bb4151d71d136a2166c584fe2e1793c0aa67a83c17282771645f
                          • Instruction Fuzzy Hash: A14190B1508305EFF320DF24D885AAA77F8FB883D0F50452DF9468619ADB34AA54DB61
                          APIs
                            • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                          • GlobalFree.KERNEL32(?), ref: 10002572
                          • GlobalFree.KERNEL32(00000000), ref: 100025AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4584996770.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4584981457.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585012105.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585025776.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                          • Instruction ID: 76257f5bf6759f365bfcd452de7d39bb0b2322773c3eba187a8a795e141f7608
                          • Opcode Fuzzy Hash: a621a955531d0e661206b23193f22b54096652e1fd49661ebc4a0141683b6ddb
                          • Instruction Fuzzy Hash: 6831DE71504A21EFF321CF14CCA8E2B7BF8FB853D2F114529FA40961A8CB319851DB69
                          APIs
                          • lstrlenW.KERNEL32(004226E8,004226E8,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,0000040F,00000400,00000000), ref: 00404A67
                          • wsprintfW.USER32 ref: 00404A70
                          • SetDlgItemTextW.USER32(?,004226E8), ref: 00404A83
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s$&B
                          • API String ID: 3540041739-2907463167
                          • Opcode ID: bc3b7f17ced557010f42f2a5da3d553c1ee365e0fd64efe36082f95fd3b84f34
                          • Instruction ID: b2bc00afb158c588b9a06456614f3f49c694bd1d1c2ad39e9d347cd1a0135542
                          • Opcode Fuzzy Hash: bc3b7f17ced557010f42f2a5da3d553c1ee365e0fd64efe36082f95fd3b84f34
                          • Instruction Fuzzy Hash: 131126737001247BCB10A66D9C45EDF324DDBC5334F144237FA65F60D1D938882186E8
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4584996770.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4584981457.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585012105.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585025776.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: FreeGlobal
                          • String ID:
                          • API String ID: 2979337801-0
                          • Opcode ID: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                          • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                          • Opcode Fuzzy Hash: 2b8b4b1e7525df0b70178d99aec232a76bf74dae3dcdb19d2f86b3abb44108d8
                          • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                          APIs
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                          • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                          • GlobalFree.KERNEL32(00000000), ref: 10001642
                          Memory Dump Source
                          • Source File: 00000000.00000002.4584996770.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4584981457.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585012105.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585025776.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                          • String ID:
                          • API String ID: 1148316912-0
                          • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                          • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                          • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                          • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00401CEB
                          • GetClientRect.USER32(00000000,?), ref: 00401CF8
                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D19
                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D27
                          • DeleteObject.GDI32(00000000), ref: 00401D36
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: 5757bc3562e7fd28978ac45cc7d9905cf04a78579febaaeea46e845b0a190490
                          • Instruction ID: 421c968aeac85d0930bc76aa4bc7d64c85250730bd7c855cb2b2db6532b3540a
                          • Opcode Fuzzy Hash: 5757bc3562e7fd28978ac45cc7d9905cf04a78579febaaeea46e845b0a190490
                          • Instruction Fuzzy Hash: F9F0E1B2A04104BFDB01DBE4EE88DEEB7BCEB08305B104466F601F5190C674AD018B35
                          APIs
                          • GetDC.USER32(?), ref: 00401D44
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401D51
                          • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D60
                          • ReleaseDC.USER32(?,00000000), ref: 00401D71
                          • CreateFontIndirectW.GDI32(0040BDA0), ref: 00401DBC
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectRelease
                          • String ID:
                          • API String ID: 3808545654-0
                          • Opcode ID: 42daf7e862d24205765a2c482219e26c12b6d25ebfb053d7a945aa5fdfa94cc8
                          • Instruction ID: b353f613be9e85a79a94993a8857fa9d5f5277bee054f22ce4286571968d2ed5
                          • Opcode Fuzzy Hash: 42daf7e862d24205765a2c482219e26c12b6d25ebfb053d7a945aa5fdfa94cc8
                          • Instruction Fuzzy Hash: 4A016D31948285EFEB416BB0AE0AFDABF74EB65305F144479F141B62E2C77810058B6E
                          APIs
                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C2A
                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401C42
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                          • Instruction ID: bea79b3a0ece1bc6ad67d762bc59202c8df9b0d3ac543b92a9f7cfbf89d94624
                          • Opcode Fuzzy Hash: 9bf1345347551ad99251b033a374dd29c38f8ee43bbdf8c6824fc78253d04776
                          • Instruction Fuzzy Hash: 6B217471A44109BEDF019FB0C94AFAD7B75EF44748F20413AF502B61D1D6B8A941DB18
                          APIs
                          • CharNextW.USER32(?,?,Antegrade\Fravristelse213.Sto226,?,00405AB2,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,?,?,75922EE0,004057F0,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"), ref: 00405A4C
                          • CharNextW.USER32(00000000), ref: 00405A51
                          • CharNextW.USER32(00000000), ref: 00405A69
                          Strings
                          • Antegrade\Fravristelse213.Sto226, xrefs: 00405A3F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CharNext
                          • String ID: Antegrade\Fravristelse213.Sto226
                          • API String ID: 3213498283-844488938
                          • Opcode ID: 21c909a7070704e5dbb7e9601562fce6107f8a8183e885fdad65ddb46c3d8f9e
                          • Instruction ID: 3370e48302fb4b38b4c5194c943d3a4fd1b010f94388a0a3dcc183d660c6baaf
                          • Opcode Fuzzy Hash: 21c909a7070704e5dbb7e9601562fce6107f8a8183e885fdad65ddb46c3d8f9e
                          • Instruction Fuzzy Hash: 2CF09651F10B2295DF3177A44CC5E7B57B8EB58760B04853BE601B72C0E3B84D818F9A
                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403344,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 00405999
                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403344,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,75923420,00403542), ref: 004059A3
                          • lstrcatW.KERNEL32(?,00409014), ref: 004059B5
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405993
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-823278215
                          • Opcode ID: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                          • Instruction ID: a3647a5b8e032715a8ecc0c41ac115d98c53e42c85c632df021e5d83325ae185
                          • Opcode Fuzzy Hash: ff6b15c2f5550a5b1ad39c2dabef59c5d9ab40b11c2ea079a8f7966cac1aab2f
                          • Instruction Fuzzy Hash: 74D0A731101930AAD212BB548C04DDF739CEE45301740407BF605B30A1C77C1D418BFD
                          APIs
                          • GetFileVersionInfoSizeW.VERSION(00000000,?,000000EE), ref: 00401F17
                          • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401F39
                          • GetFileVersionInfoW.VERSION(?,?,00000000,00000000), ref: 00401F50
                          • VerQueryValueW.VERSION(?,00409014,?,?,?,?,00000000,00000000), ref: 00401F69
                            • Part of subcall function 00405E8F: wsprintfW.USER32 ref: 00405E9C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                          • String ID:
                          • API String ID: 1404258612-0
                          • Opcode ID: 3b082d3ae56cd80e188a89b5e125e5232bc00da1bbd486e0c7b94093934bebb9
                          • Instruction ID: 99fd8a33424c76a20816063d32e2a6550cff77f564c1afe2c3b0238effae22d3
                          • Opcode Fuzzy Hash: 3b082d3ae56cd80e188a89b5e125e5232bc00da1bbd486e0c7b94093934bebb9
                          • Instruction Fuzzy Hash: 93113675A00108AECB00DFA5C945DAEBBBAEF44344F20407AF905F62E1D7349E50DB68
                          APIs
                            • Part of subcall function 004051F2: lstrlenW.KERNEL32(004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000,?), ref: 0040522A
                            • Part of subcall function 004051F2: lstrlenW.KERNEL32(00402D94,004216C8,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D94,00000000), ref: 0040523A
                            • Part of subcall function 004051F2: lstrcatW.KERNEL32(004216C8,00402D94), ref: 0040524D
                            • Part of subcall function 004051F2: SetWindowTextW.USER32(004216C8,004216C8), ref: 0040525F
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405285
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 0040529F
                            • Part of subcall function 004051F2: SendMessageW.USER32(?,00001013,?,00000000), ref: 004052AD
                            • Part of subcall function 004056C3: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256F0,Error launching installer), ref: 004056E8
                            • Part of subcall function 004056C3: CloseHandle.KERNEL32(?), ref: 004056F5
                          • WaitForSingleObject.KERNEL32(00000000,00000064,00000000,000000EB,00000000), ref: 00401E80
                          • WaitForSingleObject.KERNEL32(?,00000064,0000000F), ref: 00401E95
                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EA2
                          • CloseHandle.KERNEL32(?,00000000,000000EB,00000000), ref: 00401EC9
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleObjectProcessSingleWaitlstrlen$CodeCreateExitTextWindowlstrcat
                          • String ID:
                          • API String ID: 3585118688-0
                          • Opcode ID: 31d36f602dcab66d188b5b3b2e777ee9953d6626e675800b0e1fc5d87eda0f2f
                          • Instruction ID: 663650117de36b32c607de2b5c5339e49b80fcfff4c178b035665d2e4b1c7066
                          • Opcode Fuzzy Hash: 31d36f602dcab66d188b5b3b2e777ee9953d6626e675800b0e1fc5d87eda0f2f
                          • Instruction Fuzzy Hash: 8811A131E00204EBCF109FA0CD449EF7AB5EB44315F20447BE505B62E0C7798A82DBA9
                          APIs
                            • Part of subcall function 00405F48: lstrcpynW.KERNEL32(?,?,00000400,004033C8,00428200,NSIS Error), ref: 00405F55
                            • Part of subcall function 00405A3E: CharNextW.USER32(?,?,Antegrade\Fravristelse213.Sto226,?,00405AB2,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,?,?,75922EE0,004057F0,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"), ref: 00405A4C
                            • Part of subcall function 00405A3E: CharNextW.USER32(00000000), ref: 00405A51
                            • Part of subcall function 00405A3E: CharNextW.USER32(00000000), ref: 00405A69
                          • lstrlenW.KERNEL32(Antegrade\Fravristelse213.Sto226,00000000,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,?,?,75922EE0,004057F0,?,C:\Users\user\AppData\Local\Temp\,75922EE0,"C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe"), ref: 00405AF4
                          • GetFileAttributesW.KERNEL32(Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,00000000,Antegrade\Fravristelse213.Sto226,Antegrade\Fravristelse213.Sto226,?,?,75922EE0,004057F0,?,C:\Users\user\AppData\Local\Temp\,75922EE0), ref: 00405B04
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: Antegrade\Fravristelse213.Sto226
                          • API String ID: 3248276644-844488938
                          • Opcode ID: 7ce201bf88eaf48813c7c66b2d703cb578c55b534477fae0be54905458882fdd
                          • Instruction ID: d8ec0bb6260b8bc6bf9377f80a5ae864fb4799106b1aa2bc96123f944ca7c929
                          • Opcode Fuzzy Hash: 7ce201bf88eaf48813c7c66b2d703cb578c55b534477fae0be54905458882fdd
                          • Instruction Fuzzy Hash: 61F0A425305E5259EA22323A5C85AAF3548CF82364759077FF852B22D2DB3C8D43DDBE
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00405195
                          • CallWindowProcW.USER32(?,?,?,?), ref: 004051E6
                            • Part of subcall function 004041E6: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004041F8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: 843aab861ffb3f3227d1c446d01b64cf4776ac7e98eef2f295c4549480fb80e8
                          • Instruction ID: 7fff49106f067b4291516d9fc604604598bdb5380bd5c908914395e8565309e0
                          • Opcode Fuzzy Hash: 843aab861ffb3f3227d1c446d01b64cf4776ac7e98eef2f295c4549480fb80e8
                          • Instruction Fuzzy Hash: 26015E71900609BBDB205F51ED84B6B3A26E794364F604037FA007A2D1D77A9C919F69
                          APIs
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,004256F0,Error launching installer), ref: 004056E8
                          • CloseHandle.KERNEL32(?), ref: 004056F5
                          Strings
                          • Error launching installer, xrefs: 004056D6
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: Error launching installer
                          • API String ID: 3712363035-66219284
                          • Opcode ID: e8775a5d6321f0dea89ce82b90cc6292b7a3bd0044cb503c25c375156348e7c2
                          • Instruction ID: 0bf1ed3311e3e942e0a1389e84d80c76f41ccd0b69acab1f7eccde3b1b9dfef0
                          • Opcode Fuzzy Hash: e8775a5d6321f0dea89ce82b90cc6292b7a3bd0044cb503c25c375156348e7c2
                          • Instruction Fuzzy Hash: D7E0E674E0020AAFDB009F64DD05D6B7B7DF710304F808521A915F2250D7B5E8108A7D
                          APIs
                          • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,75922EE0,00403861,75923420,0040366C,?), ref: 004038A4
                          • GlobalFree.KERNEL32(?), ref: 004038AB
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 0040389C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 1100898210-823278215
                          • Opcode ID: dd483a302f27d7fd5815fa17d0cc140b668f4dc35d1ba6fe7e243829f05c23e7
                          • Instruction ID: 78adfbc6f23a2b3c20b59446217b09faef23a1eee4c9d5cf742f1d2697954a66
                          • Opcode Fuzzy Hash: dd483a302f27d7fd5815fa17d0cc140b668f4dc35d1ba6fe7e243829f05c23e7
                          • Instruction Fuzzy Hash: 2FE08C339041205BC621AF25AC08B1AB7A86F89B32F0581B6F9807B2A183746C624BD9
                          APIs
                          • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,80000000,00000003), ref: 004059E5
                          • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402E28,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,C:\Users\user\Desktop\debit-note-19-08-dn-2024.exe,80000000,00000003), ref: 004059F5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-1246513382
                          • Opcode ID: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                          • Instruction ID: c27c0225baf4744af390cb43684771b46df34b65c4403afa93d532b781e968ba
                          • Opcode Fuzzy Hash: 5322967536e1a0efddda02766e650d0d94df305eef9f06c9ed47c97fde570a53
                          • Instruction Fuzzy Hash: A8D05EB3400920DAD3226B04DC0199F73ACEF1131074644AAF501A21A5DB785D808BBD
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                          • GlobalFree.KERNEL32(00000000), ref: 100011C7
                          • GlobalFree.KERNEL32(00000000), ref: 100011D9
                          • GlobalFree.KERNEL32(?), ref: 10001203
                          Memory Dump Source
                          • Source File: 00000000.00000002.4584996770.0000000010001000.00000020.00000001.01000000.00000005.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4584981457.0000000010000000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585012105.0000000010003000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.4585025776.0000000010005000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                          • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                          • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                          • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B29
                          • lstrcmpiA.KERNEL32(00405D53,00000000), ref: 00405B41
                          • CharNextA.USER32(00405D53,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B52
                          • lstrlenA.KERNEL32(00405D53,?,00000000,00405D53,00000000,[Rename],00000000,00000000,00000000), ref: 00405B5B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4580703996.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4580689277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580717735.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000424000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000426000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000433000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580731245.0000000000449000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4580820888.000000000044D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_debit-note-19-08-dn-2024.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                          • Instruction ID: 19ad592fd5dcf9c9bc99336752ee576fec3eb52e2d0cc5b6bc7cc78b570e8094
                          • Opcode Fuzzy Hash: f0f41473c1062d639537f97a351ef6b232bfd88747b8e1d85754dbc4161d6f9d
                          • Instruction Fuzzy Hash: 5FF06231A04958AFC7129BA5DD4099FBBB8EF06350B2540A6F801F7251D674FE019BA9