Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
TRIAL_ORDER_CP.exe

Overview

General Information

Sample name:TRIAL_ORDER_CP.exe
Analysis ID:1500398
MD5:5a14d64b70fc7106cb6c14be1aaa7482
SHA1:0612c6f0f1aa18f6e96de3d7ae39193981d9bb95
SHA256:bdd5b953bef085550bb5891e8d3c7248b5b16fcbba1bb26e2be18c4801d1a98e
Tags:exe
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • TRIAL_ORDER_CP.exe (PID: 7312 cmdline: "C:\Users\user\Desktop\TRIAL_ORDER_CP.exe" MD5: 5A14D64B70FC7106CB6C14BE1AAA7482)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4122830971.0000000004943000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: TRIAL_ORDER_CP.exeReversingLabs: Detection: 26%
    Source: TRIAL_ORDER_CP.exeVirustotal: Detection: 42%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: TRIAL_ORDER_CP.exeJoe Sandbox ML: detected
    Source: TRIAL_ORDER_CP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: TRIAL_ORDER_CP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C60
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_004068B1 FindFirstFileW,FindClose,0_2_004068B1
    Source: TRIAL_ORDER_CP.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_00405718 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405718

    System Summary

    barindex
    Source: initial sampleStatic PE information: Filename: TRIAL_ORDER_CP.exe
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeFile created: C:\Windows\resources\0809Jump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_6FAF1BFF0_2_6FAF1BFF
    Source: TRIAL_ORDER_CP.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/13@0/0
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_004049C4 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004049C4
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_004021CF CoCreateInstance,0_2_004021CF
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeFile created: C:\Users\user\AppData\Local\Temp\nsr4EEB.tmpJump to behavior
    Source: TRIAL_ORDER_CP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: TRIAL_ORDER_CP.exeReversingLabs: Detection: 26%
    Source: TRIAL_ORDER_CP.exeVirustotal: Detection: 42%
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeFile read: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: TRIAL_ORDER_CP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.4122830971.0000000004943000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_6FAF1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6FAF1BFF
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_6FAF30C0 push eax; ret 0_2_6FAF30EE
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeFile created: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\UserInfo.dllJump to dropped file
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeFile created: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\nsExec.dllJump to dropped file
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeFile created: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\nsDialogs.dllJump to dropped file
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeFile created: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeFile created: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\LangDLL.dllJump to dropped file
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeRDTSC instruction interceptor: First address: 4E797E5 second address: 4E797E5 instructions: 0x00000000 rdtsc 0x00000002 cmp bx, ax 0x00000005 cmp dh, ah 0x00000007 cmp ebx, ecx 0x00000009 jc 00007F55C51E4973h 0x0000000b cmp dl, bl 0x0000000d inc ebp 0x0000000e inc ebx 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\nsExec.dllJump to dropped file
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\UserInfo.dllJump to dropped file
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\nsDialogs.dllJump to dropped file
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\LangDLL.dllJump to dropped file
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_00405C60 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C60
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_004068B1 FindFirstFileW,FindClose,0_2_004068B1
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeAPI call chain: ExitProcess graph end nodegraph_0-4843
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeAPI call chain: ExitProcess graph end nodegraph_0-4842
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_6FAF1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6FAF1BFF
    Source: C:\Users\user\Desktop\TRIAL_ORDER_CP.exeCode function: 0_2_0040352F EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_0040352F
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Access Token Manipulation
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    TRIAL_ORDER_CP.exe26%ReversingLabsWin32.Trojan.Garf
    TRIAL_ORDER_CP.exe42%VirustotalBrowse
    TRIAL_ORDER_CP.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\LangDLL.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\LangDLL.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\UserInfo.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\UserInfo.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\nsDialogs.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\nsDialogs.dll0%VirustotalBrowse
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\nsExec.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\nsExec.dll0%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorTRIAL_ORDER_CP.exefalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1500398
    Start date and time:2024-08-28 12:15:09 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 23s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:TRIAL_ORDER_CP.exe
    Detection:MAL
    Classification:mal72.troj.evad.winEXE@1/13@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 54
    • Number of non-executed functions: 28
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtSetInformationFile calls found.
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nsc5063.tmp\LangDLL.dllThermo Fisher RFQ_TFS-1805.xlsGet hashmaliciousGuLoaderBrowse
      FedEx Shipping Confirmation.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
        IMG_00991ORDER_FILES.exeGet hashmaliciousFormBook, GuLoaderBrowse
          FedEx Shipping Confirmation.exeGet hashmaliciousGuLoaderBrowse
            IMG_00991ORDER_FILES.exeGet hashmaliciousGuLoaderBrowse
              SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsxGet hashmaliciousUnknownBrowse
                C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dllThermo Fisher RFQ_TFS-1805.xlsGet hashmaliciousGuLoaderBrowse
                  FedEx Shipping Confirmation.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                    IMG_00991ORDER_FILES.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      FedEx Shipping Confirmation.exeGet hashmaliciousGuLoaderBrowse
                        IMG_00991ORDER_FILES.exeGet hashmaliciousGuLoaderBrowse
                          SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsxGet hashmaliciousUnknownBrowse
                            AKgHw6grDP.exeGet hashmaliciousGuLoaderBrowse
                              AKgHw6grDP.exeGet hashmaliciousGuLoaderBrowse
                                PaymentAdvice_SWIFT _USD39060-AUG-7-070224-000214.scr.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                  PaymentAdvice_SWIFT _USD39060-AUG-7-070224-000214.scr.exeGet hashmaliciousGuLoaderBrowse
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):269664
                                    Entropy (8bit):1.2446463566225683
                                    Encrypted:false
                                    SSDEEP:768:3wSokH49c7ZKiDm+1Qer3C4XkGB3luG3fCHoEHKM/yP35tuIJ95oV31XfCp43UtM:55+1GbuKvP32IqV1fmPU0VicgRx
                                    MD5:084CDF1FE8920EACBC8DC0E839D9E5A7
                                    SHA1:5BB2E4E15941AC2AB4287A58F671B82DA5C9A384
                                    SHA-256:A6EB01651C833919FC27F9B7DD2B5C6D9F9DD8766BC7848679B5E664ECC6C8A7
                                    SHA-512:F856C41F540B7BD8233179CC752E63E4C88C1BBC38739B4FAF3DA09675B13FBC0219458AFE95D4C1DD481B35BB69DC9B66C2269C64B106DE3659A51CE9AE1B42
                                    Malicious:false
                                    Reputation:low
                                    Preview:...E.......c...............................0...............................................................c........................................n.......Y................................P..........................................................................................$........................................~.........................1...Z....................................m......................=.......................U............................................[....................................}.=..................-..........................................................t........................-....................m..............V...................................................................q............m.X..................................c....................................................................................'.........................T...R.............................................................^............|................................
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):131403
                                    Entropy (8bit):1.2526174536345023
                                    Encrypted:false
                                    SSDEEP:768:GGj5fMy6uanycN+gN/qEN+bHeC6roJdAGpeBgXU9ZWNAnu/Fkutb:L3l0fDkwaPA
                                    MD5:9AD6681DD2B309E6ACE142096F9E2870
                                    SHA1:5E02434342A98589A29B7E389E88DD4C60F09A8A
                                    SHA-256:576D2CD521891CF9C598B3CA0DADB89BD36CDE96B3F86F1CD27BF4FFCCE863CB
                                    SHA-512:28CFECE5E00AAB59758864503F4A9058EEF2FDFC8B73204ABF1E3B41011FBE5D9EAC3595E2EFA0E3B740B82F285B7EC8E42EA5DD42C39E5EFF39735A9C051CBB
                                    Malicious:false
                                    Reputation:low
                                    Preview:.............................>...................a...............................................>...............................Z......2.....................................................................U.................................J.....................................................................A@...Y..C..................1{.......................................................(.....................................................^......................................................V...........5.............................d.................................................+....{............................N........?.......................c.........y.........................................U................................:...................Y..........................................O....................!.......D.................................................}.....................................................................................................".......
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):407199
                                    Entropy (8bit):1.2437541055056829
                                    Encrypted:false
                                    SSDEEP:1536:Jm/FJf9qdyY/zMFRdfxHg2jUsscLrP6d2i2SJ:Itlw7zMFHx/jUqOd2SJ
                                    MD5:D2D56C0A1BC3F0AE364C30A638393597
                                    SHA1:B564662188D504D42B22E18A487BF35503B87AF5
                                    SHA-256:E88BB71C91C537060F76CD2EF8633B767BFD720EFD7AF6F8300BA6883249EACB
                                    SHA-512:2756334999CFEE833DAC050193745C85D50A3884FCB18220243C1A71086B51E6FF6EB165189BE7748AABB6098F9BD693EB25E539D2ADE56486FA95CB297FD023
                                    Malicious:false
                                    Reputation:low
                                    Preview:..........................................................=...O}.............C.......................................................................................b..........0.......................................................m...................................................................................................&........-.........D..........................................................%....."......................................................z.......)....................................x............................&..........................................4.....[......V.........................................................=.J..........................................................................................Q.............z........................................................."%F.zt.....................=...............................................A......Y....................f..................................O.......................#.............
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):385015
                                    Entropy (8bit):1.253279247179919
                                    Encrypted:false
                                    SSDEEP:1536:kVTcKVFuJi5LXKLywcEhXygCilGHIQXMUmMAI:ywKLNLaLywRXygCilGzmMAI
                                    MD5:84182132BEAC6B4CDD42AE3C3504778F
                                    SHA1:9844B9B4ABEAC7B410809A582FE2E41BD38876A3
                                    SHA-256:5A2A01A88EC9FF56B80D957E4C5891A020435407F81DADA05DE58165C0C86F2D
                                    SHA-512:054C17E8AC2EDED927F24E77A81FBA74498C9F3ABD07F5E42D6F9E20A58D47D9C30FF1060CC8626DE93FDD5BBA2A0503FF61EC7F4F70858871C15E63DDC48A7F
                                    Malicious:false
                                    Reputation:low
                                    Preview:....E..........;................../..r.....5...............e......9...............................S............................................e..........................E..........................W.................................8....................j......3....................X............................Ql....T.................>g...'.............[...l...P.................................|................................q.....................3........v......t....H............................................s.................................................................................................................................................f....................................................................(..................................................;..$..................................................................o.-.........................................................l................. ...............................................Q......................
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):186880
                                    Entropy (8bit):1.2601075629320995
                                    Encrypted:false
                                    SSDEEP:768:597pZQKUv2av3tuZ8qbY2vFhkyd8MBkwaKKKbwspvRxtm8dBct2pEW5x1dGkrKLB:Ve2aPPET8MOwaKGeR//1T9dO
                                    MD5:AA2CD52ABEA96B7E317691ADD713125D
                                    SHA1:B34046DE9D9A275896762FD53A2DFF2D382EAE56
                                    SHA-256:C6AD2DCC3B851E06A60FA705CBAA83AADBEC68B10E24CA667088E8153973A7B2
                                    SHA-512:AD454262C5804887A9596D5CFFCC64D86EB1ED92813A5A37F57D9FCCA21D9C2EF465E51F05879F65BABA7752252B9FEC6352CFB5F678B21D3412B6906EB07C26
                                    Malicious:false
                                    Reputation:low
                                    Preview:..N......................p..........................................%.............................................................V.............z.N........................i......................................................................................................,(^.............b..n.....&...........................S..................>...................C.................................~...........................K.......................................B.....*..........L.....................j..............!...........O................S................a....C......x...y................................@..............................$...........................................N.........................g.................R...................................@.....................F...........+............................S..........R..............................................g.........................................................................................................
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:ASCII text, with very long lines (304), with no line terminators
                                    Category:dropped
                                    Size (bytes):304
                                    Entropy (8bit):4.14301130689188
                                    Encrypted:false
                                    SSDEEP:6:3CUzIrGx4igCDYUuTjAtLGafWWl2iEOQkAtj/jLsTzOwJT4HCALn:3CCF4igCDYA5Ga+Wl2iEOTAJryO8MHCu
                                    MD5:EF6FDEDE5EA8DBEF391FEC35BE82A5FC
                                    SHA1:6C88262F78E8B11651EEB6534F09C65CD0A8F8BB
                                    SHA-256:37B39724FD3B7FE48E1D65DA1A69BF4DBF809F34C67BAC7C4DA13F93DA9BE856
                                    SHA-512:5FB53ADEADB7C464A13EEECE64ADD35F972425D55447FFB84A277689BA3F4D5861A43B2883CB0744F98F164F2802C567F9969F777B98CE4609D28A64ED1101FD
                                    Malicious:false
                                    Preview:skydestigens dilettanist defmrkers,drmmene sprometrets taklingens crokinole ligegladestes,ultraremuneration dkketallerkners uncustomed filoversigterne.atomize koncentrationsevnens arthropodal epilepsis vakuums stabelvis lnregulering,catv skrivemaskinebordenes skydningerne.solanin godkendelsens gasogene.
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:ASCII text, with very long lines (65536), with no line terminators
                                    Category:dropped
                                    Size (bytes):109610
                                    Entropy (8bit):2.6617579967489884
                                    Encrypted:false
                                    SSDEEP:1536:FgW5xMFGTVJF+21miQeKdFwpo0Vv0Qs5w110FkLpTEO7:vrsD6
                                    MD5:88A948F41E25F333CA29D74A18275335
                                    SHA1:352EDF6A66228CBE4161DBB104CE3F515613E285
                                    SHA-256:6DD15FC1E2E38CDE46A9D729A3390A20548E91BF4EE72441EF72DE008ABF279F
                                    SHA-512:C1189DF2FB7DACEB3B5C31FFED37D8DD3479CE6E1E553EC9846AE114079FC368A509BFA04FED721FACB04E6327C8AD2D1D1A7E566C8EC67815C5F84E84E6C49E
                                    Malicious:false
                                    Preview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
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:data
                                    Category:dropped
                                    Size (bytes):301874
                                    Entropy (8bit):7.574773877850153
                                    Encrypted:false
                                    SSDEEP:6144:CUAmWaqUDpmX7a2orEMWgWLkuoJguBP0YI:YmxqsccIsJguBPtI
                                    MD5:254D4AABCCC8E28A203C152E4826A86A
                                    SHA1:25B5F293B8A76CC17836D26924B42385F4BD6584
                                    SHA-256:6034CCD53FF6AAB2850028AED103E16BBF997A780AD74C93AE9AFE188536DC3E
                                    SHA-512:0CCD5D3E8F51A2675112F673A6D102A1072B74726C0AE43FC0F95A7D7864011B2F8956D4EFF9DC6CA51997F6E41930467A55FFC048165D811C86B8D572FC1DDD
                                    Malicious:false
                                    Preview:.uu.m....//////............,..ooo..QQ....W.......}}........~...............d......}}...'..........................r...s.f.JJ.z...............B.(..88............666...).....}}.....BBB.....p...{.....OO.....................R............P..{{{{...M.......h........ ......++...2...}...ww...b...........ii.......................```..................999......SSS............ZZZ...II...............................///.,........................................v.....EE........v...-.............................................>>........_..............................6.UU........................@.......bbbb....).............*...n.7777....[..d.........J...........?.....z.....!........::..cc..........I.........mmmm......................................}....III......KKKKKK.................d.GGG..............L...*....GGGG.P.qq.........g.....!!.......................[..E. ..............................[...U............E..V......r......................................p...UU...A.b......................===...
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):5632
                                    Entropy (8bit):3.817430038996001
                                    Encrypted:false
                                    SSDEEP:48:S46+/sTKYKxbWsptIp5tCZ0iVEAWyMEv9v/ft2O2B8mWofjLl:z+uPbO5tCZBVEAWyMEFv2Cm9L
                                    MD5:549EE11198143574F4D9953198A09FE8
                                    SHA1:2E89BA5F30E1C1C4CE517F28EC1505294BB6C4C1
                                    SHA-256:131AA0DF90C08DCE2EECEE46CCE8759E9AFFF04BF15B7B0002C2A53AE5E92C36
                                    SHA-512:0FB4CEA4FD320381FE50C52D1C198261F0347D6DCEE857917169FCC3E2083ED4933BEFF708E81D816787195CCA050F3F5F9C5AC9CC7F781831B028EF5714BEC8
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                    Joe Sandbox View:
                                    • Filename: Thermo Fisher RFQ_TFS-1805.xls, Detection: malicious, Browse
                                    • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                    • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                    • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                    • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                    • Filename: SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsx, Detection: malicious, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................>..........:..........Rich..........................PE..L....C.f...........!........."......?........ ...............................p............@.........................`"..I...\ ..P....P..`....................`....................................................... ..\............................text............................... ..`.rdata....... ......................@..@.data........0......................@....rsrc...`....P......................@..@.reloc..`....`......................@..B................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):12288
                                    Entropy (8bit):5.804946284177748
                                    Encrypted:false
                                    SSDEEP:192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
                                    MD5:192639861E3DC2DC5C08BB8F8C7260D5
                                    SHA1:58D30E460609E22FA0098BC27D928B689EF9AF78
                                    SHA-256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
                                    SHA-512:6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                    Joe Sandbox View:
                                    • Filename: Thermo Fisher RFQ_TFS-1805.xls, Detection: malicious, Browse
                                    • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                    • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                    • Filename: FedEx Shipping Confirmation.exe, Detection: malicious, Browse
                                    • Filename: IMG_00991ORDER_FILES.exe, Detection: malicious, Browse
                                    • Filename: SecuriteInfo.com.Trojan-Downloader.Office.Doc.30581.16938.xlsx, Detection: malicious, Browse
                                    • Filename: AKgHw6grDP.exe, Detection: malicious, Browse
                                    • Filename: AKgHw6grDP.exe, Detection: malicious, Browse
                                    • Filename: PaymentAdvice_SWIFT _USD39060-AUG-7-070224-000214.scr.exe, Detection: malicious, Browse
                                    • Filename: PaymentAdvice_SWIFT _USD39060-AUG-7-070224-000214.scr.exe, Detection: malicious, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....C.f...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):4096
                                    Entropy (8bit):3.3415738744933092
                                    Encrypted:false
                                    SSDEEP:48:qK5HC+J4apHT1wH8l9QcXygHg0ZShMmj3jk6TbGr7X:5QiRzuHOXTA0H6jk6nGr7X
                                    MD5:F8B6DD1F9620BE4EF2AD1E81FB6B79FA
                                    SHA1:F06C8C8650335BACE41C8DBE73307CBE4E61B3B1
                                    SHA-256:A921CC9CC4AF332BE96186D60D2539CB413DFA44CFD73E85687F9338505FF85E
                                    SHA-512:F15811088ECDE4CD0C038DB2C278B7214E41728E382B25C65C2EB491BC0379C075841398E8C99E8CCEBA8BE7E8342BC69D35836EBE9B12EBEBFF48D01D5FA61A
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......K..................[.........Rich..........................PE..L....C.f...........!................~........ ...............................P............@.........................@"......l ..<............................@..p.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...h....0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):9728
                                    Entropy (8bit):5.157714967617029
                                    Encrypted:false
                                    SSDEEP:96:ooEv02zUu56FcS817eTaXx85qHFcUcxSgB5PKtAtoniJninnt3DVEB3YMNqkzfFc:ooEvCu5e81785qHFcU0PuAw0uyyIFc
                                    MD5:B7D61F3F56ABF7B7FF0D4E7DA3AD783D
                                    SHA1:15AB5219C0E77FD9652BC62FF390B8E6846C8E3E
                                    SHA-256:89A82C4849C21DFE765052681E1FAD02D2D7B13C8B5075880C52423DCA72A912
                                    SHA-512:6467C0DE680FADB8078BDAA0D560D2B228F5A22D4D8358A1C7D564C6EBCEFACE5D377B870EAF8985FBEE727001DA569867554154D568E3B37F674096BBAFAFB8
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......|..c8O`08O`08O`08Oa0.O`0.@=05O`0llP0=O`0.If09O`0.od09O`0Rich8O`0........PE..L....C.f...........!.........0......g........0............................................@..........................6..k....0.......p...............................................................................0...............................text............................... ..`.rdata..{....0......................@..@.data...h!...@......................@....rsrc........p....... ..............@..@.reloc..~............"..............@..B................................................................................................................................................................................................................................................................................................................................................................
                                    Process:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                    Category:dropped
                                    Size (bytes):7168
                                    Entropy (8bit):5.295306975422517
                                    Encrypted:false
                                    SSDEEP:96:JgzdzBzMDhOZZDbXf5GsWvSv1ckne94SDbYkvML1HT1fUNQaSGYuHIDQ:JDQHDb2vSuOc41ZfUNQZGdHA
                                    MD5:11092C1D3FBB449A60695C44F9F3D183
                                    SHA1:B89D614755F2E943DF4D510D87A7FC1A3BCF5A33
                                    SHA-256:2CD3A2D4053954DB1196E2526545C36DFC138C6DE9B81F6264632F3132843C77
                                    SHA-512:C182E0A1F0044B67B4B9FB66CEF9C4955629F6811D98BBFFA99225B03C43C33B1E85CACABB39F2C45EAD81CD85E98B201D5F9DA4EE0038423B1AD947270C134A
                                    Malicious:false
                                    Antivirus:
                                    • Antivirus: ReversingLabs, Detection: 0%
                                    • Antivirus: Virustotal, Detection: 0%, Browse
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L....C.f...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                    File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                    Entropy (8bit):6.813518603963732
                                    TrID:
                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                    • DOS Executable Generic (2002/1) 0.02%
                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                    File name:TRIAL_ORDER_CP.exe
                                    File size:1'014'480 bytes
                                    MD5:5a14d64b70fc7106cb6c14be1aaa7482
                                    SHA1:0612c6f0f1aa18f6e96de3d7ae39193981d9bb95
                                    SHA256:bdd5b953bef085550bb5891e8d3c7248b5b16fcbba1bb26e2be18c4801d1a98e
                                    SHA512:9f8075010e5f4b8a4dcac7a4fda9a947459ffaf29c34a454a0f94c749703f28d734b39b2a6359de6a1a067d0551927cfecc39610427277ef26c4eb83fe67def7
                                    SSDEEP:12288:RGUeTvuO1BJdtGrY8dMLMankl6QQGMi7B1mSwIhCjVn:RGPB4Y8d2JKpQWB1mSlCjV
                                    TLSH:28259EA3E44CA2A1D4E98F73E20B76B705371DB595560013A2D1BF273AF9C23467392B
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........!.@.@...@...@../O...@...@..O@../O...@...c...@..+F...@..Rich.@..........................PE..L....C.f.................h....:....
                                    Icon Hash:d96236594b352501
                                    Entrypoint:0x40352f
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x660843EA [Sat Mar 30 16:55:06 2024 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                                    Instruction
                                    sub esp, 000003F8h
                                    push ebp
                                    push esi
                                    push edi
                                    push 00000020h
                                    pop edi
                                    xor ebp, ebp
                                    push 00008001h
                                    mov dword ptr [esp+20h], ebp
                                    mov dword ptr [esp+18h], 0040A2D8h
                                    mov dword ptr [esp+14h], ebp
                                    call dword ptr [004080A4h]
                                    mov esi, dword ptr [004080A8h]
                                    lea eax, dword ptr [esp+34h]
                                    push eax
                                    mov dword ptr [esp+4Ch], ebp
                                    mov dword ptr [esp+0000014Ch], ebp
                                    mov dword ptr [esp+00000150h], ebp
                                    mov dword ptr [esp+38h], 0000011Ch
                                    call esi
                                    test eax, eax
                                    jne 00007F55C50C2CFAh
                                    lea eax, dword ptr [esp+34h]
                                    mov dword ptr [esp+34h], 00000114h
                                    push eax
                                    call esi
                                    mov ax, word ptr [esp+48h]
                                    mov ecx, dword ptr [esp+62h]
                                    sub ax, 00000053h
                                    add ecx, FFFFFFD0h
                                    neg ax
                                    sbb eax, eax
                                    mov byte ptr [esp+0000014Eh], 00000004h
                                    not eax
                                    and eax, ecx
                                    mov word ptr [esp+00000148h], ax
                                    cmp dword ptr [esp+38h], 0Ah
                                    jnc 00007F55C50C2CC8h
                                    and word ptr [esp+42h], 0000h
                                    mov eax, dword ptr [esp+40h]
                                    movzx ecx, byte ptr [esp+3Ch]
                                    mov dword ptr [007A8318h], eax
                                    xor eax, eax
                                    mov ah, byte ptr [esp+38h]
                                    movzx eax, ax
                                    or eax, ecx
                                    xor ecx, ecx
                                    mov ch, byte ptr [esp+00000148h]
                                    movzx ecx, cx
                                    shl eax, 10h
                                    or eax, ecx
                                    movzx ecx, byte ptr [esp+0000004Eh]
                                    Programming Language:
                                    • [EXP] VC++ 6.0 SP5 build 8804
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d70000x6a4e0.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x10000x66d10x68001cb1571d2754df0a2b7df66b1b8d9089False0.6727388822115384data6.4708065613184305IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rdata0x80000x13580x1400f0b500ff912dda10f31f36da3efc8a1eFalse0.44296875data5.102094016108248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .data0xa0000x39e3780x60092e7d2d711bd61815cb4cc2d30d795b1unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .ndata0x3a90000x2e0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                    .rsrc0x3d70000x6a4e00x6a60050c6a3b5a9739b53779ab9f1abcff9d3False0.20903716216216217data4.214291608698191IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x3d73b80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.16116445246619523
                                    RT_ICON0x4193e00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.22898675026617768
                                    RT_ICON0x429c080x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.3017658187933572
                                    RT_ICON0x4330b00x5488Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.32804990757855823
                                    RT_ICON0x4385380x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.3040269248937175
                                    RT_ICON0x43c7600x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.38724066390041495
                                    RT_ICON0x43ed080x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.42120075046904315
                                    RT_ICON0x43fdb00x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.43688524590163935
                                    RT_ICON0x4407380x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.5859929078014184
                                    RT_DIALOG0x440ba00xb8dataEnglishUnited States0.6467391304347826
                                    RT_DIALOG0x440c580x144dataEnglishUnited States0.5216049382716049
                                    RT_DIALOG0x440da00x100dataEnglishUnited States0.5234375
                                    RT_DIALOG0x440ea00x11cdataEnglishUnited States0.6056338028169014
                                    RT_DIALOG0x440fc00x60dataEnglishUnited States0.7291666666666666
                                    RT_GROUP_ICON0x4410200x84dataEnglishUnited States0.7196969696969697
                                    RT_VERSION0x4410a80x1a8dataEnglishUnited States0.5660377358490566
                                    RT_MANIFEST0x4412500x290XML 1.0 document, ASCII text, with very long lines (656), with no line terminatorsEnglishUnited States0.5625
                                    DLLImport
                                    ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                    SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                    ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                    COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                    USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                    GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                    KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                                    Language of compilation systemCountry where language is spokenMap
                                    EnglishUnited States
                                    No network behavior found

                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Target ID:0
                                    Start time:06:15:58
                                    Start date:28/08/2024
                                    Path:C:\Users\user\Desktop\TRIAL_ORDER_CP.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"
                                    Imagebase:0x400000
                                    File size:1'014'480 bytes
                                    MD5 hash:5A14D64B70FC7106CB6C14BE1AAA7482
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.4122830971.0000000004943000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:23.3%
                                      Dynamic/Decrypted Code Coverage:0%
                                      Signature Coverage:16%
                                      Total number of Nodes:1591
                                      Total number of Limit Nodes:44
                                      execution_graph 4059 401bc0 4060 401c11 4059->4060 4061 401bcd 4059->4061 4062 401c16 4060->4062 4063 401c3b GlobalAlloc 4060->4063 4064 4023af 4061->4064 4069 401be4 4061->4069 4077 401c56 4062->4077 4097 406554 lstrcpynW 4062->4097 4078 406591 4063->4078 4066 406591 21 API calls 4064->4066 4068 4023bc 4066->4068 4068->4077 4098 405bb4 4068->4098 4095 406554 lstrcpynW 4069->4095 4070 401c28 GlobalFree 4070->4077 4073 401bf3 4096 406554 lstrcpynW 4073->4096 4075 401c02 4102 406554 lstrcpynW 4075->4102 4083 40659c 4078->4083 4079 4067e3 4080 4067fc 4079->4080 4125 406554 lstrcpynW 4079->4125 4080->4077 4082 4067b4 lstrlenW 4082->4083 4083->4079 4083->4082 4085 4066ad GetSystemDirectoryW 4083->4085 4086 406591 15 API calls 4083->4086 4089 4066c3 GetWindowsDirectoryW 4083->4089 4090 406591 15 API calls 4083->4090 4091 406755 lstrcatW 4083->4091 4094 406725 SHGetPathFromIDListW CoTaskMemFree 4083->4094 4103 406422 4083->4103 4108 406948 GetModuleHandleA 4083->4108 4114 406802 4083->4114 4123 40649b wsprintfW 4083->4123 4124 406554 lstrcpynW 4083->4124 4085->4083 4086->4082 4089->4083 4090->4083 4091->4083 4094->4083 4095->4073 4096->4075 4097->4070 4100 405bc9 4098->4100 4099 405c15 4099->4077 4100->4099 4101 405bdd MessageBoxIndirectW 4100->4101 4101->4099 4102->4077 4126 4063c1 4103->4126 4106 406486 4106->4083 4107 406456 RegQueryValueExW RegCloseKey 4107->4106 4109 406964 4108->4109 4110 40696e GetProcAddress 4108->4110 4130 4068d8 GetSystemDirectoryW 4109->4130 4113 40697d 4110->4113 4112 40696a 4112->4110 4112->4113 4113->4083 4120 40680f 4114->4120 4115 406885 4116 40688a CharPrevW 4115->4116 4118 4068ab 4115->4118 4116->4115 4117 406878 CharNextW 4117->4115 4117->4120 4118->4083 4120->4115 4120->4117 4121 406864 CharNextW 4120->4121 4122 406873 CharNextW 4120->4122 4133 405e50 4120->4133 4121->4120 4122->4117 4123->4083 4124->4083 4125->4080 4127 4063d0 4126->4127 4128 4063d9 RegOpenKeyExW 4127->4128 4129 4063d4 4127->4129 4128->4129 4129->4106 4129->4107 4131 4068fa wsprintfW LoadLibraryExW 4130->4131 4131->4112 4134 405e56 4133->4134 4135 405e6c 4134->4135 4136 405e5d CharNextW 4134->4136 4135->4120 4136->4134 5211 404f40 GetDlgItem GetDlgItem 5212 404f92 7 API calls 5211->5212 5218 4051b7 5211->5218 5213 405039 DeleteObject 5212->5213 5214 40502c SendMessageW 5212->5214 5215 405042 5213->5215 5214->5213 5216 405079 5215->5216 5219 406591 21 API calls 5215->5219 5220 4044d3 22 API calls 5216->5220 5217 405345 5222 40534f SendMessageW 5217->5222 5229 405357 5217->5229 5221 405299 5218->5221 5242 405226 5218->5242 5265 404e8e SendMessageW 5218->5265 5223 40505b SendMessageW SendMessageW 5219->5223 5224 40508d 5220->5224 5221->5217 5226 4052f2 SendMessageW 5221->5226 5254 4051aa 5221->5254 5222->5229 5223->5215 5225 4044d3 22 API calls 5224->5225 5243 40509e 5225->5243 5232 405307 SendMessageW 5226->5232 5226->5254 5227 40528b SendMessageW 5227->5221 5228 40453a 8 API calls 5233 405546 5228->5233 5234 405370 5229->5234 5235 405369 ImageList_Destroy 5229->5235 5239 405380 5229->5239 5231 4054fa 5240 40550c ShowWindow GetDlgItem ShowWindow 5231->5240 5231->5254 5237 40531a 5232->5237 5238 405379 GlobalFree 5234->5238 5234->5239 5235->5234 5236 405179 GetWindowLongW SetWindowLongW 5241 405192 5236->5241 5248 40532b SendMessageW 5237->5248 5238->5239 5239->5231 5258 4053bb 5239->5258 5270 404f0e 5239->5270 5240->5254 5244 405197 ShowWindow 5241->5244 5245 4051af 5241->5245 5242->5221 5242->5227 5243->5236 5247 4050f1 SendMessageW 5243->5247 5249 405174 5243->5249 5251 405143 SendMessageW 5243->5251 5252 40512f SendMessageW 5243->5252 5263 404508 SendMessageW 5244->5263 5264 404508 SendMessageW 5245->5264 5247->5243 5248->5217 5249->5236 5249->5241 5251->5243 5252->5243 5254->5228 5255 4054c5 5256 4054d0 InvalidateRect 5255->5256 5259 4054dc 5255->5259 5256->5259 5257 4053e9 SendMessageW 5262 4053ff 5257->5262 5258->5257 5258->5262 5259->5231 5279 404e49 5259->5279 5261 405473 SendMessageW SendMessageW 5261->5262 5262->5255 5262->5261 5263->5254 5264->5218 5266 404eb1 GetMessagePos ScreenToClient SendMessageW 5265->5266 5267 404eed SendMessageW 5265->5267 5268 404ee5 5266->5268 5269 404eea 5266->5269 5267->5268 5268->5242 5269->5267 5282 406554 lstrcpynW 5270->5282 5272 404f21 5283 40649b wsprintfW 5272->5283 5274 404f2b 5275 40140b 2 API calls 5274->5275 5276 404f34 5275->5276 5284 406554 lstrcpynW 5276->5284 5278 404f3b 5278->5258 5285 404d80 5279->5285 5281 404e5e 5281->5231 5282->5272 5283->5274 5284->5278 5288 404d99 5285->5288 5286 406591 21 API calls 5287 404dfd 5286->5287 5289 406591 21 API calls 5287->5289 5288->5286 5290 404e08 5289->5290 5291 406591 21 API calls 5290->5291 5292 404e1e lstrlenW wsprintfW SetDlgItemTextW 5291->5292 5292->5281 5293 402641 5294 402dcb 21 API calls 5293->5294 5295 402648 5294->5295 5298 406044 GetFileAttributesW CreateFileW 5295->5298 5297 402654 5298->5297 4153 4025c3 4164 402e0b 4153->4164 4157 4025d6 4158 402953 4157->4158 4159 4025f2 RegEnumKeyW 4157->4159 4160 4025fe RegEnumValueW 4157->4160 4161 40261a RegCloseKey 4159->4161 4160->4161 4162 402613 4160->4162 4161->4158 4162->4161 4165 402dcb 21 API calls 4164->4165 4166 402e22 4165->4166 4167 4063c1 RegOpenKeyExW 4166->4167 4168 4025cd 4167->4168 4169 402da9 4168->4169 4170 406591 21 API calls 4169->4170 4171 402dbe 4170->4171 4171->4157 5299 404643 lstrlenW 5300 404662 5299->5300 5301 404664 WideCharToMultiByte 5299->5301 5300->5301 5302 4049c4 5303 4049f0 5302->5303 5304 404a01 5302->5304 5363 405b98 GetDlgItemTextW 5303->5363 5306 404a0d GetDlgItem 5304->5306 5312 404a6c 5304->5312 5308 404a21 5306->5308 5307 4049fb 5310 406802 5 API calls 5307->5310 5311 404a35 SetWindowTextW 5308->5311 5315 405ece 4 API calls 5308->5315 5309 404b50 5360 404cff 5309->5360 5365 405b98 GetDlgItemTextW 5309->5365 5310->5304 5316 4044d3 22 API calls 5311->5316 5312->5309 5317 406591 21 API calls 5312->5317 5312->5360 5314 40453a 8 API calls 5319 404d13 5314->5319 5320 404a2b 5315->5320 5321 404a51 5316->5321 5322 404ae0 SHBrowseForFolderW 5317->5322 5318 404b80 5323 405f2b 18 API calls 5318->5323 5320->5311 5329 405e23 3 API calls 5320->5329 5324 4044d3 22 API calls 5321->5324 5322->5309 5325 404af8 CoTaskMemFree 5322->5325 5326 404b86 5323->5326 5327 404a5f 5324->5327 5328 405e23 3 API calls 5325->5328 5366 406554 lstrcpynW 5326->5366 5364 404508 SendMessageW 5327->5364 5331 404b05 5328->5331 5329->5311 5334 404b3c SetDlgItemTextW 5331->5334 5338 406591 21 API calls 5331->5338 5333 404a65 5336 406948 5 API calls 5333->5336 5334->5309 5335 404b9d 5337 406948 5 API calls 5335->5337 5336->5312 5345 404ba4 5337->5345 5339 404b24 lstrcmpiW 5338->5339 5339->5334 5342 404b35 lstrcatW 5339->5342 5340 404be5 5367 406554 lstrcpynW 5340->5367 5342->5334 5343 404bec 5344 405ece 4 API calls 5343->5344 5346 404bf2 GetDiskFreeSpaceW 5344->5346 5345->5340 5349 405e6f 2 API calls 5345->5349 5350 404c3d 5345->5350 5348 404c16 MulDiv 5346->5348 5346->5350 5348->5350 5349->5345 5351 404e49 24 API calls 5350->5351 5361 404cae 5350->5361 5352 404c9b 5351->5352 5355 404cb0 SetDlgItemTextW 5352->5355 5356 404ca0 5352->5356 5353 40140b 2 API calls 5357 404cd1 5353->5357 5355->5361 5359 404d80 24 API calls 5356->5359 5368 4044f5 KiUserCallbackDispatcher 5357->5368 5358 404ced 5358->5360 5369 40491d 5358->5369 5359->5361 5360->5314 5361->5353 5361->5357 5363->5307 5364->5333 5365->5318 5366->5335 5367->5343 5368->5358 5370 404930 SendMessageW 5369->5370 5371 40492b 5369->5371 5370->5360 5371->5370 4180 4015c8 4181 402dcb 21 API calls 4180->4181 4182 4015cf SetFileAttributesW 4181->4182 4183 4015e1 4182->4183 4184 401fc9 4185 402dcb 21 API calls 4184->4185 4186 401fcf 4185->4186 4199 4055d9 4186->4199 4191 402002 CloseHandle 4195 402953 4191->4195 4194 401ff4 4196 402004 4194->4196 4197 401ff9 4194->4197 4196->4191 4218 40649b wsprintfW 4197->4218 4200 4055f4 4199->4200 4209 401fd9 4199->4209 4201 405610 lstrlenW 4200->4201 4202 406591 21 API calls 4200->4202 4203 405639 4201->4203 4204 40561e lstrlenW 4201->4204 4202->4201 4205 40564c 4203->4205 4206 40563f SetWindowTextW 4203->4206 4207 405630 lstrcatW 4204->4207 4204->4209 4208 405652 SendMessageW SendMessageW SendMessageW 4205->4208 4205->4209 4206->4205 4207->4203 4208->4209 4210 405b37 CreateProcessW 4209->4210 4211 401fdf 4210->4211 4212 405b6a CloseHandle 4210->4212 4211->4191 4211->4195 4213 4069f3 WaitForSingleObject 4211->4213 4212->4211 4214 406a0d 4213->4214 4215 406a1f GetExitCodeProcess 4214->4215 4219 406984 4214->4219 4215->4194 4218->4191 4220 4069a1 PeekMessageW 4219->4220 4221 4069b1 WaitForSingleObject 4220->4221 4222 406997 DispatchMessageW 4220->4222 4221->4214 4222->4220 5375 40554d 5376 405571 5375->5376 5377 40555d 5375->5377 5380 405579 IsWindowVisible 5376->5380 5386 405590 5376->5386 5378 405563 5377->5378 5379 4055ba 5377->5379 5381 40451f SendMessageW 5378->5381 5383 4055bf CallWindowProcW 5379->5383 5380->5379 5382 405586 5380->5382 5384 40556d 5381->5384 5385 404e8e 5 API calls 5382->5385 5383->5384 5385->5386 5386->5383 5387 404f0e 4 API calls 5386->5387 5387->5379 4223 40254f 4224 402e0b 21 API calls 4223->4224 4225 402559 4224->4225 4226 402dcb 21 API calls 4225->4226 4227 402562 4226->4227 4228 40256d RegQueryValueExW 4227->4228 4233 402953 4227->4233 4229 402593 RegCloseKey 4228->4229 4230 40258d 4228->4230 4229->4233 4230->4229 4234 40649b wsprintfW 4230->4234 4234->4229 4235 4021cf 4236 402dcb 21 API calls 4235->4236 4237 4021d6 4236->4237 4238 402dcb 21 API calls 4237->4238 4239 4021e0 4238->4239 4240 402dcb 21 API calls 4239->4240 4241 4021ea 4240->4241 4242 402dcb 21 API calls 4241->4242 4243 4021f4 4242->4243 4244 402dcb 21 API calls 4243->4244 4245 4021fe 4244->4245 4246 40223d CoCreateInstance 4245->4246 4247 402dcb 21 API calls 4245->4247 4250 40225c 4246->4250 4247->4246 4249 40231b 4250->4249 4251 401423 4250->4251 4252 4055d9 28 API calls 4251->4252 4253 401431 4252->4253 4253->4249 5388 40204f 5389 402dcb 21 API calls 5388->5389 5390 402056 5389->5390 5391 406948 5 API calls 5390->5391 5392 402065 5391->5392 5393 402081 GlobalAlloc 5392->5393 5394 4020f1 5392->5394 5393->5394 5395 402095 5393->5395 5396 406948 5 API calls 5395->5396 5397 40209c 5396->5397 5398 406948 5 API calls 5397->5398 5399 4020a6 5398->5399 5399->5394 5403 40649b wsprintfW 5399->5403 5401 4020df 5404 40649b wsprintfW 5401->5404 5403->5401 5404->5394 5405 6faf103d 5408 6faf101b 5405->5408 5409 6faf15b6 GlobalFree 5408->5409 5410 6faf1020 5409->5410 5411 6faf1027 GlobalAlloc 5410->5411 5412 6faf1024 5410->5412 5411->5412 5413 6faf15dd 3 API calls 5412->5413 5414 6faf103b 5413->5414 4285 403fd4 4286 403fec 4285->4286 4287 40414d 4285->4287 4286->4287 4288 403ff8 4286->4288 4289 40419e 4287->4289 4290 40415e GetDlgItem GetDlgItem 4287->4290 4291 404003 SetWindowPos 4288->4291 4292 404016 4288->4292 4294 4041f8 4289->4294 4305 401389 2 API calls 4289->4305 4293 4044d3 22 API calls 4290->4293 4291->4292 4296 404061 4292->4296 4297 40401f ShowWindow 4292->4297 4298 404188 SetClassLongW 4293->4298 4299 404148 4294->4299 4358 40451f 4294->4358 4302 404080 4296->4302 4303 404069 DestroyWindow 4296->4303 4300 40413a 4297->4300 4301 40403f GetWindowLongW 4297->4301 4304 40140b 2 API calls 4298->4304 4380 40453a 4300->4380 4301->4300 4307 404058 ShowWindow 4301->4307 4309 404085 SetWindowLongW 4302->4309 4310 404096 4302->4310 4308 40445c 4303->4308 4304->4289 4311 4041d0 4305->4311 4307->4296 4308->4299 4316 40448d ShowWindow 4308->4316 4309->4299 4310->4300 4314 4040a2 GetDlgItem 4310->4314 4311->4294 4315 4041d4 SendMessageW 4311->4315 4312 40140b 2 API calls 4327 40420a 4312->4327 4313 40445e DestroyWindow EndDialog 4313->4308 4317 4040d0 4314->4317 4318 4040b3 SendMessageW IsWindowEnabled 4314->4318 4315->4299 4316->4299 4320 4040dd 4317->4320 4321 404124 SendMessageW 4317->4321 4322 4040f0 4317->4322 4331 4040d5 4317->4331 4318->4299 4318->4317 4319 406591 21 API calls 4319->4327 4320->4321 4320->4331 4321->4300 4324 4040f8 4322->4324 4325 40410d 4322->4325 4374 40140b 4324->4374 4329 40140b 2 API calls 4325->4329 4326 40410b 4326->4300 4327->4299 4327->4312 4327->4313 4327->4319 4330 4044d3 22 API calls 4327->4330 4349 40439e DestroyWindow 4327->4349 4361 4044d3 4327->4361 4332 404114 4329->4332 4330->4327 4377 4044ac 4331->4377 4332->4300 4332->4331 4334 404285 GetDlgItem 4335 4042a2 ShowWindow KiUserCallbackDispatcher 4334->4335 4336 40429a 4334->4336 4364 4044f5 KiUserCallbackDispatcher 4335->4364 4336->4335 4338 4042cc EnableWindow 4343 4042e0 4338->4343 4339 4042e5 GetSystemMenu EnableMenuItem SendMessageW 4340 404315 SendMessageW 4339->4340 4339->4343 4340->4343 4343->4339 4365 404508 SendMessageW 4343->4365 4366 403fb5 4343->4366 4369 406554 lstrcpynW 4343->4369 4345 404344 lstrlenW 4346 406591 21 API calls 4345->4346 4347 40435a SetWindowTextW 4346->4347 4370 401389 4347->4370 4349->4308 4350 4043b8 CreateDialogParamW 4349->4350 4350->4308 4351 4043eb 4350->4351 4352 4044d3 22 API calls 4351->4352 4353 4043f6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4352->4353 4354 401389 2 API calls 4353->4354 4355 40443c 4354->4355 4355->4299 4356 404444 ShowWindow 4355->4356 4357 40451f SendMessageW 4356->4357 4357->4308 4359 404537 4358->4359 4360 404528 SendMessageW 4358->4360 4359->4327 4360->4359 4362 406591 21 API calls 4361->4362 4363 4044de SetDlgItemTextW 4362->4363 4363->4334 4364->4338 4365->4343 4367 406591 21 API calls 4366->4367 4368 403fc3 SetWindowTextW 4367->4368 4368->4343 4369->4345 4372 401390 4370->4372 4371 4013fe 4371->4327 4372->4371 4373 4013cb MulDiv SendMessageW 4372->4373 4373->4372 4375 401389 2 API calls 4374->4375 4376 401420 4375->4376 4376->4331 4378 4044b3 4377->4378 4379 4044b9 SendMessageW 4377->4379 4378->4379 4379->4326 4381 4045fd 4380->4381 4382 404552 GetWindowLongW 4380->4382 4381->4299 4382->4381 4383 404567 4382->4383 4383->4381 4384 404594 GetSysColor 4383->4384 4385 404597 4383->4385 4384->4385 4386 4045a7 SetBkMode 4385->4386 4387 40459d SetTextColor 4385->4387 4388 4045c5 4386->4388 4389 4045bf GetSysColor 4386->4389 4387->4386 4390 4045d6 4388->4390 4391 4045cc SetBkColor 4388->4391 4389->4388 4390->4381 4392 4045f0 CreateBrushIndirect 4390->4392 4393 4045e9 DeleteObject 4390->4393 4391->4390 4392->4381 4393->4392 5415 401a55 5416 402dcb 21 API calls 5415->5416 5417 401a5e ExpandEnvironmentStringsW 5416->5417 5418 401a72 5417->5418 5420 401a85 5417->5420 5419 401a77 lstrcmpW 5418->5419 5418->5420 5419->5420 4469 4023d7 4470 4023df 4469->4470 4473 4023e5 4469->4473 4471 402dcb 21 API calls 4470->4471 4471->4473 4472 4023f3 4474 402401 4472->4474 4476 402dcb 21 API calls 4472->4476 4473->4472 4475 402dcb 21 API calls 4473->4475 4477 402dcb 21 API calls 4474->4477 4475->4472 4476->4474 4478 40240a WritePrivateProfileStringW 4477->4478 4479 4014d7 4480 402da9 21 API calls 4479->4480 4481 4014dd Sleep 4480->4481 4483 402c4f 4481->4483 5426 402459 5427 402461 5426->5427 5428 40248c 5426->5428 5429 402e0b 21 API calls 5427->5429 5430 402dcb 21 API calls 5428->5430 5431 402468 5429->5431 5432 402493 5430->5432 5434 402dcb 21 API calls 5431->5434 5436 4024a0 5431->5436 5437 402e89 5432->5437 5435 402479 RegDeleteValueW RegCloseKey 5434->5435 5435->5436 5438 402e9d 5437->5438 5440 402e96 5437->5440 5438->5440 5441 402ece 5438->5441 5440->5436 5442 4063c1 RegOpenKeyExW 5441->5442 5443 402efc 5442->5443 5444 402f0c RegEnumValueW 5443->5444 5448 402f2f 5443->5448 5452 402fa6 5443->5452 5445 402f96 RegCloseKey 5444->5445 5444->5448 5445->5452 5446 402f6b RegEnumKeyW 5447 402f74 RegCloseKey 5446->5447 5446->5448 5449 406948 5 API calls 5447->5449 5448->5445 5448->5446 5448->5447 5450 402ece 6 API calls 5448->5450 5451 402f84 5449->5451 5450->5448 5451->5452 5453 402f88 RegDeleteKeyW 5451->5453 5452->5440 5453->5452 4552 40175a 4553 402dcb 21 API calls 4552->4553 4554 401761 SearchPathW 4553->4554 4555 40177c 4554->4555 5454 401d5d 5455 402da9 21 API calls 5454->5455 5456 401d64 5455->5456 5457 402da9 21 API calls 5456->5457 5458 401d70 GetDlgItem 5457->5458 5459 40265d 5458->5459 5460 6faf170d 5461 6faf15b6 GlobalFree 5460->5461 5464 6faf1725 5461->5464 5462 6faf176b GlobalFree 5463 6faf1740 5463->5462 5464->5462 5464->5463 5465 6faf1757 VirtualFree 5464->5465 5465->5462 5466 402663 5467 402692 5466->5467 5468 402677 5466->5468 5470 4026c2 5467->5470 5471 402697 5467->5471 5469 402da9 21 API calls 5468->5469 5478 40267e 5469->5478 5473 402dcb 21 API calls 5470->5473 5472 402dcb 21 API calls 5471->5472 5474 40269e 5472->5474 5475 4026c9 lstrlenW 5473->5475 5483 406576 WideCharToMultiByte 5474->5483 5475->5478 5477 4026b2 lstrlenA 5477->5478 5479 4026f6 5478->5479 5480 40270c 5478->5480 5482 406125 5 API calls 5478->5482 5479->5480 5481 4060f6 WriteFile 5479->5481 5481->5480 5482->5479 5483->5477 5484 403be4 5485 403bef 5484->5485 5486 403bf6 GlobalAlloc 5485->5486 5487 403bf3 5485->5487 5486->5487 4643 401966 4644 401968 4643->4644 4645 402dcb 21 API calls 4644->4645 4646 40196d 4645->4646 4649 405c60 4646->4649 4688 405f2b 4649->4688 4652 405c88 DeleteFileW 4654 401976 4652->4654 4653 405c9f 4655 405dca 4653->4655 4702 406554 lstrcpynW 4653->4702 4655->4654 4662 4068b1 2 API calls 4655->4662 4657 405cc5 4658 405cd8 4657->4658 4659 405ccb lstrcatW 4657->4659 4703 405e6f lstrlenW 4658->4703 4660 405cde 4659->4660 4663 405cee lstrcatW 4660->4663 4665 405cf9 lstrlenW FindFirstFileW 4660->4665 4664 405de4 4662->4664 4663->4665 4664->4654 4666 405de8 4664->4666 4667 405dbf 4665->4667 4677 405d1b 4665->4677 4668 405e23 3 API calls 4666->4668 4667->4655 4669 405dee 4668->4669 4672 405c18 5 API calls 4669->4672 4671 405da2 FindNextFileW 4674 405db8 FindClose 4671->4674 4671->4677 4673 405dfa 4672->4673 4675 405e14 4673->4675 4676 405dfe 4673->4676 4674->4667 4679 4055d9 28 API calls 4675->4679 4676->4654 4680 4055d9 28 API calls 4676->4680 4677->4671 4681 405c60 64 API calls 4677->4681 4683 4055d9 28 API calls 4677->4683 4686 4055d9 28 API calls 4677->4686 4707 406554 lstrcpynW 4677->4707 4708 405c18 4677->4708 4716 406314 MoveFileExW 4677->4716 4679->4654 4682 405e0b 4680->4682 4681->4677 4684 406314 40 API calls 4682->4684 4683->4671 4685 405e12 4684->4685 4685->4654 4686->4677 4720 406554 lstrcpynW 4688->4720 4690 405f3c 4721 405ece CharNextW CharNextW 4690->4721 4693 405c80 4693->4652 4693->4653 4694 406802 5 API calls 4700 405f52 4694->4700 4695 405f83 lstrlenW 4696 405f8e 4695->4696 4695->4700 4697 405e23 3 API calls 4696->4697 4699 405f93 GetFileAttributesW 4697->4699 4698 4068b1 2 API calls 4698->4700 4699->4693 4700->4693 4700->4695 4700->4698 4701 405e6f 2 API calls 4700->4701 4701->4695 4702->4657 4704 405e7d 4703->4704 4705 405e83 CharPrevW 4704->4705 4706 405e8f 4704->4706 4705->4704 4705->4706 4706->4660 4707->4677 4709 40601f 2 API calls 4708->4709 4710 405c24 4709->4710 4711 405c45 4710->4711 4712 405c33 RemoveDirectoryW 4710->4712 4713 405c3b DeleteFileW 4710->4713 4711->4677 4714 405c41 4712->4714 4713->4714 4714->4711 4715 405c51 SetFileAttributesW 4714->4715 4715->4711 4717 406328 4716->4717 4719 406335 4716->4719 4727 40619a 4717->4727 4719->4677 4720->4690 4723 405efd 4721->4723 4724 405eeb 4721->4724 4722 405f21 4722->4693 4722->4694 4723->4722 4726 405e50 CharNextW 4723->4726 4724->4723 4725 405ef8 CharNextW 4724->4725 4725->4722 4726->4723 4728 4061f0 GetShortPathNameW 4727->4728 4729 4061ca 4727->4729 4730 406205 4728->4730 4731 40630f 4728->4731 4754 406044 GetFileAttributesW CreateFileW 4729->4754 4730->4731 4733 40620d wsprintfA 4730->4733 4731->4719 4735 406591 21 API calls 4733->4735 4734 4061d4 CloseHandle GetShortPathNameW 4734->4731 4736 4061e8 4734->4736 4737 406235 4735->4737 4736->4728 4736->4731 4755 406044 GetFileAttributesW CreateFileW 4737->4755 4739 406242 4739->4731 4740 406251 GetFileSize GlobalAlloc 4739->4740 4741 406273 4740->4741 4742 406308 CloseHandle 4740->4742 4743 4060c7 ReadFile 4741->4743 4742->4731 4744 40627b 4743->4744 4744->4742 4756 405fa9 lstrlenA 4744->4756 4747 406292 lstrcpyA 4749 4062b4 4747->4749 4748 4062a6 4750 405fa9 4 API calls 4748->4750 4751 4062eb SetFilePointer 4749->4751 4750->4749 4752 4060f6 WriteFile 4751->4752 4753 406301 GlobalFree 4752->4753 4753->4742 4754->4734 4755->4739 4757 405fea lstrlenA 4756->4757 4758 405ff2 4757->4758 4759 405fc3 lstrcmpiA 4757->4759 4758->4747 4758->4748 4759->4758 4760 405fe1 CharNextA 4759->4760 4760->4757 4761 4015e6 4762 402dcb 21 API calls 4761->4762 4763 4015ed 4762->4763 4764 405ece 4 API calls 4763->4764 4765 4015f6 4764->4765 4766 401656 4765->4766 4767 405e50 CharNextW 4765->4767 4777 40163c GetFileAttributesW 4765->4777 4780 405b1f 4765->4780 4783 405aa8 CreateDirectoryW 4765->4783 4787 405b02 CreateDirectoryW 4765->4787 4768 401688 4766->4768 4769 40165b 4766->4769 4767->4765 4771 401423 28 API calls 4768->4771 4770 401423 28 API calls 4769->4770 4772 401662 4770->4772 4778 401680 4771->4778 4786 406554 lstrcpynW 4772->4786 4776 40166f SetCurrentDirectoryW 4776->4778 4777->4765 4781 406948 5 API calls 4780->4781 4782 405b26 4781->4782 4782->4765 4784 405af4 4783->4784 4785 405af8 GetLastError 4783->4785 4784->4765 4785->4784 4786->4776 4788 405b12 4787->4788 4789 405b16 GetLastError 4787->4789 4788->4765 4789->4788 5488 401c68 5489 402da9 21 API calls 5488->5489 5490 401c6f 5489->5490 5491 402da9 21 API calls 5490->5491 5492 401c7c 5491->5492 5493 401c91 5492->5493 5494 402dcb 21 API calls 5492->5494 5495 402dcb 21 API calls 5493->5495 5499 401ca1 5493->5499 5494->5493 5495->5499 5496 401cf8 5498 402dcb 21 API calls 5496->5498 5497 401cac 5500 402da9 21 API calls 5497->5500 5501 401cfd 5498->5501 5499->5496 5499->5497 5502 401cb1 5500->5502 5503 402dcb 21 API calls 5501->5503 5504 402da9 21 API calls 5502->5504 5505 401d06 FindWindowExW 5503->5505 5506 401cbd 5504->5506 5509 401d28 5505->5509 5507 401ce8 SendMessageW 5506->5507 5508 401cca SendMessageTimeoutW 5506->5508 5507->5509 5508->5509 5510 4028e9 5511 4028ef 5510->5511 5512 4028f7 FindClose 5511->5512 5513 402c4f 5511->5513 5512->5513 5514 6faf1000 5515 6faf101b 5 API calls 5514->5515 5516 6faf1019 5515->5516 5517 4016f1 5518 402dcb 21 API calls 5517->5518 5519 4016f7 GetFullPathNameW 5518->5519 5520 401711 5519->5520 5526 401733 5519->5526 5523 4068b1 2 API calls 5520->5523 5520->5526 5521 401748 GetShortPathNameW 5522 402c4f 5521->5522 5524 401723 5523->5524 5524->5526 5527 406554 lstrcpynW 5524->5527 5526->5521 5526->5522 5527->5526 5528 401e73 GetDC 5529 402da9 21 API calls 5528->5529 5530 401e85 GetDeviceCaps MulDiv ReleaseDC 5529->5530 5531 402da9 21 API calls 5530->5531 5532 401eb6 5531->5532 5533 406591 21 API calls 5532->5533 5534 401ef3 CreateFontIndirectW 5533->5534 5535 40265d 5534->5535 5536 4014f5 SetForegroundWindow 5537 402c4f 5536->5537 5538 402975 5539 402dcb 21 API calls 5538->5539 5540 402981 5539->5540 5541 402997 5540->5541 5542 402dcb 21 API calls 5540->5542 5543 40601f 2 API calls 5541->5543 5542->5541 5544 40299d 5543->5544 5566 406044 GetFileAttributesW CreateFileW 5544->5566 5546 4029aa 5547 402a60 5546->5547 5548 4029c5 GlobalAlloc 5546->5548 5549 402a48 5546->5549 5550 402a67 DeleteFileW 5547->5550 5551 402a7a 5547->5551 5548->5549 5552 4029de 5548->5552 5553 4032d9 35 API calls 5549->5553 5550->5551 5567 4034e7 SetFilePointer 5552->5567 5555 402a55 CloseHandle 5553->5555 5555->5547 5556 4029e4 5557 4034d1 ReadFile 5556->5557 5558 4029ed GlobalAlloc 5557->5558 5559 402a31 5558->5559 5560 4029fd 5558->5560 5561 4060f6 WriteFile 5559->5561 5562 4032d9 35 API calls 5560->5562 5563 402a3d GlobalFree 5561->5563 5565 402a0a 5562->5565 5563->5549 5564 402a28 GlobalFree 5564->5559 5565->5564 5566->5546 5567->5556 5079 405b7a ShellExecuteExW 5568 40197b 5569 402dcb 21 API calls 5568->5569 5570 401982 lstrlenW 5569->5570 5571 40265d 5570->5571 5080 4020fd 5081 4021c1 5080->5081 5082 40210f 5080->5082 5084 401423 28 API calls 5081->5084 5083 402dcb 21 API calls 5082->5083 5085 402116 5083->5085 5091 40231b 5084->5091 5086 402dcb 21 API calls 5085->5086 5087 40211f 5086->5087 5088 402135 LoadLibraryExW 5087->5088 5089 402127 GetModuleHandleW 5087->5089 5088->5081 5090 402146 5088->5090 5089->5088 5089->5090 5103 4069b7 5090->5103 5094 402190 5096 4055d9 28 API calls 5094->5096 5095 402157 5097 402176 5095->5097 5098 40215f 5095->5098 5100 402167 5096->5100 5108 6faf1817 5097->5108 5099 401423 28 API calls 5098->5099 5099->5100 5100->5091 5101 4021b3 FreeLibrary 5100->5101 5101->5091 5150 406576 WideCharToMultiByte 5103->5150 5105 4069d4 5106 4069db GetProcAddress 5105->5106 5107 402151 5105->5107 5106->5107 5107->5094 5107->5095 5109 6faf184a 5108->5109 5110 6faf1bff 22 API calls 5109->5110 5111 6faf1851 5110->5111 5112 6faf1976 5111->5112 5113 6faf1869 5111->5113 5114 6faf1862 5111->5114 5112->5100 5151 6faf2480 5113->5151 5167 6faf243e 5114->5167 5119 6faf18af 5180 6faf2655 5119->5180 5120 6faf18cd 5125 6faf191e 5120->5125 5126 6faf18d3 5120->5126 5121 6faf1898 5133 6faf188e 5121->5133 5177 6faf2e23 5121->5177 5123 6faf1885 5123->5133 5161 6faf2b98 5123->5161 5124 6faf187f 5124->5123 5129 6faf1890 5124->5129 5127 6faf2655 10 API calls 5125->5127 5131 6faf1666 2 API calls 5126->5131 5134 6faf190f 5127->5134 5128 6faf18b5 5135 6faf1654 3 API calls 5128->5135 5171 6faf2810 5129->5171 5137 6faf18f0 5131->5137 5133->5119 5133->5120 5141 6faf1965 5134->5141 5191 6faf2618 5134->5191 5138 6faf18bb 5135->5138 5140 6faf2655 10 API calls 5137->5140 5142 6faf1312 2 API calls 5138->5142 5139 6faf1896 5139->5133 5140->5134 5141->5112 5145 6faf196f GlobalFree 5141->5145 5144 6faf18c1 GlobalFree 5142->5144 5144->5134 5145->5112 5147 6faf1951 5147->5141 5149 6faf15dd 3 API calls 5147->5149 5148 6faf194a FreeLibrary 5148->5147 5149->5141 5150->5105 5159 6faf2498 5151->5159 5152 6faf12cc GlobalAlloc lstrcpynW 5152->5159 5154 6faf25c1 GlobalFree 5155 6faf186f 5154->5155 5154->5159 5155->5121 5155->5124 5155->5133 5156 6faf256b GlobalAlloc 5158 6faf2582 5156->5158 5157 6faf2540 GlobalAlloc WideCharToMultiByte 5157->5154 5158->5154 5199 6faf27a4 5158->5199 5159->5152 5159->5154 5159->5156 5159->5157 5159->5158 5195 6faf135a 5159->5195 5163 6faf2baa 5161->5163 5162 6faf2c4f CreateFileA 5166 6faf2c6d 5162->5166 5163->5162 5165 6faf2d39 5165->5133 5202 6faf2b42 5166->5202 5168 6faf2453 5167->5168 5169 6faf245e GlobalAlloc 5168->5169 5170 6faf1868 5168->5170 5169->5168 5170->5113 5175 6faf2840 5171->5175 5172 6faf28ee 5174 6faf28f4 GlobalSize 5172->5174 5176 6faf28fe 5172->5176 5173 6faf28db GlobalAlloc 5173->5176 5174->5176 5175->5172 5175->5173 5176->5139 5178 6faf2e2e 5177->5178 5179 6faf2e6e GlobalFree 5178->5179 5206 6faf12bb GlobalAlloc 5180->5206 5182 6faf270b lstrcpynW 5189 6faf265f 5182->5189 5183 6faf26fa StringFromGUID2 5183->5189 5184 6faf26d8 MultiByteToWideChar 5184->5189 5185 6faf271e wsprintfW 5185->5189 5186 6faf2742 GlobalFree 5186->5189 5187 6faf2777 GlobalFree 5187->5128 5188 6faf1312 2 API calls 5188->5189 5189->5182 5189->5183 5189->5184 5189->5185 5189->5186 5189->5187 5189->5188 5207 6faf1381 5189->5207 5192 6faf2626 5191->5192 5193 6faf1931 5191->5193 5192->5193 5194 6faf2642 GlobalFree 5192->5194 5193->5147 5193->5148 5194->5192 5196 6faf1361 5195->5196 5197 6faf12cc 2 API calls 5196->5197 5198 6faf137f 5197->5198 5198->5159 5200 6faf2808 5199->5200 5201 6faf27b2 VirtualAlloc 5199->5201 5200->5158 5201->5200 5203 6faf2b4d 5202->5203 5204 6faf2b5d 5203->5204 5205 6faf2b52 GetLastError 5203->5205 5204->5165 5205->5204 5206->5189 5208 6faf13ac 5207->5208 5209 6faf138a 5207->5209 5208->5189 5209->5208 5210 6faf1390 lstrcpyW 5209->5210 5210->5208 5572 40497d 5573 4049b3 5572->5573 5574 40498d 5572->5574 5575 40453a 8 API calls 5573->5575 5576 4044d3 22 API calls 5574->5576 5577 4049bf 5575->5577 5578 40499a SetDlgItemTextW 5576->5578 5578->5573 5579 402b7e 5580 402bd0 5579->5580 5581 402b85 5579->5581 5583 406948 5 API calls 5580->5583 5582 402bce 5581->5582 5584 402da9 21 API calls 5581->5584 5585 402bd7 5583->5585 5586 402b93 5584->5586 5587 402dcb 21 API calls 5585->5587 5588 402da9 21 API calls 5586->5588 5589 402be0 5587->5589 5592 402b9f 5588->5592 5589->5582 5590 402be4 IIDFromString 5589->5590 5590->5582 5591 402bf3 5590->5591 5591->5582 5597 406554 lstrcpynW 5591->5597 5596 40649b wsprintfW 5592->5596 5594 402c10 CoTaskMemFree 5594->5582 5596->5582 5597->5594 5598 401000 5599 401037 BeginPaint GetClientRect 5598->5599 5601 40100c DefWindowProcW 5598->5601 5602 4010f3 5599->5602 5603 401179 5601->5603 5604 401073 CreateBrushIndirect FillRect DeleteObject 5602->5604 5605 4010fc 5602->5605 5604->5602 5606 401102 CreateFontIndirectW 5605->5606 5607 401167 EndPaint 5605->5607 5606->5607 5608 401112 6 API calls 5606->5608 5607->5603 5608->5607 5609 402a80 5610 402da9 21 API calls 5609->5610 5611 402a86 5610->5611 5612 402ac9 5611->5612 5613 402aad 5611->5613 5622 402953 5611->5622 5614 402ae3 5612->5614 5615 402ad3 5612->5615 5616 402ab2 5613->5616 5617 402ac3 5613->5617 5619 406591 21 API calls 5614->5619 5618 402da9 21 API calls 5615->5618 5623 406554 lstrcpynW 5616->5623 5624 40649b wsprintfW 5617->5624 5618->5622 5619->5622 5623->5622 5624->5622 4137 401781 4143 402dcb 4137->4143 4141 40178f 4142 406073 2 API calls 4141->4142 4142->4141 4144 402dd7 4143->4144 4145 406591 21 API calls 4144->4145 4146 402df8 4145->4146 4147 401788 4146->4147 4148 406802 5 API calls 4146->4148 4149 406073 4147->4149 4148->4147 4150 406080 GetTickCount GetTempFileNameW 4149->4150 4151 4060ba 4150->4151 4152 4060b6 4150->4152 4151->4141 4152->4150 4152->4151 5625 401d82 5626 402da9 21 API calls 5625->5626 5627 401d93 SetWindowLongW 5626->5627 5628 402c4f 5627->5628 4172 401f03 4173 402da9 21 API calls 4172->4173 4174 401f09 4173->4174 4175 402da9 21 API calls 4174->4175 4176 401f15 4175->4176 4177 401f21 ShowWindow 4176->4177 4178 401f2c EnableWindow 4176->4178 4179 402c4f 4177->4179 4178->4179 5629 401503 5630 401508 5629->5630 5631 40152e 5629->5631 5632 402da9 21 API calls 5630->5632 5632->5631 5633 402903 5634 40290b 5633->5634 5635 40290f FindNextFileW 5634->5635 5638 402921 5634->5638 5636 402968 5635->5636 5635->5638 5639 406554 lstrcpynW 5636->5639 5639->5638 5640 6faf23e9 5641 6faf2453 5640->5641 5642 6faf245e GlobalAlloc 5641->5642 5643 6faf247d 5641->5643 5642->5641 5644 401588 5645 402bc9 5644->5645 5648 40649b wsprintfW 5645->5648 5647 402bce 5648->5647 5649 404609 lstrcpynW lstrlenW 5650 40198d 5651 402da9 21 API calls 5650->5651 5652 401994 5651->5652 5653 402da9 21 API calls 5652->5653 5654 4019a1 5653->5654 5655 402dcb 21 API calls 5654->5655 5656 4019b8 lstrlenW 5655->5656 5658 4019c9 5656->5658 5657 401a0a 5658->5657 5662 406554 lstrcpynW 5658->5662 5660 4019fa 5660->5657 5661 4019ff lstrlenW 5660->5661 5661->5657 5662->5660 5663 6faf10e1 5669 6faf1111 5663->5669 5664 6faf12b0 GlobalFree 5665 6faf1240 GlobalFree 5665->5669 5666 6faf11d7 GlobalAlloc 5666->5669 5667 6faf12ab 5667->5664 5668 6faf135a 2 API calls 5668->5669 5669->5664 5669->5665 5669->5666 5669->5667 5669->5668 5670 6faf1312 2 API calls 5669->5670 5671 6faf129a GlobalFree 5669->5671 5672 6faf1381 lstrcpyW 5669->5672 5673 6faf116b GlobalAlloc 5669->5673 5670->5669 5671->5669 5672->5669 5673->5669 5674 40168f 5675 402dcb 21 API calls 5674->5675 5676 401695 5675->5676 5677 4068b1 2 API calls 5676->5677 5678 40169b 5677->5678 4254 6faf2a7f 4255 6faf2acf 4254->4255 4256 6faf2a8f VirtualProtect 4254->4256 4256->4255 5679 402b10 5680 402da9 21 API calls 5679->5680 5681 402b16 5680->5681 5682 406591 21 API calls 5681->5682 5683 402953 5681->5683 5682->5683 4257 402711 4258 402da9 21 API calls 4257->4258 4259 402720 4258->4259 4260 40276a ReadFile 4259->4260 4262 4027aa MultiByteToWideChar 4259->4262 4263 40285f 4259->4263 4266 402803 4259->4266 4267 4027d0 SetFilePointer MultiByteToWideChar 4259->4267 4268 402870 4259->4268 4270 40285d 4259->4270 4280 4060c7 ReadFile 4259->4280 4260->4259 4260->4270 4262->4259 4282 40649b wsprintfW 4263->4282 4266->4259 4266->4270 4271 406125 SetFilePointer 4266->4271 4267->4259 4269 402891 SetFilePointer 4268->4269 4268->4270 4269->4270 4272 406141 4271->4272 4279 406159 4271->4279 4273 4060c7 ReadFile 4272->4273 4274 40614d 4273->4274 4275 406162 SetFilePointer 4274->4275 4276 40618a SetFilePointer 4274->4276 4274->4279 4275->4276 4277 40616d 4275->4277 4276->4279 4283 4060f6 WriteFile 4277->4283 4279->4266 4281 4060e5 4280->4281 4281->4259 4282->4270 4284 406114 4283->4284 4284->4279 5684 401491 5685 4055d9 28 API calls 5684->5685 5686 401498 5685->5686 5687 404692 5688 4046aa 5687->5688 5692 4047c4 5687->5692 5693 4044d3 22 API calls 5688->5693 5689 40482e 5690 4048f8 5689->5690 5691 404838 GetDlgItem 5689->5691 5698 40453a 8 API calls 5690->5698 5694 404852 5691->5694 5695 4048b9 5691->5695 5692->5689 5692->5690 5696 4047ff GetDlgItem SendMessageW 5692->5696 5697 404711 5693->5697 5694->5695 5702 404878 SendMessageW LoadCursorW SetCursor 5694->5702 5695->5690 5703 4048cb 5695->5703 5720 4044f5 KiUserCallbackDispatcher 5696->5720 5700 4044d3 22 API calls 5697->5700 5701 4048f3 5698->5701 5707 40471e CheckDlgButton 5700->5707 5721 404941 5702->5721 5704 4048e1 5703->5704 5705 4048d1 SendMessageW 5703->5705 5704->5701 5709 4048e7 SendMessageW 5704->5709 5705->5704 5706 404829 5710 40491d SendMessageW 5706->5710 5718 4044f5 KiUserCallbackDispatcher 5707->5718 5709->5701 5710->5689 5713 40473c GetDlgItem 5719 404508 SendMessageW 5713->5719 5715 404752 SendMessageW 5716 404778 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5715->5716 5717 40476f GetSysColor 5715->5717 5716->5701 5717->5716 5718->5713 5719->5715 5720->5706 5724 405b7a ShellExecuteExW 5721->5724 5723 4048a7 LoadCursorW SetCursor 5723->5695 5724->5723 4394 401794 4395 402dcb 21 API calls 4394->4395 4396 40179b 4395->4396 4397 4017c3 4396->4397 4398 4017bb 4396->4398 4455 406554 lstrcpynW 4397->4455 4454 406554 lstrcpynW 4398->4454 4401 4017ce 4456 405e23 lstrlenW CharPrevW 4401->4456 4402 4017c1 4405 406802 5 API calls 4402->4405 4410 4017e0 4405->4410 4407 40181c 4462 40601f GetFileAttributesW 4407->4462 4410->4407 4411 4017f2 CompareFileTime 4410->4411 4412 4018b2 4410->4412 4415 406554 lstrcpynW 4410->4415 4421 406591 21 API calls 4410->4421 4430 405bb4 MessageBoxIndirectW 4410->4430 4432 401889 4410->4432 4433 406044 GetFileAttributesW CreateFileW 4410->4433 4459 4068b1 FindFirstFileW 4410->4459 4411->4410 4413 4055d9 28 API calls 4412->4413 4416 4018bc 4413->4416 4414 4055d9 28 API calls 4420 40189e 4414->4420 4415->4410 4434 4032d9 4416->4434 4418 4018e3 SetFileTime 4422 4018f5 FindCloseChangeNotification 4418->4422 4421->4410 4422->4420 4423 401906 4422->4423 4424 40190b 4423->4424 4425 40191e 4423->4425 4427 406591 21 API calls 4424->4427 4426 406591 21 API calls 4425->4426 4429 401926 4426->4429 4428 401913 lstrcatW 4427->4428 4428->4429 4429->4420 4431 405bb4 MessageBoxIndirectW 4429->4431 4430->4410 4431->4420 4432->4414 4432->4420 4433->4410 4436 4032f2 4434->4436 4435 403320 4465 4034d1 4435->4465 4436->4435 4468 4034e7 SetFilePointer 4436->4468 4440 40346a 4442 4034ac 4440->4442 4447 40346e 4440->4447 4441 40333d GetTickCount 4443 4018cf 4441->4443 4450 403369 4441->4450 4444 4034d1 ReadFile 4442->4444 4443->4418 4443->4422 4444->4443 4445 4034d1 ReadFile 4445->4450 4446 4034d1 ReadFile 4446->4447 4447->4443 4447->4446 4448 4060f6 WriteFile 4447->4448 4448->4447 4449 4033bf GetTickCount 4449->4450 4450->4443 4450->4445 4450->4449 4451 4033e4 MulDiv wsprintfW 4450->4451 4453 4060f6 WriteFile 4450->4453 4452 4055d9 28 API calls 4451->4452 4452->4450 4453->4450 4454->4402 4455->4401 4457 4017d4 lstrcatW 4456->4457 4458 405e3f lstrcatW 4456->4458 4457->4402 4458->4457 4460 4068d2 4459->4460 4461 4068c7 FindClose 4459->4461 4460->4410 4461->4460 4463 406031 SetFileAttributesW 4462->4463 4464 40603e 4462->4464 4463->4464 4464->4410 4466 4060c7 ReadFile 4465->4466 4467 40332b 4466->4467 4467->4440 4467->4441 4467->4443 4468->4435 5725 6faf1979 5727 6faf199c 5725->5727 5726 6faf19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5729 6faf1312 2 API calls 5726->5729 5727->5726 5728 6faf19d1 GlobalFree 5727->5728 5728->5726 5730 6faf1b6e GlobalFree GlobalFree 5729->5730 5731 401a97 5732 402da9 21 API calls 5731->5732 5733 401aa0 5732->5733 5734 402da9 21 API calls 5733->5734 5735 401a45 5734->5735 4484 405718 4485 4058c2 4484->4485 4486 405739 GetDlgItem GetDlgItem GetDlgItem 4484->4486 4488 4058f3 4485->4488 4489 4058cb GetDlgItem CreateThread FindCloseChangeNotification 4485->4489 4530 404508 SendMessageW 4486->4530 4491 40591e 4488->4491 4492 405943 4488->4492 4493 40590a ShowWindow ShowWindow 4488->4493 4489->4488 4533 4056ac OleInitialize 4489->4533 4490 4057a9 4496 4057b0 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4490->4496 4494 40592a 4491->4494 4495 40597e 4491->4495 4500 40453a 8 API calls 4492->4500 4532 404508 SendMessageW 4493->4532 4498 405932 4494->4498 4499 405958 ShowWindow 4494->4499 4495->4492 4503 40598c SendMessageW 4495->4503 4501 405802 SendMessageW SendMessageW 4496->4501 4502 40581e 4496->4502 4504 4044ac SendMessageW 4498->4504 4505 405978 4499->4505 4506 40596a 4499->4506 4511 405951 4500->4511 4501->4502 4509 405831 4502->4509 4510 405823 SendMessageW 4502->4510 4503->4511 4512 4059a5 CreatePopupMenu 4503->4512 4504->4492 4508 4044ac SendMessageW 4505->4508 4507 4055d9 28 API calls 4506->4507 4507->4505 4508->4495 4514 4044d3 22 API calls 4509->4514 4510->4509 4513 406591 21 API calls 4512->4513 4515 4059b5 AppendMenuW 4513->4515 4516 405841 4514->4516 4517 4059d2 GetWindowRect 4515->4517 4518 4059e5 TrackPopupMenu 4515->4518 4519 40584a ShowWindow 4516->4519 4520 40587e GetDlgItem SendMessageW 4516->4520 4517->4518 4518->4511 4522 405a00 4518->4522 4523 405860 ShowWindow 4519->4523 4524 40586d 4519->4524 4520->4511 4521 4058a5 SendMessageW SendMessageW 4520->4521 4521->4511 4525 405a1c SendMessageW 4522->4525 4523->4524 4531 404508 SendMessageW 4524->4531 4525->4525 4526 405a39 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4525->4526 4528 405a5e SendMessageW 4526->4528 4528->4528 4529 405a87 GlobalUnlock SetClipboardData CloseClipboard 4528->4529 4529->4511 4530->4490 4531->4520 4532->4491 4534 40451f SendMessageW 4533->4534 4535 4056cf 4534->4535 4538 401389 2 API calls 4535->4538 4539 4056f6 4535->4539 4536 40451f SendMessageW 4537 405708 OleUninitialize 4536->4537 4538->4535 4539->4536 4540 401598 4541 4015b1 4540->4541 4542 4015a8 ShowWindow 4540->4542 4543 402c4f 4541->4543 4544 4015bf ShowWindow 4541->4544 4542->4541 4544->4543 4545 402419 4546 402dcb 21 API calls 4545->4546 4547 402428 4546->4547 4548 402dcb 21 API calls 4547->4548 4549 402431 4548->4549 4550 402dcb 21 API calls 4549->4550 4551 40243b GetPrivateProfileStringW 4550->4551 5736 404d1a 5737 404d46 5736->5737 5738 404d2a 5736->5738 5740 404d79 5737->5740 5741 404d4c SHGetPathFromIDListW 5737->5741 5747 405b98 GetDlgItemTextW 5738->5747 5743 404d5c 5741->5743 5746 404d63 SendMessageW 5741->5746 5742 404d37 SendMessageW 5742->5737 5744 40140b 2 API calls 5743->5744 5744->5746 5746->5740 5747->5742 4556 6faf1774 4557 6faf17a3 4556->4557 4580 6faf1bff 4557->4580 4559 6faf17aa 4560 6faf17bd 4559->4560 4561 6faf17b1 4559->4561 4563 6faf17c7 4560->4563 4564 6faf17e4 4560->4564 4562 6faf1312 2 API calls 4561->4562 4567 6faf17bb 4562->4567 4614 6faf15dd wsprintfW 4563->4614 4565 6faf180e 4564->4565 4566 6faf17ea 4564->4566 4570 6faf15dd 3 API calls 4565->4570 4569 6faf1654 3 API calls 4566->4569 4572 6faf17ef 4569->4572 4570->4567 4574 6faf1312 2 API calls 4572->4574 4576 6faf17f5 GlobalFree 4574->4576 4576->4567 4578 6faf1809 GlobalFree 4576->4578 4578->4567 4625 6faf12bb GlobalAlloc 4580->4625 4582 6faf1c26 4626 6faf12bb GlobalAlloc 4582->4626 4584 6faf1e6b GlobalFree GlobalFree GlobalFree 4585 6faf1e88 4584->4585 4596 6faf1ed2 4584->4596 4586 6faf227e 4585->4586 4593 6faf1e9d 4585->4593 4585->4596 4588 6faf22a0 GetModuleHandleW 4586->4588 4586->4596 4587 6faf1d26 GlobalAlloc 4604 6faf1c31 4587->4604 4590 6faf22c6 4588->4590 4591 6faf22b1 LoadLibraryW 4588->4591 4589 6faf1d8f GlobalFree 4589->4604 4633 6faf16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4590->4633 4591->4590 4591->4596 4592 6faf1d71 lstrcpyW 4595 6faf1d7b lstrcpyW 4592->4595 4593->4596 4629 6faf12cc 4593->4629 4595->4604 4596->4559 4597 6faf2318 4597->4596 4601 6faf2325 lstrlenW 4597->4601 4598 6faf2126 4632 6faf12bb GlobalAlloc 4598->4632 4634 6faf16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4601->4634 4602 6faf22d8 4602->4597 4612 6faf2302 GetProcAddress 4602->4612 4604->4584 4604->4587 4604->4589 4604->4592 4604->4595 4604->4596 4604->4598 4605 6faf2067 GlobalFree 4604->4605 4606 6faf21ae 4604->4606 4607 6faf1dcd 4604->4607 4609 6faf12cc 2 API calls 4604->4609 4605->4604 4606->4596 4611 6faf2216 lstrcpyW 4606->4611 4607->4604 4627 6faf162f GlobalSize GlobalAlloc 4607->4627 4608 6faf233f 4608->4596 4609->4604 4611->4596 4612->4597 4613 6faf212f 4613->4559 4615 6faf1312 2 API calls 4614->4615 4616 6faf15fe 4615->4616 4617 6faf1654 4616->4617 4636 6faf12bb GlobalAlloc 4617->4636 4619 6faf1659 4637 6faf1666 4619->4637 4622 6faf1312 4623 6faf131b GlobalAlloc lstrcpynW 4622->4623 4624 6faf1355 CloseHandle 4622->4624 4623->4624 4624->4567 4625->4582 4626->4604 4628 6faf164d 4627->4628 4628->4607 4635 6faf12bb GlobalAlloc 4629->4635 4631 6faf12db lstrcpynW 4631->4596 4632->4613 4633->4602 4634->4608 4635->4631 4636->4619 4638 6faf169f lstrcpyW 4637->4638 4639 6faf1672 wsprintfW 4637->4639 4642 6faf1663 4638->4642 4639->4642 4642->4622 5748 40201b 5749 402dcb 21 API calls 5748->5749 5750 402022 5749->5750 5751 4068b1 2 API calls 5750->5751 5752 402028 5751->5752 5754 402039 5752->5754 5755 40649b wsprintfW 5752->5755 5755->5754 5756 401b9c 5757 402dcb 21 API calls 5756->5757 5758 401ba3 5757->5758 5759 402da9 21 API calls 5758->5759 5760 401bac wsprintfW 5759->5760 5761 402c4f 5760->5761 5762 40149e 5763 4023c2 5762->5763 5764 4014ac PostQuitMessage 5762->5764 5764->5763 5765 4016a0 5766 402dcb 21 API calls 5765->5766 5767 4016a7 5766->5767 5768 402dcb 21 API calls 5767->5768 5769 4016b0 5768->5769 5770 402dcb 21 API calls 5769->5770 5771 4016b9 MoveFileW 5770->5771 5772 4016c5 5771->5772 5773 4016cc 5771->5773 5774 401423 28 API calls 5772->5774 5775 4068b1 2 API calls 5773->5775 5777 40231b 5773->5777 5774->5777 5776 4016db 5775->5776 5776->5777 5778 406314 40 API calls 5776->5778 5778->5772 5779 401a24 5780 402dcb 21 API calls 5779->5780 5781 401a2b 5780->5781 5782 402dcb 21 API calls 5781->5782 5783 401a34 5782->5783 5784 401a3b lstrcmpiW 5783->5784 5785 401a4d lstrcmpW 5783->5785 5786 401a41 5784->5786 5785->5786 5787 402324 5788 402dcb 21 API calls 5787->5788 5789 40232a 5788->5789 5790 402dcb 21 API calls 5789->5790 5791 402333 5790->5791 5792 402dcb 21 API calls 5791->5792 5793 40233c 5792->5793 5794 4068b1 2 API calls 5793->5794 5795 402345 5794->5795 5796 402356 lstrlenW lstrlenW 5795->5796 5800 402349 5795->5800 5798 4055d9 28 API calls 5796->5798 5797 4055d9 28 API calls 5801 402351 5797->5801 5799 402394 SHFileOperationW 5798->5799 5799->5800 5799->5801 5800->5797 5800->5801 5802 401da6 5803 401db9 GetDlgItem 5802->5803 5804 401dac 5802->5804 5806 401db3 5803->5806 5805 402da9 21 API calls 5804->5805 5805->5806 5807 401dfa GetClientRect LoadImageW SendMessageW 5806->5807 5809 402dcb 21 API calls 5806->5809 5810 401e58 5807->5810 5812 401e64 5807->5812 5809->5807 5811 401e5d DeleteObject 5810->5811 5810->5812 5811->5812 5813 4023a8 5814 4023af 5813->5814 5817 4023c2 5813->5817 5815 406591 21 API calls 5814->5815 5816 4023bc 5815->5816 5816->5817 5818 405bb4 MessageBoxIndirectW 5816->5818 5818->5817 5819 402c2a SendMessageW 5820 402c44 InvalidateRect 5819->5820 5821 402c4f 5819->5821 5820->5821 5822 6faf2d43 5823 6faf2d5b 5822->5823 5824 6faf162f 2 API calls 5823->5824 5825 6faf2d76 5824->5825 4790 40352f SetErrorMode GetVersionExW 4791 403583 GetVersionExW 4790->4791 4792 4035bb 4790->4792 4791->4792 4793 403612 4792->4793 4794 406948 5 API calls 4792->4794 4795 4068d8 3 API calls 4793->4795 4794->4793 4796 403628 lstrlenA 4795->4796 4796->4793 4797 403638 4796->4797 4798 406948 5 API calls 4797->4798 4799 40363f 4798->4799 4800 406948 5 API calls 4799->4800 4801 403646 4800->4801 4802 406948 5 API calls 4801->4802 4803 403652 #17 OleInitialize SHGetFileInfoW 4802->4803 4878 406554 lstrcpynW 4803->4878 4806 4036a1 GetCommandLineW 4879 406554 lstrcpynW 4806->4879 4808 4036b3 4809 405e50 CharNextW 4808->4809 4810 4036d9 CharNextW 4809->4810 4818 4036eb 4810->4818 4811 4037ed 4812 403801 GetTempPathW 4811->4812 4880 4034fe 4812->4880 4814 403819 4815 403873 DeleteFileW 4814->4815 4816 40381d GetWindowsDirectoryW lstrcatW 4814->4816 4890 4030a2 GetTickCount GetModuleFileNameW 4815->4890 4819 4034fe 12 API calls 4816->4819 4817 405e50 CharNextW 4817->4818 4818->4811 4818->4817 4824 4037ef 4818->4824 4821 403839 4819->4821 4821->4815 4823 40383d GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4821->4823 4822 403887 4830 405e50 CharNextW 4822->4830 4861 40392e 4822->4861 4869 40393e 4822->4869 4825 4034fe 12 API calls 4823->4825 4974 406554 lstrcpynW 4824->4974 4828 40386b 4825->4828 4828->4815 4828->4869 4834 4038a6 4830->4834 4832 403ab0 4835 403ab8 GetCurrentProcess OpenProcessToken 4832->4835 4842 403b34 ExitProcess 4832->4842 4833 403a8c 4836 405bb4 MessageBoxIndirectW 4833->4836 4839 403904 4834->4839 4840 403947 4834->4840 4837 403ad0 LookupPrivilegeValueW AdjustTokenPrivileges 4835->4837 4838 403b04 4835->4838 4843 403a9a ExitProcess 4836->4843 4837->4838 4845 406948 5 API calls 4838->4845 4846 405f2b 18 API calls 4839->4846 4844 405b1f 5 API calls 4840->4844 4847 40394c lstrlenW 4844->4847 4848 403b0b 4845->4848 4849 403910 4846->4849 4977 406554 lstrcpynW 4847->4977 4851 403b20 ExitWindowsEx 4848->4851 4853 403b2d 4848->4853 4849->4869 4975 406554 lstrcpynW 4849->4975 4851->4842 4851->4853 4852 403966 4855 40397e 4852->4855 4978 406554 lstrcpynW 4852->4978 4856 40140b 2 API calls 4853->4856 4860 4039a4 wsprintfW 4855->4860 4876 4039d0 4855->4876 4856->4842 4857 403923 4976 406554 lstrcpynW 4857->4976 4862 406591 21 API calls 4860->4862 4918 403c26 4861->4918 4862->4855 4863 405b02 2 API calls 4863->4876 4864 405aa8 2 API calls 4864->4876 4865 4039e0 GetFileAttributesW 4867 4039ec DeleteFileW 4865->4867 4865->4876 4866 403a1a SetCurrentDirectoryW 4868 406314 40 API calls 4866->4868 4867->4876 4870 403a29 CopyFileW 4868->4870 4979 403b4c 4869->4979 4870->4869 4870->4876 4871 405c60 71 API calls 4871->4876 4872 406314 40 API calls 4872->4876 4873 406591 21 API calls 4873->4876 4874 405b37 2 API calls 4874->4876 4875 403aa2 CloseHandle 4875->4869 4876->4855 4876->4860 4876->4863 4876->4864 4876->4865 4876->4866 4876->4869 4876->4871 4876->4872 4876->4873 4876->4874 4876->4875 4877 4068b1 2 API calls 4876->4877 4877->4876 4878->4806 4879->4808 4881 406802 5 API calls 4880->4881 4883 40350a 4881->4883 4882 403514 4882->4814 4883->4882 4884 405e23 3 API calls 4883->4884 4885 40351c 4884->4885 4886 405b02 2 API calls 4885->4886 4887 403522 4886->4887 4888 406073 2 API calls 4887->4888 4889 40352d 4888->4889 4889->4814 4986 406044 GetFileAttributesW CreateFileW 4890->4986 4892 4030e2 4911 4030f2 4892->4911 4987 406554 lstrcpynW 4892->4987 4894 403108 4895 405e6f 2 API calls 4894->4895 4896 40310e 4895->4896 4988 406554 lstrcpynW 4896->4988 4898 403119 GetFileSize 4899 403213 4898->4899 4917 403130 4898->4917 4989 40303e 4899->4989 4901 40321c 4903 40324c GlobalAlloc 4901->4903 4901->4911 5001 4034e7 SetFilePointer 4901->5001 4902 4034d1 ReadFile 4902->4917 5000 4034e7 SetFilePointer 4903->5000 4906 40327f 4908 40303e 6 API calls 4906->4908 4907 403267 4910 4032d9 35 API calls 4907->4910 4908->4911 4909 403235 4912 4034d1 ReadFile 4909->4912 4915 403273 4910->4915 4911->4822 4913 403240 4912->4913 4913->4903 4913->4911 4914 40303e 6 API calls 4914->4917 4915->4911 4915->4915 4916 4032b0 SetFilePointer 4915->4916 4916->4911 4917->4899 4917->4902 4917->4906 4917->4911 4917->4914 4919 406948 5 API calls 4918->4919 4920 403c3a 4919->4920 4921 403c40 4920->4921 4922 403c52 4920->4922 5010 40649b wsprintfW 4921->5010 4923 406422 3 API calls 4922->4923 4924 403c82 4923->4924 4926 403ca1 lstrcatW 4924->4926 4928 406422 3 API calls 4924->4928 4927 403c50 4926->4927 5002 403efc 4927->5002 4928->4926 4931 405f2b 18 API calls 4932 403cd3 4931->4932 4933 403d67 4932->4933 4935 406422 3 API calls 4932->4935 4934 405f2b 18 API calls 4933->4934 4936 403d6d 4934->4936 4937 403d05 4935->4937 4938 403d7d LoadImageW 4936->4938 4939 406591 21 API calls 4936->4939 4937->4933 4943 403d26 lstrlenW 4937->4943 4946 405e50 CharNextW 4937->4946 4940 403e23 4938->4940 4941 403da4 RegisterClassW 4938->4941 4939->4938 4942 40140b 2 API calls 4940->4942 4944 403dda SystemParametersInfoW CreateWindowExW 4941->4944 4973 403e2d 4941->4973 4945 403e29 4942->4945 4947 403d34 lstrcmpiW 4943->4947 4948 403d5a 4943->4948 4944->4940 4953 403efc 22 API calls 4945->4953 4945->4973 4951 403d23 4946->4951 4947->4948 4949 403d44 GetFileAttributesW 4947->4949 4950 405e23 3 API calls 4948->4950 4952 403d50 4949->4952 4954 403d60 4950->4954 4951->4943 4952->4948 4955 405e6f 2 API calls 4952->4955 4956 403e3a 4953->4956 5011 406554 lstrcpynW 4954->5011 4955->4948 4958 403e46 ShowWindow 4956->4958 4959 403ec9 4956->4959 4961 4068d8 3 API calls 4958->4961 4960 4056ac 5 API calls 4959->4960 4962 403ecf 4960->4962 4963 403e5e 4961->4963 4964 403ed3 4962->4964 4965 403eeb 4962->4965 4966 403e6c GetClassInfoW 4963->4966 4968 4068d8 3 API calls 4963->4968 4971 40140b 2 API calls 4964->4971 4964->4973 4967 40140b 2 API calls 4965->4967 4969 403e80 GetClassInfoW RegisterClassW 4966->4969 4970 403e96 DialogBoxParamW 4966->4970 4967->4973 4968->4966 4969->4970 4972 40140b 2 API calls 4970->4972 4971->4973 4972->4973 4973->4869 4974->4812 4975->4857 4976->4861 4977->4852 4978->4855 4980 403b64 4979->4980 4981 403b56 CloseHandle 4979->4981 5013 403b91 4980->5013 4981->4980 4984 405c60 71 API calls 4985 403a7f OleUninitialize 4984->4985 4985->4832 4985->4833 4986->4892 4987->4894 4988->4898 4990 403047 4989->4990 4991 40305f 4989->4991 4992 403050 DestroyWindow 4990->4992 4993 403057 4990->4993 4994 403067 4991->4994 4995 40306f GetTickCount 4991->4995 4992->4993 4993->4901 4996 406984 2 API calls 4994->4996 4997 4030a0 4995->4997 4998 40307d CreateDialogParamW ShowWindow 4995->4998 4999 40306d 4996->4999 4997->4901 4998->4997 4999->4901 5000->4907 5001->4909 5003 403f10 5002->5003 5012 40649b wsprintfW 5003->5012 5005 403f81 5006 403fb5 22 API calls 5005->5006 5008 403f86 5006->5008 5007 403cb1 5007->4931 5008->5007 5009 406591 21 API calls 5008->5009 5009->5008 5010->4927 5011->4933 5012->5005 5014 403b9f 5013->5014 5015 403b69 5014->5015 5016 403ba4 FreeLibrary GlobalFree 5014->5016 5015->4984 5016->5015 5016->5016 5017 4024af 5018 402dcb 21 API calls 5017->5018 5019 4024c1 5018->5019 5020 402dcb 21 API calls 5019->5020 5021 4024cb 5020->5021 5034 402e5b 5021->5034 5024 402c4f 5025 402503 5028 402da9 21 API calls 5025->5028 5030 40250f 5025->5030 5026 402dcb 21 API calls 5027 4024f9 lstrlenW 5026->5027 5027->5025 5028->5030 5029 40252e RegSetValueExW 5031 402544 RegCloseKey 5029->5031 5030->5029 5032 4032d9 35 API calls 5030->5032 5031->5024 5032->5029 5035 402e76 5034->5035 5038 4063ef 5035->5038 5039 4063fe 5038->5039 5040 406409 RegCreateKeyExW 5039->5040 5041 4024db 5039->5041 5040->5041 5041->5024 5041->5025 5041->5026 5042 402930 5043 402dcb 21 API calls 5042->5043 5044 402937 FindFirstFileW 5043->5044 5045 40294a 5044->5045 5046 40295f 5044->5046 5047 402968 5046->5047 5050 40649b wsprintfW 5046->5050 5051 406554 lstrcpynW 5047->5051 5050->5047 5051->5045 5826 401931 5827 401968 5826->5827 5828 402dcb 21 API calls 5827->5828 5829 40196d 5828->5829 5830 405c60 71 API calls 5829->5830 5831 401976 5830->5831 5832 401934 5833 402dcb 21 API calls 5832->5833 5834 40193b 5833->5834 5835 405bb4 MessageBoxIndirectW 5834->5835 5836 401944 5835->5836 5052 4028b6 5053 4028bd 5052->5053 5054 402bce 5052->5054 5055 402da9 21 API calls 5053->5055 5056 4028c4 5055->5056 5057 4028d3 SetFilePointer 5056->5057 5057->5054 5058 4028e3 5057->5058 5060 40649b wsprintfW 5058->5060 5060->5054 5061 6faf1058 5063 6faf1074 5061->5063 5062 6faf10dd 5063->5062 5064 6faf1092 5063->5064 5075 6faf15b6 5063->5075 5066 6faf15b6 GlobalFree 5064->5066 5067 6faf10a2 5066->5067 5068 6faf10a9 GlobalSize 5067->5068 5069 6faf10b2 5067->5069 5068->5069 5070 6faf10b6 GlobalAlloc 5069->5070 5072 6faf10c8 5069->5072 5071 6faf15dd 3 API calls 5070->5071 5073 6faf10c7 5071->5073 5074 6faf10d2 GlobalFree 5072->5074 5073->5072 5074->5062 5077 6faf15bc 5075->5077 5076 6faf15c2 5076->5064 5077->5076 5078 6faf15ce GlobalFree 5077->5078 5078->5064 5837 401f37 5838 402dcb 21 API calls 5837->5838 5839 401f3d 5838->5839 5840 402dcb 21 API calls 5839->5840 5841 401f46 5840->5841 5842 402dcb 21 API calls 5841->5842 5843 401f4f 5842->5843 5844 402dcb 21 API calls 5843->5844 5845 401f58 5844->5845 5846 401423 28 API calls 5845->5846 5847 401f5f 5846->5847 5854 405b7a ShellExecuteExW 5847->5854 5849 401fa7 5850 4069f3 5 API calls 5849->5850 5851 402953 5849->5851 5852 401fc4 CloseHandle 5850->5852 5852->5851 5854->5849 5855 4014b8 5856 4014be 5855->5856 5857 401389 2 API calls 5856->5857 5858 4014c6 5857->5858 5859 402fb8 5860 402fe3 5859->5860 5861 402fca SetTimer 5859->5861 5862 403038 5860->5862 5863 402ffd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5860->5863 5861->5860 5863->5862 5864 401d3c 5865 402da9 21 API calls 5864->5865 5866 401d42 IsWindow 5865->5866 5867 401a45 5866->5867

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 0 40352f-403581 SetErrorMode GetVersionExW 1 403583-4035b3 GetVersionExW 0->1 2 4035bb-4035c0 0->2 1->2 3 4035c2 2->3 4 4035c8-40360a 2->4 3->4 5 40360c-403614 call 406948 4->5 6 40361d 4->6 5->6 12 403616 5->12 7 403622-403636 call 4068d8 lstrlenA 6->7 13 403638-403654 call 406948 * 3 7->13 12->6 20 403665-4036c9 #17 OleInitialize SHGetFileInfoW call 406554 GetCommandLineW call 406554 13->20 21 403656-40365c 13->21 28 4036d2-4036e6 call 405e50 CharNextW 20->28 29 4036cb-4036cd 20->29 21->20 26 40365e 21->26 26->20 32 4037e1-4037e7 28->32 29->28 33 4036eb-4036f1 32->33 34 4037ed 32->34 35 4036f3-4036f8 33->35 36 4036fa-403701 33->36 37 403801-40381b GetTempPathW call 4034fe 34->37 35->35 35->36 39 403703-403708 36->39 40 403709-40370d 36->40 44 403873-40388d DeleteFileW call 4030a2 37->44 45 40381d-40383b GetWindowsDirectoryW lstrcatW call 4034fe 37->45 39->40 42 403713-403719 40->42 43 4037ce-4037dd call 405e50 40->43 47 403733-40376c 42->47 48 40371b-403722 42->48 43->32 61 4037df-4037e0 43->61 66 403893-403899 44->66 67 403a7a-403a8a call 403b4c OleUninitialize 44->67 45->44 64 40383d-40386d GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034fe 45->64 49 403789-4037c3 47->49 50 40376e-403773 47->50 54 403724-403727 48->54 55 403729 48->55 58 4037c5-4037c9 49->58 59 4037cb-4037cd 49->59 50->49 56 403775-40377d 50->56 54->47 54->55 55->47 62 403784 56->62 63 40377f-403782 56->63 58->59 65 4037ef-4037fc call 406554 58->65 59->43 61->32 62->49 63->49 63->62 64->44 64->67 65->37 70 403932-403939 call 403c26 66->70 71 40389f-4038aa call 405e50 66->71 78 403ab0-403ab6 67->78 79 403a8c-403a9c call 405bb4 ExitProcess 67->79 77 40393e-403942 70->77 81 4038f8-403902 71->81 82 4038ac-4038e1 71->82 77->67 83 403b34-403b3c 78->83 84 403ab8-403ace GetCurrentProcess OpenProcessToken 78->84 89 403904-403912 call 405f2b 81->89 90 403947-40396d call 405b1f lstrlenW call 406554 81->90 86 4038e3-4038e7 82->86 91 403b42-403b46 ExitProcess 83->91 92 403b3e 83->92 87 403ad0-403afe LookupPrivilegeValueW AdjustTokenPrivileges 84->87 88 403b04-403b12 call 406948 84->88 94 4038f0-4038f4 86->94 95 4038e9-4038ee 86->95 87->88 104 403b20-403b2b ExitWindowsEx 88->104 105 403b14-403b1e 88->105 89->67 106 403918-40392e call 406554 * 2 89->106 110 40397e-403996 90->110 111 40396f-403979 call 406554 90->111 92->91 94->86 99 4038f6 94->99 95->94 95->99 99->81 104->83 108 403b2d-403b2f call 40140b 104->108 105->104 105->108 106->70 108->83 116 40399b-40399f 110->116 111->110 118 4039a4-4039ce wsprintfW call 406591 116->118 122 4039d0-4039d5 call 405aa8 118->122 123 4039d7 call 405b02 118->123 126 4039dc-4039de 122->126 123->126 128 4039e0-4039ea GetFileAttributesW 126->128 129 403a1a-403a39 SetCurrentDirectoryW call 406314 CopyFileW 126->129 130 403a0b-403a16 128->130 131 4039ec-4039f5 DeleteFileW 128->131 137 403a78 129->137 138 403a3b-403a5c call 406314 call 406591 call 405b37 129->138 130->116 134 403a18 130->134 131->130 133 4039f7-403a09 call 405c60 131->133 133->118 133->130 134->67 137->67 146 403aa2-403aae CloseHandle 138->146 147 403a5e-403a68 138->147 146->137 147->137 148 403a6a-403a72 call 4068b1 147->148 148->118 148->137
                                      APIs
                                      • SetErrorMode.KERNELBASE ref: 00403552
                                      • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040357D
                                      • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00403590
                                      • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 00403629
                                      • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403666
                                      • OleInitialize.OLE32(00000000), ref: 0040366D
                                      • SHGetFileInfoW.SHELL32(0079F708,00000000,?,000002B4,00000000), ref: 0040368C
                                      • GetCommandLineW.KERNEL32(007A7260,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004036A1
                                      • CharNextW.USER32(00000000,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe",00000020,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe",00000000,?,00000008,0000000A,0000000C), ref: 004036DA
                                      • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403812
                                      • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403823
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040382F
                                      • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403843
                                      • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 0040384B
                                      • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040385C
                                      • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403864
                                      • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403878
                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403951
                                        • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                      • wsprintfW.USER32 ref: 004039AE
                                      • GetFileAttributesW.KERNEL32(976,C:\Users\user\AppData\Local\Temp\), ref: 004039E1
                                      • DeleteFileW.KERNEL32(976), ref: 004039ED
                                      • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403A1B
                                        • Part of subcall function 00406314: MoveFileExW.KERNEL32(?,?,00000005,00405E12,?,00000000,000000F1,?,?,?,?,?), ref: 0040631E
                                      • CopyFileW.KERNEL32(C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,976,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403A31
                                        • Part of subcall function 00405B37: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?,?,?,976,?), ref: 00405B60
                                        • Part of subcall function 00405B37: CloseHandle.KERNEL32(?,?,?,976,?), ref: 00405B6D
                                        • Part of subcall function 004068B1: FindFirstFileW.KERNELBASE(74DF3420,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                        • Part of subcall function 004068B1: FindClose.KERNEL32(00000000), ref: 004068C8
                                      • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A7F
                                      • ExitProcess.KERNEL32 ref: 00403A9C
                                      • CloseHandle.KERNEL32(00000000,007AC000,007AC000,?,976,00000000), ref: 00403AA3
                                      • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403ABF
                                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AC6
                                      • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ADB
                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403AFE
                                      • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B23
                                      • ExitProcess.KERNEL32 ref: 00403B46
                                        • Part of subcall function 00405B02: CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                      • String ID: "C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"$1033$976$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Crumbliness$C:\Users\user\Desktop$C:\Users\user\Desktop\TRIAL_ORDER_CP.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                      • API String ID: 1813718867-3168066373
                                      • Opcode ID: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                      • Instruction ID: 93f5a648143c5b163d48a65c291177ce643c8a453b959a17227cb1525d46e2db
                                      • Opcode Fuzzy Hash: 4539d7b49e661c335d86d711c7dc70c0ceacb82e8b10bfdaa1b9f15d78561598
                                      • Instruction Fuzzy Hash: 2CF10370604301AAD720AF659D05B2B7EE8EF85706F00483EF581B62D2DB7DDA45CB6E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 151 405718-405733 152 4058c2-4058c9 151->152 153 405739-405800 GetDlgItem * 3 call 404508 call 404e61 GetClientRect GetSystemMetrics SendMessageW * 2 151->153 155 4058f3-405900 152->155 156 4058cb-4058ed GetDlgItem CreateThread FindCloseChangeNotification 152->156 171 405802-40581c SendMessageW * 2 153->171 172 40581e-405821 153->172 158 405902-405908 155->158 159 40591e-405928 155->159 156->155 161 405943-40594c call 40453a 158->161 162 40590a-405919 ShowWindow * 2 call 404508 158->162 163 40592a-405930 159->163 164 40597e-405982 159->164 175 405951-405955 161->175 162->159 168 405932-40593e call 4044ac 163->168 169 405958-405968 ShowWindow 163->169 164->161 166 405984-40598a 164->166 166->161 173 40598c-40599f SendMessageW 166->173 168->161 176 405978-405979 call 4044ac 169->176 177 40596a-405973 call 4055d9 169->177 171->172 180 405831-405848 call 4044d3 172->180 181 405823-40582f SendMessageW 172->181 182 405aa1-405aa3 173->182 183 4059a5-4059d0 CreatePopupMenu call 406591 AppendMenuW 173->183 176->164 177->176 190 40584a-40585e ShowWindow 180->190 191 40587e-40589f GetDlgItem SendMessageW 180->191 181->180 182->175 188 4059d2-4059e2 GetWindowRect 183->188 189 4059e5-4059fa TrackPopupMenu 183->189 188->189 189->182 193 405a00-405a17 189->193 194 405860-40586b ShowWindow 190->194 195 40586d 190->195 191->182 192 4058a5-4058bd SendMessageW * 2 191->192 192->182 196 405a1c-405a37 SendMessageW 193->196 197 405873-405879 call 404508 194->197 195->197 196->196 198 405a39-405a5c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 196->198 197->191 200 405a5e-405a85 SendMessageW 198->200 200->200 201 405a87-405a9b GlobalUnlock SetClipboardData CloseClipboard 200->201 201->182
                                      APIs
                                      • GetDlgItem.USER32(?,00000403), ref: 00405776
                                      • GetDlgItem.USER32(?,000003EE), ref: 00405785
                                      • GetClientRect.USER32(?,?), ref: 004057C2
                                      • GetSystemMetrics.USER32(00000002), ref: 004057C9
                                      • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057EA
                                      • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057FB
                                      • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040580E
                                      • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040581C
                                      • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040582F
                                      • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405851
                                      • ShowWindow.USER32(?,00000008), ref: 00405865
                                      • GetDlgItem.USER32(?,000003EC), ref: 00405886
                                      • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405896
                                      • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004058AF
                                      • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058BB
                                      • GetDlgItem.USER32(?,000003F8), ref: 00405794
                                        • Part of subcall function 00404508: SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                      • GetDlgItem.USER32(?,000003EC), ref: 004058D8
                                      • CreateThread.KERNELBASE(00000000,00000000,Function_000056AC,00000000), ref: 004058E6
                                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004058ED
                                      • ShowWindow.USER32(00000000), ref: 00405911
                                      • ShowWindow.USER32(?,00000008), ref: 00405916
                                      • ShowWindow.USER32(00000008), ref: 00405960
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405994
                                      • CreatePopupMenu.USER32 ref: 004059A5
                                      • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004059B9
                                      • GetWindowRect.USER32(?,?), ref: 004059D9
                                      • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059F2
                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A2A
                                      • OpenClipboard.USER32(00000000), ref: 00405A3A
                                      • EmptyClipboard.USER32 ref: 00405A40
                                      • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A4C
                                      • GlobalLock.KERNEL32(00000000), ref: 00405A56
                                      • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A6A
                                      • GlobalUnlock.KERNEL32(00000000), ref: 00405A8A
                                      • SetClipboardData.USER32(0000000D,00000000), ref: 00405A95
                                      • CloseClipboard.USER32 ref: 00405A9B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                      • String ID: {
                                      • API String ID: 4154960007-366298937
                                      • Opcode ID: 245d7c75552d93292a5d0639f3ad285b68bcb815a2f70b75041fbe35360c6243
                                      • Instruction ID: d944e331103d7d797bb7559e04b2c0af071990b1bd98ce6caf222631f3d5da7c
                                      • Opcode Fuzzy Hash: 245d7c75552d93292a5d0639f3ad285b68bcb815a2f70b75041fbe35360c6243
                                      • Instruction Fuzzy Hash: 47B13971900608FFDB11AF60DD85EAE7B79FB48354F10813AFA41B61A0CB788A51DF68
                                      APIs
                                        • Part of subcall function 6FAF12BB: GlobalAlloc.KERNEL32(00000040,?,6FAF12DB,?,6FAF137F,00000019,6FAF11CA,-000000A0), ref: 6FAF12C5
                                      • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 6FAF1D2D
                                      • lstrcpyW.KERNEL32(00000008,?), ref: 6FAF1D75
                                      • lstrcpyW.KERNEL32(00000808,?), ref: 6FAF1D7F
                                      • GlobalFree.KERNEL32(00000000), ref: 6FAF1D92
                                      • GlobalFree.KERNEL32(?), ref: 6FAF1E74
                                      • GlobalFree.KERNEL32(?), ref: 6FAF1E79
                                      • GlobalFree.KERNEL32(?), ref: 6FAF1E7E
                                      • GlobalFree.KERNEL32(00000000), ref: 6FAF2068
                                      • lstrcpyW.KERNEL32(?,?), ref: 6FAF2222
                                      • GetModuleHandleW.KERNEL32(00000008), ref: 6FAF22A1
                                      • LoadLibraryW.KERNEL32(00000008), ref: 6FAF22B2
                                      • GetProcAddress.KERNEL32(?,?), ref: 6FAF230C
                                      • lstrlenW.KERNEL32(00000808), ref: 6FAF2326
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                      • String ID:
                                      • API String ID: 245916457-0
                                      • Opcode ID: ecbb815ddc08fe8e8f19f802be29076a20650ce1d434ba8eacacd021d17618a4
                                      • Instruction ID: 92093e85d13b8e9b12e47c3f9d90bd0f007292846f2134ce76161cfcc01d429e
                                      • Opcode Fuzzy Hash: ecbb815ddc08fe8e8f19f802be29076a20650ce1d434ba8eacacd021d17618a4
                                      • Instruction Fuzzy Hash: 3E226BB1D46646DBDB108FA8C5846EDB7F0FF05319F14462AE1A5EF280D7786AC38B50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 671 405c60-405c86 call 405f2b 674 405c88-405c9a DeleteFileW 671->674 675 405c9f-405ca6 671->675 676 405e1c-405e20 674->676 677 405ca8-405caa 675->677 678 405cb9-405cc9 call 406554 675->678 679 405cb0-405cb3 677->679 680 405dca-405dcf 677->680 684 405cd8-405cd9 call 405e6f 678->684 685 405ccb-405cd6 lstrcatW 678->685 679->678 679->680 680->676 683 405dd1-405dd4 680->683 686 405dd6-405ddc 683->686 687 405dde-405de6 call 4068b1 683->687 688 405cde-405ce2 684->688 685->688 686->676 687->676 695 405de8-405dfc call 405e23 call 405c18 687->695 691 405ce4-405cec 688->691 692 405cee-405cf4 lstrcatW 688->692 691->692 694 405cf9-405d15 lstrlenW FindFirstFileW 691->694 692->694 696 405d1b-405d23 694->696 697 405dbf-405dc3 694->697 711 405e14-405e17 call 4055d9 695->711 712 405dfe-405e01 695->712 700 405d43-405d57 call 406554 696->700 701 405d25-405d2d 696->701 697->680 699 405dc5 697->699 699->680 713 405d59-405d61 700->713 714 405d6e-405d79 call 405c18 700->714 704 405da2-405db2 FindNextFileW 701->704 705 405d2f-405d37 701->705 704->696 709 405db8-405db9 FindClose 704->709 705->700 710 405d39-405d41 705->710 709->697 710->700 710->704 711->676 712->686 715 405e03-405e12 call 4055d9 call 406314 712->715 713->704 716 405d63-405d6c call 405c60 713->716 724 405d9a-405d9d call 4055d9 714->724 725 405d7b-405d7e 714->725 715->676 716->704 724->704 728 405d80-405d90 call 4055d9 call 406314 725->728 729 405d92-405d98 725->729 728->704 729->704
                                      APIs
                                      • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"), ref: 00405C89
                                      • lstrcatW.KERNEL32(007A3750,\*.*), ref: 00405CD1
                                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405CF4
                                      • lstrlenW.KERNEL32(?,?,0040A014,?,007A3750,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"), ref: 00405CFA
                                      • FindFirstFileW.KERNEL32(007A3750,?,?,?,0040A014,?,007A3750,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"), ref: 00405D0A
                                      • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405DAA
                                      • FindClose.KERNEL32(00000000), ref: 00405DB9
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                      • String ID: "C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"$C:\Users\user\AppData\Local\Temp\$P7z$\*.*
                                      • API String ID: 2035342205-226620841
                                      • Opcode ID: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                      • Instruction ID: f748e5475402f1fc91d3f7fbe8cbfa38c73e6686c0f945f98d649a4eb698cdfa
                                      • Opcode Fuzzy Hash: 504f622c36c52388dc620547c7079f2cd4c31ca565287661d2c47a2285e6f56d
                                      • Instruction Fuzzy Hash: EB41B231800A14B6DB216B26CC49BAF7678EF81714F20813BF441B11D1DB7C4A829EAE
                                      APIs
                                      • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040224E
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Crumbliness, xrefs: 0040228E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CreateInstance
                                      • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Crumbliness
                                      • API String ID: 542301482-729936110
                                      • Opcode ID: 2b629c1a17f3a3ffc56b825882c252300589c696d23cc712910858c93b1d4aeb
                                      • Instruction ID: d027746e191c14b49f1eee61a42344c893d98f4f720128a79e15815c221bbdc7
                                      • Opcode Fuzzy Hash: 2b629c1a17f3a3ffc56b825882c252300589c696d23cc712910858c93b1d4aeb
                                      • Instruction Fuzzy Hash: 3B411675A00209AFCB00DFE4C989AAD7BB5FF48318B20457EF505EB2D1DB799981CB54
                                      APIs
                                      • FindFirstFileW.KERNELBASE(74DF3420,007A4798,007A3F50,00405F74,007A3F50,007A3F50,00000000,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068BC
                                      • FindClose.KERNEL32(00000000), ref: 004068C8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Find$CloseFileFirst
                                      • String ID:
                                      • API String ID: 2295610775-0
                                      • Opcode ID: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                      • Instruction ID: c1f58c6a55c378a7321320ff0386b713db4abc0e26cca29c2297fdfd4174c4a1
                                      • Opcode Fuzzy Hash: 66bf9994b2f5814cd2018ee22faa20966fcafcce3cd9b2dc1ade219dc7786d58
                                      • Instruction Fuzzy Hash: CFD0123251A1305BC28027386D0C84B7B98AF56331712CB36F16AF21E0C7748C6287A8
                                      APIs
                                      • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040293F
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: FileFindFirst
                                      • String ID:
                                      • API String ID: 1974802433-0
                                      • Opcode ID: 10d534dc46fcbba6b1f1659cf1ac7ba9eebf6811a433664e38e036bec13daf12
                                      • Instruction ID: bedb772ef0a2f17f15cc30cd16f16fd49c67dd7be69949238e740b54367540b4
                                      • Opcode Fuzzy Hash: 10d534dc46fcbba6b1f1659cf1ac7ba9eebf6811a433664e38e036bec13daf12
                                      • Instruction Fuzzy Hash: 08F0E231A04100EAD700EBA4DA499AEB374FF04314F20417BE101F30E0D7B84D409B2D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 202 403fd4-403fe6 203 403fec-403ff2 202->203 204 40414d-40415c 202->204 203->204 205 403ff8-404001 203->205 206 4041ab-4041c0 204->206 207 40415e-4041a6 GetDlgItem * 2 call 4044d3 SetClassLongW call 40140b 204->207 208 404003-404010 SetWindowPos 205->208 209 404016-40401d 205->209 211 404200-404205 call 40451f 206->211 212 4041c2-4041c5 206->212 207->206 208->209 214 404061-404067 209->214 215 40401f-404039 ShowWindow 209->215 220 40420a-404225 211->220 217 4041c7-4041d2 call 401389 212->217 218 4041f8-4041fa 212->218 223 404080-404083 214->223 224 404069-40407b DestroyWindow 214->224 221 40413a-404148 call 40453a 215->221 222 40403f-404052 GetWindowLongW 215->222 217->218 243 4041d4-4041f3 SendMessageW 217->243 218->211 219 4044a0 218->219 231 4044a2-4044a9 219->231 228 404227-404229 call 40140b 220->228 229 40422e-404234 220->229 221->231 222->221 230 404058-40405b ShowWindow 222->230 234 404085-404091 SetWindowLongW 223->234 235 404096-40409c 223->235 232 40447d-404483 224->232 228->229 240 40423a-404245 229->240 241 40445e-404477 DestroyWindow EndDialog 229->241 230->214 232->219 239 404485-40448b 232->239 234->231 235->221 242 4040a2-4040b1 GetDlgItem 235->242 239->219 244 40448d-404496 ShowWindow 239->244 240->241 245 40424b-404298 call 406591 call 4044d3 * 3 GetDlgItem 240->245 241->232 246 4040d0-4040d3 242->246 247 4040b3-4040ca SendMessageW IsWindowEnabled 242->247 243->231 244->219 274 4042a2-4042de ShowWindow KiUserCallbackDispatcher call 4044f5 EnableWindow 245->274 275 40429a-40429f 245->275 249 4040d5-4040d6 246->249 250 4040d8-4040db 246->250 247->219 247->246 254 404106-40410b call 4044ac 249->254 251 4040e9-4040ee 250->251 252 4040dd-4040e3 250->252 255 404124-404134 SendMessageW 251->255 257 4040f0-4040f6 251->257 252->255 256 4040e5-4040e7 252->256 254->221 255->221 256->254 260 4040f8-4040fe call 40140b 257->260 261 40410d-404116 call 40140b 257->261 270 404104 260->270 261->221 271 404118-404122 261->271 270->254 271->270 278 4042e0-4042e1 274->278 279 4042e3 274->279 275->274 280 4042e5-404313 GetSystemMenu EnableMenuItem SendMessageW 278->280 279->280 281 404315-404326 SendMessageW 280->281 282 404328 280->282 283 40432e-40436d call 404508 call 403fb5 call 406554 lstrlenW call 406591 SetWindowTextW call 401389 281->283 282->283 283->220 294 404373-404375 283->294 294->220 295 40437b-40437f 294->295 296 404381-404387 295->296 297 40439e-4043b2 DestroyWindow 295->297 296->219 298 40438d-404393 296->298 297->232 299 4043b8-4043e5 CreateDialogParamW 297->299 298->220 300 404399 298->300 299->232 301 4043eb-404442 call 4044d3 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 299->301 300->219 301->219 306 404444-404457 ShowWindow call 40451f 301->306 308 40445c 306->308 308->232
                                      APIs
                                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404010
                                      • ShowWindow.USER32(?), ref: 00404030
                                      • GetWindowLongW.USER32(?,000000F0), ref: 00404042
                                      • ShowWindow.USER32(?,00000004), ref: 0040405B
                                      • DestroyWindow.USER32 ref: 0040406F
                                      • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404088
                                      • GetDlgItem.USER32(?,?), ref: 004040A7
                                      • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040BB
                                      • IsWindowEnabled.USER32(00000000), ref: 004040C2
                                      • GetDlgItem.USER32(?,00000001), ref: 0040416D
                                      • GetDlgItem.USER32(?,00000002), ref: 00404177
                                      • SetClassLongW.USER32(?,000000F2,?), ref: 00404191
                                      • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041E2
                                      • GetDlgItem.USER32(?,00000003), ref: 00404288
                                      • ShowWindow.USER32(00000000,?), ref: 004042A9
                                      • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042BB
                                      • EnableWindow.USER32(?,?), ref: 004042D6
                                      • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042EC
                                      • EnableMenuItem.USER32(00000000), ref: 004042F3
                                      • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040430B
                                      • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040431E
                                      • lstrlenW.KERNEL32(007A1748,?,007A1748,00000000), ref: 00404348
                                      • SetWindowTextW.USER32(?,007A1748), ref: 0040435C
                                      • ShowWindow.USER32(?,0000000A), ref: 00404490
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                      • String ID:
                                      • API String ID: 121052019-0
                                      • Opcode ID: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                      • Instruction ID: 556acdb9000d186b886cde9212830cd241fbea6c4840fceff67d75b478af1997
                                      • Opcode Fuzzy Hash: bc3e7111866138a7d9fc3d457d106daad5acaba352cfb8b9f49eaf3ae0b18d54
                                      • Instruction Fuzzy Hash: 13C1C0B1500604ABDB206F61ED85B2A3A68FBD6359F00453EF791B51F0CB3D5891DB2E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 309 403c26-403c3e call 406948 312 403c40-403c50 call 40649b 309->312 313 403c52-403c89 call 406422 309->313 320 403cac-403cd5 call 403efc call 405f2b 312->320 318 403ca1-403ca7 lstrcatW 313->318 319 403c8b-403c9c call 406422 313->319 318->320 319->318 327 403d67-403d6f call 405f2b 320->327 328 403cdb-403ce0 320->328 334 403d71-403d78 call 406591 327->334 335 403d7d-403da2 LoadImageW 327->335 328->327 329 403ce6-403d0e call 406422 328->329 329->327 336 403d10-403d14 329->336 334->335 338 403e23-403e2b call 40140b 335->338 339 403da4-403dd4 RegisterClassW 335->339 341 403d26-403d32 lstrlenW 336->341 342 403d16-403d23 call 405e50 336->342 351 403e35-403e40 call 403efc 338->351 352 403e2d-403e30 338->352 343 403ef2 339->343 344 403dda-403e1e SystemParametersInfoW CreateWindowExW 339->344 348 403d34-403d42 lstrcmpiW 341->348 349 403d5a-403d62 call 405e23 call 406554 341->349 342->341 347 403ef4-403efb 343->347 344->338 348->349 350 403d44-403d4e GetFileAttributesW 348->350 349->327 355 403d50-403d52 350->355 356 403d54-403d55 call 405e6f 350->356 362 403e46-403e60 ShowWindow call 4068d8 351->362 363 403ec9-403eca call 4056ac 351->363 352->347 355->349 355->356 356->349 370 403e62-403e67 call 4068d8 362->370 371 403e6c-403e7e GetClassInfoW 362->371 366 403ecf-403ed1 363->366 368 403ed3-403ed9 366->368 369 403eeb-403eed call 40140b 366->369 368->352 372 403edf-403ee6 call 40140b 368->372 369->343 370->371 375 403e80-403e90 GetClassInfoW RegisterClassW 371->375 376 403e96-403eb9 DialogBoxParamW call 40140b 371->376 372->352 375->376 379 403ebe-403ec7 call 403b76 376->379 379->347
                                      APIs
                                        • Part of subcall function 00406948: GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C,?,?,?,?,?,?,?,?), ref: 0040695A
                                        • Part of subcall function 00406948: GetProcAddress.KERNEL32(00000000,?), ref: 00406975
                                      • lstrcatW.KERNEL32(1033,007A1748), ref: 00403CA7
                                      • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000,00000002,74DF3420), ref: 00403D27
                                      • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical,1033,007A1748,80000001,Control Panel\Desktop\ResourceLocale,00000000,007A1748,00000000), ref: 00403D3A
                                      • GetFileAttributesW.KERNEL32(Call), ref: 00403D45
                                      • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical), ref: 00403D8E
                                        • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                      • RegisterClassW.USER32(007A7200), ref: 00403DCB
                                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DE3
                                      • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E18
                                      • ShowWindow.USER32(00000005,00000000), ref: 00403E4E
                                      • GetClassInfoW.USER32(00000000,RichEdit20W,007A7200), ref: 00403E7A
                                      • GetClassInfoW.USER32(00000000,RichEdit,007A7200), ref: 00403E87
                                      • RegisterClassW.USER32(007A7200), ref: 00403E90
                                      • DialogBoxParamW.USER32(?,00000000,00403FD4,00000000), ref: 00403EAF
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                      • String ID: "C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                      • API String ID: 1975747703-1334528933
                                      • Opcode ID: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                      • Instruction ID: 87c0a3a17ad5e1939fcd37e1134105fdbaf016035d588be57f40016c0fe971d1
                                      • Opcode Fuzzy Hash: 889c8ef34167dee75fdbefa7f7ea3591ee246ed7a83750caaaa5a9fc269d37bc
                                      • Instruction Fuzzy Hash: CA61D370100605AED720BF269D45F2B3AACFB85B49F40453EF951B62E2DB7C9901CB6D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 383 4030a2-4030f0 GetTickCount GetModuleFileNameW call 406044 386 4030f2-4030f7 383->386 387 4030fc-40312a call 406554 call 405e6f call 406554 GetFileSize 383->387 388 4032d2-4032d6 386->388 395 403130 387->395 396 403215-403223 call 40303e 387->396 398 403135-40314c 395->398 402 403225-403228 396->402 403 403278-40327d 396->403 400 403150-403159 call 4034d1 398->400 401 40314e 398->401 410 40327f-403287 call 40303e 400->410 411 40315f-403166 400->411 401->400 405 40322a-403242 call 4034e7 call 4034d1 402->405 406 40324c-403276 GlobalAlloc call 4034e7 call 4032d9 402->406 403->388 405->403 433 403244-40324a 405->433 406->403 432 403289-40329a 406->432 410->403 415 4031e2-4031e6 411->415 416 403168-40317c call 405fff 411->416 421 4031f0-4031f6 415->421 422 4031e8-4031ef call 40303e 415->422 416->421 430 40317e-403185 416->430 423 403205-40320d 421->423 424 4031f8-403202 call 406a35 421->424 422->421 423->398 431 403213 423->431 424->423 430->421 436 403187-40318e 430->436 431->396 437 4032a2-4032a7 432->437 438 40329c 432->438 433->403 433->406 436->421 439 403190-403197 436->439 440 4032a8-4032ae 437->440 438->437 439->421 441 403199-4031a0 439->441 440->440 442 4032b0-4032cb SetFilePointer call 405fff 440->442 441->421 443 4031a2-4031c2 441->443 446 4032d0 442->446 443->403 445 4031c8-4031cc 443->445 447 4031d4-4031dc 445->447 448 4031ce-4031d2 445->448 446->388 447->421 449 4031de-4031e0 447->449 448->431 448->447 449->421
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 004030B3
                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,00000400), ref: 004030CF
                                        • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,80000000,00000003), ref: 00406048
                                        • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                      • GetFileSize.KERNEL32(00000000,00000000,007B7000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,80000000,00000003), ref: 0040311B
                                      • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403251
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                      • String ID: "C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\TRIAL_ORDER_CP.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                      • API String ID: 2803837635-150225448
                                      • Opcode ID: 00f9f2d731dede5020b139466cc50d6f541a11ea4845a1cca464e657e2c5b61a
                                      • Instruction ID: 049f7c6d5ff3921a21710fe3aab5a9d19a74ce2d4ccd47fede02a431b1dffc51
                                      • Opcode Fuzzy Hash: 00f9f2d731dede5020b139466cc50d6f541a11ea4845a1cca464e657e2c5b61a
                                      • Instruction Fuzzy Hash: A4519F71901204AFDF209FA5DD86BAE7EACAB45356F20817BF500B62D1CA7C9E408B5D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 735 406591-40659a 736 40659c-4065ab 735->736 737 4065ad-4065c7 735->737 736->737 738 4067d7-4067dd 737->738 739 4065cd-4065d9 737->739 741 4067e3-4067f0 738->741 742 4065eb-4065f8 738->742 739->738 740 4065df-4065e6 739->740 740->738 744 4067f2-4067f7 call 406554 741->744 745 4067fc-4067ff 741->745 742->741 743 4065fe-406607 742->743 746 4067c4 743->746 747 40660d-406650 743->747 744->745 749 4067d2-4067d5 746->749 750 4067c6-4067d0 746->750 751 406656-406662 747->751 752 406768-40676c 747->752 749->738 750->738 753 406664 751->753 754 40666c-40666e 751->754 755 4067a0-4067a4 752->755 756 40676e-406775 752->756 753->754 761 406670-40668e call 406422 754->761 762 4066a8-4066ab 754->762 757 4067b4-4067c2 lstrlenW 755->757 758 4067a6-4067af call 406591 755->758 759 406785-406791 call 406554 756->759 760 406777-406783 call 40649b 756->760 757->738 758->757 769 406796-40679c 759->769 760->769 774 406693-406696 761->774 764 4066ad-4066b9 GetSystemDirectoryW 762->764 765 4066be-4066c1 762->765 770 40674b-40674e 764->770 771 4066d3-4066d7 765->771 772 4066c3-4066cf GetWindowsDirectoryW 765->772 769->757 777 40679e 769->777 775 406750-406753 770->775 778 406760-406766 call 406802 770->778 771->770 779 4066d9-4066f7 771->779 772->771 774->775 776 40669c-4066a3 call 406591 774->776 775->778 781 406755-40675b lstrcatW 775->781 776->770 777->778 778->757 783 4066f9-4066ff 779->783 784 40670b-406717 call 406948 779->784 781->778 788 406707-406709 783->788 791 40671f-406723 784->791 788->784 790 406745-406749 788->790 790->770 792 406725-406738 SHGetPathFromIDListW CoTaskMemFree 791->792 793 40673a-406743 791->793 792->790 792->793 793->779 793->790
                                      APIs
                                      • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004066B3
                                      • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,?,?,00000000,00000000,0079A700,74DF23A0), ref: 004066C9
                                      • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406727
                                      • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 00406730
                                      • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 0040675B
                                      • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,?,?,00000000,00000000,0079A700,74DF23A0), ref: 004067B5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                      • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                      • API String ID: 4024019347-96905678
                                      • Opcode ID: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                      • Instruction ID: 996034b20cbe1ccfc182dbfd15fdcef075a6e82f48079f00531b92f4adf5a68d
                                      • Opcode Fuzzy Hash: fb78c655de7e04e2c0873077e29524e20483bf8d3f5bca8374ab451ad378ea15
                                      • Instruction Fuzzy Hash: D56135716046119BD720AF24DD84B7B77E4AB85318F25063FF687B32D0DA3C8961865E

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 794 401794-4017b9 call 402dcb call 405e9a 799 4017c3-4017d5 call 406554 call 405e23 lstrcatW 794->799 800 4017bb-4017c1 call 406554 794->800 806 4017da-4017db call 406802 799->806 800->806 809 4017e0-4017e4 806->809 810 4017e6-4017f0 call 4068b1 809->810 811 401817-40181a 809->811 819 401802-401814 810->819 820 4017f2-401800 CompareFileTime 810->820 813 401822-40183e call 406044 811->813 814 40181c-40181d call 40601f 811->814 821 401840-401843 813->821 822 4018b2-4018db call 4055d9 call 4032d9 813->822 814->813 819->811 820->819 823 401894-40189e call 4055d9 821->823 824 401845-401883 call 406554 * 2 call 406591 call 406554 call 405bb4 821->824 836 4018e3-4018ef SetFileTime 822->836 837 4018dd-4018e1 822->837 834 4018a7-4018ad 823->834 824->809 858 401889-40188a 824->858 838 402c58 834->838 840 4018f5-401900 FindCloseChangeNotification 836->840 837->836 837->840 844 402c5a-402c5e 838->844 842 401906-401909 840->842 843 402c4f-402c52 840->843 846 40190b-40191c call 406591 lstrcatW 842->846 847 40191e-401921 call 406591 842->847 843->838 852 401926-4023bd 846->852 847->852 856 4023c2-4023c7 852->856 857 4023bd call 405bb4 852->857 856->844 857->856 858->834 859 40188c-40188d 858->859 859->823
                                      APIs
                                      • lstrcatW.KERNEL32(00000000,00000000), ref: 004017D5
                                      • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Crumbliness,?,?,00000031), ref: 004017FA
                                        • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                        • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                        • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                        • Part of subcall function 004055D9: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,0040341A), ref: 00405634
                                        • Part of subcall function 004055D9: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll), ref: 00405646
                                        • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                        • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                        • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                      • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Crumbliness$C:\Users\user\AppData\Local\Temp\nsc5063.tmp$C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll$Call
                                      • API String ID: 1941528284-932523973
                                      • Opcode ID: 238e88520bfb6fb4f6ee584265ecdb2758c580d9dc05edf73525f2932b0b0693
                                      • Instruction ID: 1e9ca80c6a5dacc7cd580e770cf15d3f22a044297d5b9cee136244b7a600bee5
                                      • Opcode Fuzzy Hash: 238e88520bfb6fb4f6ee584265ecdb2758c580d9dc05edf73525f2932b0b0693
                                      • Instruction Fuzzy Hash: C441E871400104BADF11BBB5DD85DBE3AB5EF45329B21823FF012B10E1DB3C8A91966D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 860 4055d9-4055ee 861 4055f4-405605 860->861 862 4056a5-4056a9 860->862 863 405610-40561c lstrlenW 861->863 864 405607-40560b call 406591 861->864 866 405639-40563d 863->866 867 40561e-40562e lstrlenW 863->867 864->863 868 40564c-405650 866->868 869 40563f-405646 SetWindowTextW 866->869 867->862 870 405630-405634 lstrcatW 867->870 871 405652-405694 SendMessageW * 3 868->871 872 405696-405698 868->872 869->868 870->866 871->872 872->862 873 40569a-40569d 872->873 873->862
                                      APIs
                                      • lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                      • lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                      • lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,0040341A), ref: 00405634
                                      • SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll), ref: 00405646
                                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                      • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                      • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                      • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll
                                      • API String ID: 2531174081-956188277
                                      • Opcode ID: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                      • Instruction ID: 329114e2e26f34c588cdeed9baab55c5e37b8eaf8a8cec26a94c2fb3a39dc2c1
                                      • Opcode Fuzzy Hash: da048427165e3fda7d212e1d25adb62017d163fe0601bf1cc7e6f9066e197b12
                                      • Instruction Fuzzy Hash: F921B371900618BACF119F65DD449CFBFB8EF95364F10843AF908B22A0C77A4A50CFA8

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 874 4032d9-4032f0 875 4032f2 874->875 876 4032f9-403302 874->876 875->876 877 403304 876->877 878 40330b-403310 876->878 877->878 879 403320-40332d call 4034d1 878->879 880 403312-40331b call 4034e7 878->880 884 403333-403337 879->884 885 4034bf 879->885 880->879 886 40346a-40346c 884->886 887 40333d-403363 GetTickCount 884->887 888 4034c1-4034c2 885->888 889 4034ac-4034af 886->889 890 40346e-403471 886->890 891 4034c7 887->891 892 403369-403371 887->892 893 4034ca-4034ce 888->893 894 4034b1 889->894 895 4034b4-4034bd call 4034d1 889->895 890->891 896 403473 890->896 891->893 897 403373 892->897 898 403376-403384 call 4034d1 892->898 894->895 895->885 907 4034c4 895->907 900 403476-40347c 896->900 897->898 898->885 906 40338a-403393 898->906 903 403480-40348e call 4034d1 900->903 904 40347e 900->904 903->885 912 403490-40349c call 4060f6 903->912 904->903 909 403399-4033b9 call 406aa3 906->909 907->891 916 403462-403464 909->916 917 4033bf-4033d2 GetTickCount 909->917 918 403466-403468 912->918 919 40349e-4034a8 912->919 916->888 920 4033d4-4033dc 917->920 921 40341d-40341f 917->921 918->888 919->900 922 4034aa 919->922 923 4033e4-403415 MulDiv wsprintfW call 4055d9 920->923 924 4033de-4033e2 920->924 925 403421-403425 921->925 926 403456-40345a 921->926 922->891 932 40341a 923->932 924->921 924->923 929 403427-40342e call 4060f6 925->929 930 40343c-403447 925->930 926->892 927 403460 926->927 927->891 935 403433-403435 929->935 931 40344a-40344e 930->931 931->909 934 403454 931->934 932->921 934->891 935->918 936 403437-40343a 935->936 936->931
                                      APIs
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CountTick$wsprintf
                                      • String ID: ... %d%%$STy
                                      • API String ID: 551687249-2882605797
                                      • Opcode ID: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                      • Instruction ID: eb1ee041d621481d77111d3da967b5f6536357fdff7ba477760ccc35d22143eb
                                      • Opcode Fuzzy Hash: 35df2eeb44d66dae63b1d0c24c026509dc1c2a142cef09f029ae2f44a6fc0423
                                      • Instruction Fuzzy Hash: FD515F71910219EBCF11CF65DA8469E7FA8AB00756F14417BE804BA2C1C7789B41CBAA

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 937 402711-40272a call 402da9 940 402730-402737 937->940 941 402c4f-402c52 937->941 942 402739 940->942 943 40273c-40273f 940->943 944 402c58-402c5e 941->944 942->943 945 4028a3-4028ab 943->945 946 402745-402754 call 4064b4 943->946 945->941 946->945 950 40275a 946->950 951 402760-402764 950->951 952 4027f9-4027fc 951->952 953 40276a-402785 ReadFile 951->953 955 402814-402824 call 4060c7 952->955 956 4027fe-402801 952->956 953->945 954 40278b-402790 953->954 954->945 957 402796-4027a4 954->957 955->945 964 402826 955->964 956->955 958 402803-40280e call 406125 956->958 961 4027aa-4027bc MultiByteToWideChar 957->961 962 40285f-40286b call 40649b 957->962 958->945 958->955 961->964 965 4027be-4027c1 961->965 962->944 968 402829-40282c 964->968 969 4027c3-4027ce 965->969 968->962 971 40282e-402833 968->971 969->968 972 4027d0-4027f5 SetFilePointer MultiByteToWideChar 969->972 973 402870-402874 971->973 974 402835-40283a 971->974 972->969 975 4027f7 972->975 977 402891-40289d SetFilePointer 973->977 978 402876-40287a 973->978 974->973 976 40283c-40284f 974->976 975->964 976->945 979 402851-402857 976->979 977->945 980 402882-40288f 978->980 981 40287c-402880 978->981 979->951 982 40285d 979->982 980->945 981->977 981->980 982->945
                                      APIs
                                      • ReadFile.KERNELBASE(?,?,?,?), ref: 0040277D
                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                      • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                      • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                        • Part of subcall function 00406125: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040613B
                                      • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: File$Pointer$ByteCharMultiWide$Read
                                      • String ID: 9
                                      • API String ID: 163830602-2366072709
                                      • Opcode ID: 233c6f879122765c140ec07ecab3eee11d9f6e18c011ef8f82b6bc4890f14a46
                                      • Instruction ID: 94532b36e9b1b55a0417b46d3f551769048a354c57792839695d4204f468be83
                                      • Opcode Fuzzy Hash: 233c6f879122765c140ec07ecab3eee11d9f6e18c011ef8f82b6bc4890f14a46
                                      • Instruction Fuzzy Hash: D6510C75D04119AADF20EFD4CA84AAEBBB9FF44304F14817BE541B62D0D7B89D82CB58

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 983 4068d8-4068f8 GetSystemDirectoryW 984 4068fa 983->984 985 4068fc-4068fe 983->985 984->985 986 406900-406909 985->986 987 40690f-406911 985->987 986->987 988 40690b-40690d 986->988 989 406912-406945 wsprintfW LoadLibraryExW 987->989 988->989
                                      APIs
                                      • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                      • wsprintfW.USER32 ref: 0040692A
                                      • LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040693E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                      • String ID: %s%S.dll$UXTHEME
                                      • API String ID: 2200240437-1106614640
                                      • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                      • Instruction ID: 3d91c3bba12f32b4d8e24f08bfb099957206232b6387f0edcfac50a9fed73821
                                      • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                      • Instruction Fuzzy Hash: 80F0F671501219ABDB20BB68DD0EF9B376CAB00304F10447AA546F10E0EB789B69CB98

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 990 6faf1817-6faf1856 call 6faf1bff 994 6faf185c-6faf1860 990->994 995 6faf1976-6faf1978 990->995 996 6faf1869-6faf1876 call 6faf2480 994->996 997 6faf1862-6faf1868 call 6faf243e 994->997 1002 6faf1878-6faf187d 996->1002 1003 6faf18a6-6faf18ad 996->1003 997->996 1006 6faf187f-6faf1880 1002->1006 1007 6faf1898-6faf189b 1002->1007 1004 6faf18af-6faf18cb call 6faf2655 call 6faf1654 call 6faf1312 GlobalFree 1003->1004 1005 6faf18cd-6faf18d1 1003->1005 1028 6faf1925-6faf1929 1004->1028 1011 6faf191e-6faf1924 call 6faf2655 1005->1011 1012 6faf18d3-6faf191c call 6faf1666 call 6faf2655 1005->1012 1009 6faf1888-6faf1889 call 6faf2b98 1006->1009 1010 6faf1882-6faf1883 1006->1010 1007->1003 1013 6faf189d-6faf189e call 6faf2e23 1007->1013 1024 6faf188e 1009->1024 1016 6faf1885-6faf1886 1010->1016 1017 6faf1890-6faf1896 call 6faf2810 1010->1017 1011->1028 1012->1028 1021 6faf18a3 1013->1021 1016->1003 1016->1009 1027 6faf18a5 1017->1027 1021->1027 1024->1021 1027->1003 1032 6faf192b-6faf1939 call 6faf2618 1028->1032 1033 6faf1966-6faf196d 1028->1033 1040 6faf193b-6faf193e 1032->1040 1041 6faf1951-6faf1958 1032->1041 1033->995 1038 6faf196f-6faf1970 GlobalFree 1033->1038 1038->995 1040->1041 1042 6faf1940-6faf1948 1040->1042 1041->1033 1043 6faf195a-6faf1965 call 6faf15dd 1041->1043 1042->1041 1044 6faf194a-6faf194b FreeLibrary 1042->1044 1043->1033 1044->1041
                                      APIs
                                        • Part of subcall function 6FAF1BFF: GlobalFree.KERNEL32(?), ref: 6FAF1E74
                                        • Part of subcall function 6FAF1BFF: GlobalFree.KERNEL32(?), ref: 6FAF1E79
                                        • Part of subcall function 6FAF1BFF: GlobalFree.KERNEL32(?), ref: 6FAF1E7E
                                      • GlobalFree.KERNEL32(00000000), ref: 6FAF18C5
                                      • FreeLibrary.KERNEL32(?), ref: 6FAF194B
                                      • GlobalFree.KERNEL32(00000000), ref: 6FAF1970
                                        • Part of subcall function 6FAF243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6FAF246F
                                        • Part of subcall function 6FAF2810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6FAF1896,00000000), ref: 6FAF28E0
                                        • Part of subcall function 6FAF1666: wsprintfW.USER32 ref: 6FAF1694
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Global$Free$Alloc$Librarywsprintf
                                      • String ID:
                                      • API String ID: 3962662361-3916222277
                                      • Opcode ID: 7d48f5edda70ad8b99e669b570a878633023e8547ffd1342d1b82cfdd728ce66
                                      • Instruction ID: c25624bb6cbd30734c06e3f4a2c675e197d4144fcb66d8d12cc59c0f37c31e49
                                      • Opcode Fuzzy Hash: 7d48f5edda70ad8b99e669b570a878633023e8547ffd1342d1b82cfdd728ce66
                                      • Instruction Fuzzy Hash: 3C4180B5802341AADB109F74DAC4BE537A8BF05358F088566F9559E0C6DB7CA1C78AA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1047 4024af-4024e0 call 402dcb * 2 call 402e5b 1054 4024e6-4024f0 1047->1054 1055 402c4f-402c5e 1047->1055 1056 4024f2-4024ff call 402dcb lstrlenW 1054->1056 1057 402503-402506 1054->1057 1056->1057 1060 402508-402519 call 402da9 1057->1060 1061 40251a-40251d 1057->1061 1060->1061 1065 40252e-402542 RegSetValueExW 1061->1065 1066 40251f-402529 call 4032d9 1061->1066 1067 402544 1065->1067 1068 402547-402628 RegCloseKey 1065->1068 1066->1065 1067->1068 1068->1055
                                      APIs
                                      • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsc5063.tmp,00000023,00000011,00000002), ref: 004024FA
                                      • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsc5063.tmp,00000000,00000011,00000002), ref: 0040253A
                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsc5063.tmp,00000000,00000011,00000002), ref: 00402622
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CloseValuelstrlen
                                      • String ID: C:\Users\user\AppData\Local\Temp\nsc5063.tmp
                                      • API String ID: 2655323295-1817498674
                                      • Opcode ID: 182edb313092d6cb3c8cfd1ee224e51def1d26c3b4a9d948f0f2f6bb83d720b3
                                      • Instruction ID: b5124b365774ee0dd77fffeda1a995c18ababb59e8a55150708f98195cc7d2d6
                                      • Opcode Fuzzy Hash: 182edb313092d6cb3c8cfd1ee224e51def1d26c3b4a9d948f0f2f6bb83d720b3
                                      • Instruction Fuzzy Hash: B8117231D00114BEDB01EFA59E59AAEB6B4EF54358F20443FF504B61D1C7B88E40966C

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 1072 406073-40607f 1073 406080-4060b4 GetTickCount GetTempFileNameW 1072->1073 1074 4060c3-4060c5 1073->1074 1075 4060b6-4060b8 1073->1075 1077 4060bd-4060c0 1074->1077 1075->1073 1076 4060ba 1075->1076 1076->1077
                                      APIs
                                      • GetTickCount.KERNEL32 ref: 00406091
                                      • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,0040352D,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819), ref: 004060AC
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CountFileNameTempTick
                                      • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                      • API String ID: 1716503409-678247507
                                      • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                      • Instruction ID: 3a9c7f2d553a521e2ba94e631897efa79da28a954d47360b9b57a106d7dab247
                                      • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                      • Instruction Fuzzy Hash: 83F09076B40204BFEB00CF69ED05F9EB7ACEB95750F11803AED05F7180E6B099548768
                                      APIs
                                        • Part of subcall function 00405ECE: CharNextW.USER32(?,?,007A3F50,?,00405F42,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"), ref: 00405EDC
                                        • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                        • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                      • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
                                        • Part of subcall function 00405AA8: CreateDirectoryW.KERNELBASE(?,?), ref: 00405AEA
                                      • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Crumbliness,?,00000000,000000F0), ref: 00401672
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Crumbliness, xrefs: 00401665
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                      • String ID: C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical\Crumbliness
                                      • API String ID: 1892508949-729936110
                                      • Opcode ID: 50ea165480be81357ae25d464df0ca33580a3cea203c3df2541c43cefebea8af
                                      • Instruction ID: 2b03c7a92312b5a1b0d009ad41e3f6a941738229f321331d68055a18e38198b9
                                      • Opcode Fuzzy Hash: 50ea165480be81357ae25d464df0ca33580a3cea203c3df2541c43cefebea8af
                                      • Instruction Fuzzy Hash: 4511D031504514EBCF207FA5CD056AF36A0EF04368B25493FE941B22F1D63D4A81DA5E
                                      APIs
                                      • RegQueryValueExW.KERNELBASE(?,00000000,00000000,?,?,00000800,00000000,?,?,?,?,Call,?,00000000,00406693,80000002), ref: 00406468
                                      • RegCloseKey.KERNELBASE(?), ref: 00406473
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CloseQueryValue
                                      • String ID: Call
                                      • API String ID: 3356406503-1824292864
                                      • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                      • Instruction ID: 8bbbfa9f798598a3d1dedb2a9c281e33174829b5b93865dedadbfc74a219c892
                                      • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                      • Instruction Fuzzy Hash: 9F01B132110209BADF21CF51CD05EDB3BA8EB44360F018039FD1692150D738DA64DBA4
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402128
                                        • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                        • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                        • Part of subcall function 004055D9: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,0040341A), ref: 00405634
                                        • Part of subcall function 004055D9: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll), ref: 00405646
                                        • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                        • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                        • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                      • LoadLibraryExW.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00402139
                                      • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004021B6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                      • String ID:
                                      • API String ID: 334405425-0
                                      • Opcode ID: dcba619cb82ab47283cf557ceb482ce7c42642f37134084d7f931d873524d78e
                                      • Instruction ID: 73d72cb5994b484f29e4ff80cb350354ef05bb92eb19bb99874f54bc55697afd
                                      • Opcode Fuzzy Hash: dcba619cb82ab47283cf557ceb482ce7c42642f37134084d7f931d873524d78e
                                      • Instruction Fuzzy Hash: EF21A131904104EACF10AFA5CF89A9E7A71BF54359F30413FF105B91E5DBBD89829A2E
                                      APIs
                                      • GlobalFree.KERNEL32(009E4498), ref: 00401C30
                                      • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C42
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Global$AllocFree
                                      • String ID: Call
                                      • API String ID: 3394109436-1824292864
                                      • Opcode ID: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                                      • Instruction ID: 6559a21230efabb52023b21709d08c05de394b4458a3aca8e6f4fe2726326e98
                                      • Opcode Fuzzy Hash: a35846d0fa1f5f62d1cc44f85dbd038e6f418717e16ba0fa97b0d6e40a5ea598
                                      • Instruction Fuzzy Hash: 6A216F73904110ABDB20FBA8DEC5A5E72E4AB08324715053BE552B72D5C6BCA8819B9D
                                      APIs
                                      • GlobalSize.KERNEL32(00000000), ref: 6FAF10AA
                                      • GlobalAlloc.KERNEL32(00000040,00000000), ref: 6FAF10B9
                                      • GlobalFree.KERNEL32(00000000), ref: 6FAF10D6
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Global$AllocFreeSize
                                      • String ID:
                                      • API String ID: 465308736-0
                                      • Opcode ID: 2dc84809ba51895081819550ef5be1911cd33a663736b5579ad5026003804c6d
                                      • Instruction ID: ef9c51284fd27ee550fabf7db726146179e85418e13ba1d3fe43eef3e0227d8e
                                      • Opcode Fuzzy Hash: 2dc84809ba51895081819550ef5be1911cd33a663736b5579ad5026003804c6d
                                      • Instruction Fuzzy Hash: B001B5F25027006BC710ABB9A984C6B77ACAF493247008526FA05CF280FF7CD4834B55
                                      APIs
                                      • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025F6
                                      • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402609
                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsc5063.tmp,00000000,00000011,00000002), ref: 00402622
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Enum$CloseValue
                                      • String ID:
                                      • API String ID: 397863658-0
                                      • Opcode ID: 6b26a19a6a49c8cdb85b468f9485b09a4b214ce950142c5c676665e06fea9f6e
                                      • Instruction ID: e355f0d3af3fae611af142f11dea5172e840e8f974d60c5f977c655607c85d86
                                      • Opcode Fuzzy Hash: 6b26a19a6a49c8cdb85b468f9485b09a4b214ce950142c5c676665e06fea9f6e
                                      • Instruction Fuzzy Hash: 5801DF71A04605BBEB149F94DE48BAFB668FF80308F10443EF001B21D0D7B84E41976D
                                      APIs
                                        • Part of subcall function 6FAF1BFF: GlobalFree.KERNEL32(?), ref: 6FAF1E74
                                        • Part of subcall function 6FAF1BFF: GlobalFree.KERNEL32(?), ref: 6FAF1E79
                                        • Part of subcall function 6FAF1BFF: GlobalFree.KERNEL32(?), ref: 6FAF1E7E
                                      • CloseHandle.KERNELBASE(00000000), ref: 6FAF17DC
                                        • Part of subcall function 6FAF1312: GlobalAlloc.KERNEL32(00000040,?,?,6FAF15FE,?), ref: 6FAF1328
                                        • Part of subcall function 6FAF1312: lstrcpynW.KERNEL32(00000004,?,?,6FAF15FE,?), ref: 6FAF133E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Global$Free$AllocCloseHandlelstrcpyn
                                      • String ID:
                                      • API String ID: 363591596-0
                                      • Opcode ID: c26de6cf6b24b26680cfab9dbc2eb864bb0e85d3757eecd2b0f29530ee03f4c8
                                      • Instruction ID: 857bfc7440697af039eb507ec69032c42ca9434be3b7e20b807f39cd4464d5ee
                                      • Opcode Fuzzy Hash: c26de6cf6b24b26680cfab9dbc2eb864bb0e85d3757eecd2b0f29530ee03f4c8
                                      • Instruction Fuzzy Hash: 690188F240B7409FC6509B78E604FAA37E4AF46328F04891AF554AF180DB7CA4C38BE5
                                      APIs
                                      • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402580
                                      • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsc5063.tmp,00000000,00000011,00000002), ref: 00402622
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CloseQueryValue
                                      • String ID:
                                      • API String ID: 3356406503-0
                                      • Opcode ID: 10d431b75224574b74b8678e8ea25e03ded551cf9e81ebafd7ca8e2dd7976e21
                                      • Instruction ID: 6577050f37a29122a5cb82ae63a7e3627040baffe8f236fb698a7bc144352859
                                      • Opcode Fuzzy Hash: 10d431b75224574b74b8678e8ea25e03ded551cf9e81ebafd7ca8e2dd7976e21
                                      • Instruction Fuzzy Hash: 51119E71904216EADF15DFA0DA589AEB7B4FF04348F20443FE802B62D0D7B84A45DB5E
                                      APIs
                                      • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                      • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                      • Instruction ID: cd791cecd07b1aef7d4b508d0a52a2ac0ec5e235a68ccce80931b69816989e44
                                      • Opcode Fuzzy Hash: 2a9df91d450fb50793c14fb38bc67898e6fb514a90870fda1bdd56b9451edd81
                                      • Instruction Fuzzy Hash: 6301F4326242109BE7195B389D05B6B36A8F791314F10863FF955F62F1DA78CC42DB4D
                                      APIs
                                      • OleInitialize.OLE32(00000000), ref: 004056BC
                                        • Part of subcall function 0040451F: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                      • OleUninitialize.OLE32(00000404,00000000), ref: 00405708
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: InitializeMessageSendUninitialize
                                      • String ID:
                                      • API String ID: 2896919175-0
                                      • Opcode ID: b5753e3ad58a69f25ac6974e6d5875c31233b5eee52de9f565f0f637ff460faa
                                      • Instruction ID: 63975ff93ca4750656595f1bf98ef34e31a5955aa7ce839472b70166dafb6141
                                      • Opcode Fuzzy Hash: b5753e3ad58a69f25ac6974e6d5875c31233b5eee52de9f565f0f637ff460faa
                                      • Instruction Fuzzy Hash: BCF0F0B38009009BEA815750AD01B277BA8FBC1305F04883BEF88A22F0DF3A08018B1E
                                      APIs
                                      • CreateDirectoryW.KERNELBASE(?,?), ref: 00405AEA
                                      • GetLastError.KERNEL32 ref: 00405AF8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CreateDirectoryErrorLast
                                      • String ID:
                                      • API String ID: 1375471231-0
                                      • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                      • Instruction ID: 13352011552d0ddc4b0c1568d720dcd5f2ba617a9a750a7f60e40e4c0ab4bb23
                                      • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                      • Instruction Fuzzy Hash: 52F0F4B0D0060EDADB00CFA4C6487EFBBB4AB04309F10812AD941B6281D7B882488FA9
                                      APIs
                                      • ShowWindow.USER32(00000000,00000000), ref: 00401F21
                                      • EnableWindow.USER32(00000000,00000000), ref: 00401F2C
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Window$EnableShow
                                      • String ID:
                                      • API String ID: 1136574915-0
                                      • Opcode ID: 43dff4b1693335f93dfca754fceec6b37362f049de9d354dc4597a38bacc65dc
                                      • Instruction ID: 98303f18ab294370b9404d3d0833ea925ed9fe29ea468c813ed2a63de2513d45
                                      • Opcode Fuzzy Hash: 43dff4b1693335f93dfca754fceec6b37362f049de9d354dc4597a38bacc65dc
                                      • Instruction Fuzzy Hash: 28E04F76908610DFE748EBA4AE499AEB7B4FF80365B20497FE001F11E1DBB94D00966D
                                      APIs
                                      • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?,?,?,976,?), ref: 00405B60
                                      • CloseHandle.KERNEL32(?,?,?,976,?), ref: 00405B6D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CloseCreateHandleProcess
                                      • String ID:
                                      • API String ID: 3712363035-0
                                      • Opcode ID: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                      • Instruction ID: e42c3092a0fd4a031c4fd4b3b8927d6f3122727aa63034fdce6a98e2e8d9435a
                                      • Opcode Fuzzy Hash: 1cf2fe051d34b4090bca479d50b9d9e6ed2e29e2a91626cbf83b173b154ad348
                                      • Instruction Fuzzy Hash: ECE09AB4900249BFEB109F64AD05E7B776CE745644F008525BD10F6151D775A8148A79
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: ShowWindow
                                      • String ID:
                                      • API String ID: 1268545403-0
                                      • Opcode ID: 161f1189b96c1e050d17504ce5c39e59e81e919b68ff6b2bf5ceaddda9e07bf6
                                      • Instruction ID: d7c79e80ad2a22e998040c9ddd7ac57f7a29ae31a8ed4af3f77ef46bec42490e
                                      • Opcode Fuzzy Hash: 161f1189b96c1e050d17504ce5c39e59e81e919b68ff6b2bf5ceaddda9e07bf6
                                      • Instruction Fuzzy Hash: 48E04F32A14514ABCB18CBA8EDD086E73B6FB84310310453FE502B36A4C6789C00CB58
                                      APIs
                                      • GetModuleHandleA.KERNEL32(?,00000020,?,0040363F,0000000C,?,?,?,?,?,?,?,?), ref: 0040695A
                                      • GetProcAddress.KERNEL32(00000000,?), ref: 00406975
                                        • Part of subcall function 004068D8: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068EF
                                        • Part of subcall function 004068D8: wsprintfW.USER32 ref: 0040692A
                                        • Part of subcall function 004068D8: LoadLibraryExW.KERNELBASE(?,00000000,00000008), ref: 0040693E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                      • String ID:
                                      • API String ID: 2547128583-0
                                      • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                      • Instruction ID: 551f93d59f6a57a7cc32b559d7ebc8a6d8da67cd5dc02587d5b4d2bd1ffdf244
                                      • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                      • Instruction Fuzzy Hash: 95E08673504310AAD2105A705E04C2B73B89F85740302443EF942F2140D734DC32E769
                                      APIs
                                      • GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,80000000,00000003), ref: 00406048
                                      • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: File$AttributesCreate
                                      • String ID:
                                      • API String ID: 415043291-0
                                      • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                      • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                      • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                      • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                      APIs
                                      • CreateDirectoryW.KERNELBASE(?,00000000,00403522,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405B08
                                      • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405B16
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CreateDirectoryErrorLast
                                      • String ID:
                                      • API String ID: 1375471231-0
                                      • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                      • Instruction ID: 7bb2d1eb449126eed485e4eb4fbdbafbf981390ed288ef949080c13de55397a1
                                      • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                      • Instruction Fuzzy Hash: 7CC08C30314902DADA802B209F0870B3A60AB80340F154439A582E00E4CA30A445C92D
                                      APIs
                                      • CreateFileA.KERNELBASE(00000000), ref: 6FAF2C57
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CreateFile
                                      • String ID:
                                      • API String ID: 823142352-0
                                      • Opcode ID: 12ece7e591146b1480d83022fc2eab4a0835f6d059cc674b95682b45a5ce5119
                                      • Instruction ID: 693ea1795a6c25eb783f483f66d37759bf82055ac3536351ae281ed9d4378427
                                      • Opcode Fuzzy Hash: 12ece7e591146b1480d83022fc2eab4a0835f6d059cc674b95682b45a5ce5119
                                      • Instruction Fuzzy Hash: 2D416D71503B84AFDB209F68EA85B9977F4EB45368F60C426F8048F180D73CA4D38BA1
                                      APIs
                                      • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028D4
                                        • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: FilePointerwsprintf
                                      • String ID:
                                      • API String ID: 327478801-0
                                      • Opcode ID: 874a48f5052de35ce3f5d68bebafa1d1d6b4bc0d038a260f4494356ae22f2f83
                                      • Instruction ID: d8afcb7e31c577c7df5a47bf7b189458025ebbcb83da75e60b69e678f76aa364
                                      • Opcode Fuzzy Hash: 874a48f5052de35ce3f5d68bebafa1d1d6b4bc0d038a260f4494356ae22f2f83
                                      • Instruction Fuzzy Hash: E8E06D71904104AADB00EFA5AE498AE77B9EB80349B20443FF101B00E9C67859109A3D
                                      APIs
                                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040240E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: PrivateProfileStringWrite
                                      • String ID:
                                      • API String ID: 390214022-0
                                      • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                      • Instruction ID: ca2f62041d63e4abf833ada0eb3473e8090594299762c22e2e4a91b8788c92d6
                                      • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                      • Instruction Fuzzy Hash: CEE086319105266BDB103AF20ECE9BE2058AF48308B24093FF512B61C2DEFC8C42567D
                                      APIs
                                      • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 0040176E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: PathSearch
                                      • String ID:
                                      • API String ID: 2203818243-0
                                      • Opcode ID: 05a45ba0fbdca432f99f2945050b89cf5dd6b3df4aa2657fab958fcfff1ad0d5
                                      • Instruction ID: 5ef6c9dc075d7657941f8fe9075485116ee4ddb5350d9d3ef67c2e6f18a0d880
                                      • Opcode Fuzzy Hash: 05a45ba0fbdca432f99f2945050b89cf5dd6b3df4aa2657fab958fcfff1ad0d5
                                      • Instruction Fuzzy Hash: 6FE04871204101AAE700DB94DD49EAF7768DF50358F20813BE511A60D1E6B49914972D
                                      APIs
                                      • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E7C,00000000,?,?), ref: 00406418
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                      • Instruction ID: 1ec48b264e911f442ad562827ea2aeba8bdc9c692846981259ff7ce92a87d17c
                                      • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                      • Instruction Fuzzy Hash: 60E0BF72110109BFEF095F90DD0AD7B761DE704210B01452EF906D4051E6B5A9305674
                                      APIs
                                      • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E4,00000000,00000000,0040332B,000000FF,00000004,00000000,00000000,00000000), ref: 004060DB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: FileRead
                                      • String ID:
                                      • API String ID: 2738559852-0
                                      • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                      • Instruction ID: 1a6ac9c2f17c3bf7024e7b579d6ce6ab3b84958f313ea5b4b1ce89539a84cc3a
                                      • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                      • Instruction Fuzzy Hash: 55E0EC3225026AABDF10DE55DC00EEB7BACEB053A0F018437F956E7150DA31E93197A8
                                      APIs
                                      • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040349A,00000000,00793700,000000FF,00793700,000000FF,000000FF,00000004,00000000), ref: 0040610A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: FileWrite
                                      • String ID:
                                      • API String ID: 3934441357-0
                                      • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                      • Instruction ID: 280cd4c212b49affc14266408846aa3a30e7e9a640caac8a44b81d30c287abca
                                      • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                      • Instruction Fuzzy Hash: E1E08C3221025AABCF109E908C01EEB7B6CEB043A0F014433FD16EB051D230E8319BA8
                                      APIs
                                      • VirtualProtect.KERNELBASE(6FAF505C,00000004,00000040,6FAF504C), ref: 6FAF2A9D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: ProtectVirtual
                                      • String ID:
                                      • API String ID: 544645111-0
                                      • Opcode ID: 76918bbf9709a32a16ef1d12fd5cf47baaf572f90332016e2e93033eb1250944
                                      • Instruction ID: 32d7ae41d7f04b42ccc7a2a25b99898c6a2445c65138805fb3df2ccb10404999
                                      • Opcode Fuzzy Hash: 76918bbf9709a32a16ef1d12fd5cf47baaf572f90332016e2e93033eb1250944
                                      • Instruction Fuzzy Hash: 85F09BB1946B80EECB60CF2CA444B093FF0BB4A324F15C52AE188DE240E33840A6CB95
                                      APIs
                                      • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040244A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: PrivateProfileString
                                      • String ID:
                                      • API String ID: 1096422788-0
                                      • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                      • Instruction ID: 53345aa50f94a5dbc05c73a67e8aa0b188b477950ab0ef6c1fe412bbc790425e
                                      • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                      • Instruction Fuzzy Hash: E7E04F3180021AAADB00AFA0CE0ADAD3678AF00304F10493EF510BB0D1E7F889509759
                                      APIs
                                      • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,0040644F,?,?,?,?,Call,?,00000000), ref: 004063E5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Open
                                      • String ID:
                                      • API String ID: 71445658-0
                                      • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                      • Instruction ID: e359b3f9d4e5954a9af9fcfc08987e0780d6658b6568ce36bf776d9a1ed3ba47
                                      • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                      • Instruction Fuzzy Hash: 5AD0123210020DBBDF115F90AD01FAB771DAB08310F014826FE17E40D0D775D530A7A4
                                      APIs
                                      • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015D3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: AttributesFile
                                      • String ID:
                                      • API String ID: 3188754299-0
                                      • Opcode ID: 7eccfe31bafa3dcd48d048314c709a01750866e7234f026f470328f7be052334
                                      • Instruction ID: 2b9d1094eaa3a8f74ec8242088029bd2eb80cc7fbaada08ad61a8f4613916ca8
                                      • Opcode Fuzzy Hash: 7eccfe31bafa3dcd48d048314c709a01750866e7234f026f470328f7be052334
                                      • Instruction Fuzzy Hash: 8BD05B72B08101D7DB00DBE89B48A9E77609B50368B30C53BD111F11E4D6B8C555A71D
                                      APIs
                                      • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: f1c7da54befd6d6a563f00396e813b8d921f3a4fa707ebac73e9c93964ba1fa7
                                      • Instruction ID: 80e323bcaa4fb1d2d6ad7f8777a1edc32b6b0207238f0482179e9273dd0660e4
                                      • Opcode Fuzzy Hash: f1c7da54befd6d6a563f00396e813b8d921f3a4fa707ebac73e9c93964ba1fa7
                                      • Instruction Fuzzy Hash: 10C09BB57443007BDA149B509E45F17776467D4741F14C5797340F50F0C774E450D62C
                                      APIs
                                      • ShellExecuteExW.SHELL32(?), ref: 00405B89
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: ExecuteShell
                                      • String ID:
                                      • API String ID: 587946157-0
                                      • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                      • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                                      • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                      • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                                      APIs
                                      • SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend
                                      • String ID:
                                      • API String ID: 3850602802-0
                                      • Opcode ID: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                      • Instruction ID: c6ab7f6cffe81da1172822363f1dd48ca364d348eecf8336b79a6db78a7c4a26
                                      • Opcode Fuzzy Hash: d8acea26a230a6f6dce64032923e754adb325d86aa568b2d6d5b5dd5df397682
                                      • Instruction Fuzzy Hash: 18B09235184A00ABDA515B00DE09F467B62E7A4701F008538B240640F0CBB200A0DB0A
                                      APIs
                                      • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403267,?), ref: 004034F5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: FilePointer
                                      • String ID:
                                      • API String ID: 973152223-0
                                      • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                      • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                      • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                      • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                      APIs
                                      • KiUserCallbackDispatcher.NTDLL(?,004042CC), ref: 004044FF
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CallbackDispatcherUser
                                      • String ID:
                                      • API String ID: 2492992576-0
                                      • Opcode ID: c966d15b9c294ca5f877954a8561fb6b5762177598d7c32600178bcf5d115e9d
                                      • Instruction ID: b0a400b6fcb01754b069d8f8c1c9044561b78d1e04efb9d0fff21555a903a89e
                                      • Opcode Fuzzy Hash: c966d15b9c294ca5f877954a8561fb6b5762177598d7c32600178bcf5d115e9d
                                      • Instruction Fuzzy Hash: DFA00176444910ABDA02AB50EF0984ABB62FBE5701B519879A286510348B365820FB19
                                      APIs
                                        • Part of subcall function 004055D9: lstrlenW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000,?), ref: 00405611
                                        • Part of subcall function 004055D9: lstrlenW.KERNEL32(0040341A,Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,00000000,0079A700,74DF23A0,?,?,?,?,?,?,?,?,?,0040341A,00000000), ref: 00405621
                                        • Part of subcall function 004055D9: lstrcatW.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,0040341A), ref: 00405634
                                        • Part of subcall function 004055D9: SetWindowTextW.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll), ref: 00405646
                                        • Part of subcall function 004055D9: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566C
                                        • Part of subcall function 004055D9: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405686
                                        • Part of subcall function 004055D9: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405694
                                        • Part of subcall function 00405B37: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,007A4750,?,?,?,976,?), ref: 00405B60
                                        • Part of subcall function 00405B37: CloseHandle.KERNEL32(?,?,?,976,?), ref: 00405B6D
                                      • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00402010
                                        • Part of subcall function 004069F3: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406A04
                                        • Part of subcall function 004069F3: GetExitCodeProcess.KERNEL32(?,?), ref: 00406A26
                                        • Part of subcall function 0040649B: wsprintfW.USER32 ref: 004064A8
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                      • String ID:
                                      • API String ID: 2972824698-0
                                      • Opcode ID: 6a4a35ee59a0022a8f9558aa0da532edee76dee6ec420d45f67ada4f4d53e101
                                      • Instruction ID: 31278e7032d6d459f1869afa1fc16bf8b986fef5f9539014001fbe5517bff4f7
                                      • Opcode Fuzzy Hash: 6a4a35ee59a0022a8f9558aa0da532edee76dee6ec420d45f67ada4f4d53e101
                                      • Instruction Fuzzy Hash: 83F09672905511DBDB20BBA59A8999E7664DF0031CF21413FF202B25D5CABC4E41EA6E
                                      APIs
                                      • Sleep.KERNELBASE(00000000), ref: 004014EA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Sleep
                                      • String ID:
                                      • API String ID: 3472027048-0
                                      • Opcode ID: b83d77026a0eef837aee2cf9f67490139d75f0ecd08a9ee5abe0a22eb8051c76
                                      • Instruction ID: e3f6ed4717897a2e6ecee164b05e04455bfe3191319e132c95f7d07364d35911
                                      • Opcode Fuzzy Hash: b83d77026a0eef837aee2cf9f67490139d75f0ecd08a9ee5abe0a22eb8051c76
                                      • Instruction Fuzzy Hash: 48D0A773A146008BD744EBB8BE8546F73E8FB903193204C3BD102E10E1E67CC911461C
                                      APIs
                                      • GetDlgItem.USER32(?,000003FB), ref: 00404A13
                                      • SetWindowTextW.USER32(00000000,?), ref: 00404A3D
                                      • SHBrowseForFolderW.SHELL32(?), ref: 00404AEE
                                      • CoTaskMemFree.OLE32(00000000), ref: 00404AF9
                                      • lstrcmpiW.KERNEL32(Call,007A1748,00000000,?,?), ref: 00404B2B
                                      • lstrcatW.KERNEL32(?,Call), ref: 00404B37
                                      • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B49
                                        • Part of subcall function 00405B98: GetDlgItemTextW.USER32(?,?,00000400,00404B80), ref: 00405BAB
                                        • Part of subcall function 00406802: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406865
                                        • Part of subcall function 00406802: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406874
                                        • Part of subcall function 00406802: CharNextW.USER32(?,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406879
                                        • Part of subcall function 00406802: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 0040688C
                                      • GetDiskFreeSpaceW.KERNEL32(0079F718,?,?,0000040F,?,0079F718,0079F718,?,00000001,0079F718,?,?,000003FB,?), ref: 00404C0C
                                      • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404C27
                                        • Part of subcall function 00404D80: lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E21
                                        • Part of subcall function 00404D80: wsprintfW.USER32 ref: 00404E2A
                                        • Part of subcall function 00404D80: SetDlgItemTextW.USER32(?,007A1748), ref: 00404E3D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                      • String ID: A$C:\Users\user\AppData\Local\Temp\bygvrkerne\linda\balaamitical$Call
                                      • API String ID: 2624150263-294240499
                                      • Opcode ID: d546a645e60e6957f04ba02b6a3eb8270b6339cfa2b22d8784a61d082e69804a
                                      • Instruction ID: db18d61dd8e36d4389a3b44505c0f864e6ca322f8728bcf89e652d7f1c678b9a
                                      • Opcode Fuzzy Hash: d546a645e60e6957f04ba02b6a3eb8270b6339cfa2b22d8784a61d082e69804a
                                      • Instruction Fuzzy Hash: 25A185B1900208ABDB11AFA5DD45BEFB7B8EF84314F11403BF611B62D1D77C9A418B69
                                      APIs
                                      • GetDlgItem.USER32(?,000003F9), ref: 00404F58
                                      • GetDlgItem.USER32(?,00000408), ref: 00404F63
                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 00404FAD
                                      • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404FC4
                                      • SetWindowLongW.USER32(?,000000FC,0040554D), ref: 00404FDD
                                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FF1
                                      • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405003
                                      • SendMessageW.USER32(?,00001109,00000002), ref: 00405019
                                      • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405025
                                      • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405037
                                      • DeleteObject.GDI32(00000000), ref: 0040503A
                                      • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405065
                                      • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405071
                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040510C
                                      • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040513C
                                        • Part of subcall function 00404508: SendMessageW.USER32(00000028,?,00000001,00404333), ref: 00404516
                                      • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405150
                                      • GetWindowLongW.USER32(?,000000F0), ref: 0040517E
                                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040518C
                                      • ShowWindow.USER32(?,00000005), ref: 0040519C
                                      • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405297
                                      • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052FC
                                      • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405311
                                      • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405335
                                      • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405355
                                      • ImageList_Destroy.COMCTL32(?), ref: 0040536A
                                      • GlobalFree.KERNEL32(?), ref: 0040537A
                                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053F3
                                      • SendMessageW.USER32(?,00001102,?,?), ref: 0040549C
                                      • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004054AB
                                      • InvalidateRect.USER32(?,00000000,00000001), ref: 004054D6
                                      • ShowWindow.USER32(?,00000000), ref: 00405524
                                      • GetDlgItem.USER32(?,000003FE), ref: 0040552F
                                      • ShowWindow.USER32(00000000), ref: 00405536
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                      • String ID: $M$N
                                      • API String ID: 2564846305-813528018
                                      • Opcode ID: 118804aa0d3f553a5cfa041bdbc592f4de402f04deb09a42b48635efc9d72333
                                      • Instruction ID: 3f60975f1bbea04172c566a814ac76c3bf8fe72ba7ce1bc18d7d222ec834a39f
                                      • Opcode Fuzzy Hash: 118804aa0d3f553a5cfa041bdbc592f4de402f04deb09a42b48635efc9d72333
                                      • Instruction Fuzzy Hash: B2027870900609AFDF20DF65DC85AAF7BB5FB85314F10816AFA10BA2E1D7798A41CF58
                                      APIs
                                      • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404730
                                      • GetDlgItem.USER32(?,000003E8), ref: 00404744
                                      • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404761
                                      • GetSysColor.USER32(?), ref: 00404772
                                      • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404780
                                      • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040478E
                                      • lstrlenW.KERNEL32(?), ref: 00404793
                                      • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004047A0
                                      • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047B5
                                      • GetDlgItem.USER32(?,0000040A), ref: 0040480E
                                      • SendMessageW.USER32(00000000), ref: 00404815
                                      • GetDlgItem.USER32(?,000003E8), ref: 00404840
                                      • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404883
                                      • LoadCursorW.USER32(00000000,00007F02), ref: 00404891
                                      • SetCursor.USER32(00000000), ref: 00404894
                                      • LoadCursorW.USER32(00000000,00007F00), ref: 004048AD
                                      • SetCursor.USER32(00000000), ref: 004048B0
                                      • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048DF
                                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048F1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                      • String ID: F@$Call$N
                                      • API String ID: 3103080414-3713480610
                                      • Opcode ID: cd157397fad3e9ba876edf76049899dad645a115876cfb537e4ce2c7fc417499
                                      • Instruction ID: 45fb83ade45cfc86163e6b15eb7062ba83955ff26de70ff6e3d1e782862a206c
                                      • Opcode Fuzzy Hash: cd157397fad3e9ba876edf76049899dad645a115876cfb537e4ce2c7fc417499
                                      • Instruction Fuzzy Hash: 1861A2B1900209BFDF10AF60DD85A6A7B69FB85314F00843AF705B62E0C778AD51CFA9
                                      APIs
                                      • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406335,?,?), ref: 004061D5
                                      • GetShortPathNameW.KERNEL32(?,007A4DE8,00000400), ref: 004061DE
                                        • Part of subcall function 00405FA9: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB9
                                        • Part of subcall function 00405FA9: lstrlenA.KERNEL32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEB
                                      • GetShortPathNameW.KERNEL32(?,007A55E8,00000400), ref: 004061FB
                                      • wsprintfA.USER32 ref: 00406219
                                      • GetFileSize.KERNEL32(00000000,00000000,007A55E8,C0000000,00000004,007A55E8,?,?,?,?,?), ref: 00406254
                                      • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406263
                                      • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040629B
                                      • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,007A49E8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F1
                                      • GlobalFree.KERNEL32(00000000), ref: 00406302
                                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406309
                                        • Part of subcall function 00406044: GetFileAttributesW.KERNELBASE(00000003,004030E2,C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,80000000,00000003), ref: 00406048
                                        • Part of subcall function 00406044: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606A
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                      • String ID: %ls=%ls$[Rename]$Mz$Uz$Uz
                                      • API String ID: 2171350718-3350566011
                                      • Opcode ID: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                      • Instruction ID: b6cadbeacbe634b6bd87c882f2c351c0ea44a21df7cd689b804f2f2a1cba60a5
                                      • Opcode Fuzzy Hash: a33c05bce7c125d61af8aa6c61577077044d65e406db0fd5498825754e73940b
                                      • Instruction Fuzzy Hash: 2F313770600715BBD2206B658D49F6B3A5CDF82714F16003EFE02F72D2DA7D982486BD
                                      APIs
                                      • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                      • BeginPaint.USER32(?,?), ref: 00401047
                                      • GetClientRect.USER32(?,?), ref: 0040105B
                                      • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                      • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                      • DeleteObject.GDI32(?), ref: 004010ED
                                      • CreateFontIndirectW.GDI32(?), ref: 00401105
                                      • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                      • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                      • SelectObject.GDI32(00000000,?), ref: 00401140
                                      • DrawTextW.USER32(00000000,007A7260,000000FF,00000010,00000820), ref: 00401156
                                      • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                      • DeleteObject.GDI32(?), ref: 00401165
                                      • EndPaint.USER32(?,?), ref: 0040116E
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                      • String ID: F
                                      • API String ID: 941294808-1304234792
                                      • Opcode ID: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                                      • Instruction ID: f4bc5d4286e22692ddece56c15c19c5fca937d6aefcb7484b61e28148d91a738
                                      • Opcode Fuzzy Hash: 0065e8d55c47ea3cbcda8c109104f1eee6ee8d4d6af800c5cfa02106002edbf4
                                      • Instruction Fuzzy Hash: 3F418A71804209AFCF058FA5CE459BFBBB9FF45314F00802EF591AA1A0CB389A55DFA4
                                      APIs
                                      • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406865
                                      • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406874
                                      • CharNextW.USER32(?,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00406879
                                      • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 0040688C
                                      Strings
                                      • "C:\Users\user\Desktop\TRIAL_ORDER_CP.exe", xrefs: 00406846
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00406803
                                      • *?|<>/":, xrefs: 00406854
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Char$Next$Prev
                                      • String ID: "C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 589700163-3847847834
                                      • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                      • Instruction ID: 8a5b279eb1c6e0cea376d4f623a12da6f674b8daf8575b9a92ef11e753d0d18b
                                      • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                      • Instruction Fuzzy Hash: D111B66780121299DB303B158C44AB766E8EF54794F52C03FED8A732C0E77C4C9286AD
                                      APIs
                                      • GetWindowLongW.USER32(?,000000EB), ref: 00404557
                                      • GetSysColor.USER32(00000000), ref: 00404595
                                      • SetTextColor.GDI32(?,00000000), ref: 004045A1
                                      • SetBkMode.GDI32(?,?), ref: 004045AD
                                      • GetSysColor.USER32(?), ref: 004045C0
                                      • SetBkColor.GDI32(?,?), ref: 004045D0
                                      • DeleteObject.GDI32(?), ref: 004045EA
                                      • CreateBrushIndirect.GDI32(?), ref: 004045F4
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                      • String ID:
                                      • API String ID: 2320649405-0
                                      • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                      • Instruction ID: 9e725ab64d6b149d2d2f876944178e70108deb967c5ff43b0f72f150d1bef9aa
                                      • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                      • Instruction Fuzzy Hash: DA2177B1500704AFCB309F78DD18B5BBBF4BF41710B04892EEA96A22E0D739E944CB54
                                      APIs
                                      • GlobalFree.KERNEL32(00000000), ref: 6FAF25C2
                                        • Part of subcall function 6FAF12CC: lstrcpynW.KERNEL32(00000000,?,6FAF137F,00000019,6FAF11CA,-000000A0), ref: 6FAF12DC
                                      • GlobalAlloc.KERNEL32(00000040), ref: 6FAF2548
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6FAF2563
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                      • String ID: @Hmu
                                      • API String ID: 4216380887-887474944
                                      • Opcode ID: 383744356cac9e1bec6a93c11d070def9630d7177ef64e652deba820de52f8cb
                                      • Instruction ID: 08090287003aacba1b1fab47bee0fc108fe3b64f0985866f622245ceca2282ab
                                      • Opcode Fuzzy Hash: 383744356cac9e1bec6a93c11d070def9630d7177ef64e652deba820de52f8cb
                                      • Instruction Fuzzy Hash: 6941AEB004A785DFDB14DF28E940A2677F8FB85315F008A2EF8468E580E77CA587CB61
                                      APIs
                                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404EA9
                                      • GetMessagePos.USER32 ref: 00404EB1
                                      • ScreenToClient.USER32(?,?), ref: 00404ECB
                                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EDD
                                      • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404F03
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Message$Send$ClientScreen
                                      • String ID: f
                                      • API String ID: 41195575-1993550816
                                      • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                      • Instruction ID: 20ba1dd8c6eb147b8de8e184d932bb38cbf2a2b27d4ef3642ae6e6b093867634
                                      • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                      • Instruction Fuzzy Hash: D6015E72900219BADB00DB95DD85FFEBBBCAF95711F10412BBB51B61D0C7B49A018BA4
                                      APIs
                                      • GetDC.USER32(?), ref: 00401E76
                                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                      • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                      • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                      • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401EF8
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CapsCreateDeviceFontIndirectRelease
                                      • String ID: Times New Roman
                                      • API String ID: 3808545654-927190056
                                      • Opcode ID: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                      • Instruction ID: 03fa82d4c3f414405e360d431a269216209ac9bc2718b2d324fdabe448a9bb24
                                      • Opcode Fuzzy Hash: ef63408107684041e4866229634915ac86451c59f948bd83cb9cb27aef798f6a
                                      • Instruction Fuzzy Hash: 28018471954250EFEB015BB4AE89BDD3FB4AF59301F10497AF142BA1E2CAB90444DB3D
                                      APIs
                                      • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                      • MulDiv.KERNEL32(000F78CC,00000064,000F7AD0), ref: 00403001
                                      • wsprintfW.USER32 ref: 00403011
                                      • SetWindowTextW.USER32(?,?), ref: 00403021
                                      • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403033
                                      Strings
                                      • verifying installer: %d%%, xrefs: 0040300B
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Text$ItemTimerWindowwsprintf
                                      • String ID: verifying installer: %d%%
                                      • API String ID: 1451636040-82062127
                                      • Opcode ID: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                      • Instruction ID: 52c7d57b2d50c4e26d0c42f1be749ca1a93388b8845742b28701603c77c86054
                                      • Opcode Fuzzy Hash: c24f39b73ea1f3b51e5f33cc7d94247a9242632f843dd5f1d8eee7270cd10b93
                                      • Instruction Fuzzy Hash: 89016270640209BBEF209F60DD4AFEE3B79EB04344F10803AFA02B51D0DBB99A559F58
                                      APIs
                                        • Part of subcall function 6FAF12BB: GlobalAlloc.KERNEL32(00000040,?,6FAF12DB,?,6FAF137F,00000019,6FAF11CA,-000000A0), ref: 6FAF12C5
                                      • GlobalFree.KERNEL32(?), ref: 6FAF2743
                                      • GlobalFree.KERNEL32(00000000), ref: 6FAF2778
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Global$Free$Alloc
                                      • String ID:
                                      • API String ID: 1780285237-0
                                      • Opcode ID: c2878cde687a93ea21698f61e6bfb680df924bdf1bc751e7782ae7858529c98a
                                      • Instruction ID: 45f9776fa1515c73acd1317606e22c7073695be04d466afef259afdd779d9232
                                      • Opcode Fuzzy Hash: c2878cde687a93ea21698f61e6bfb680df924bdf1bc751e7782ae7858529c98a
                                      • Instruction Fuzzy Hash: 0E31F27150A681EFCB258F68DA84C2A7BF6FF873543148229F5018F1A0C73968978B61
                                      APIs
                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                      • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                      • GlobalFree.KERNEL32(?), ref: 00402A2B
                                      • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                      • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
                                      • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Global$AllocFree$CloseDeleteFileHandle
                                      • String ID:
                                      • API String ID: 2667972263-0
                                      • Opcode ID: 25bf78e54cbd8aa37d329c3f05fc5024ce6df7990c5782e16241d3aa6ebd5229
                                      • Instruction ID: 5c013e3641f51b8511de27967d5ac64a9b846b719b0e1cdf51d049a21d65d460
                                      • Opcode Fuzzy Hash: 25bf78e54cbd8aa37d329c3f05fc5024ce6df7990c5782e16241d3aa6ebd5229
                                      • Instruction Fuzzy Hash: 3D31B171D00128BBCF21AFA5CE4999E7E79AF45324F10423AF511762E1CB794D419F98
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: FreeGlobal
                                      • String ID:
                                      • API String ID: 2979337801-0
                                      • Opcode ID: 849c9e0b7f3bb1c84d5bf86018031e779b4c9fa345c14ec08faf73d47181688d
                                      • Instruction ID: b7da61578f974e27bdb534d59f912b6af0660383a9b5872213872b5c69955231
                                      • Opcode Fuzzy Hash: 849c9e0b7f3bb1c84d5bf86018031e779b4c9fa345c14ec08faf73d47181688d
                                      • Instruction Fuzzy Hash: 5051C0F2D17208EA8B109FB8C5805BDBAB5AF41318F84925BF400AF254E77DB9C78791
                                      APIs
                                      • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                      • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                      • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CloseEnum$DeleteValue
                                      • String ID:
                                      • API String ID: 1354259210-0
                                      • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                      • Instruction ID: 9b286c5d8e76f57eb0c9cc6cf8757f48d710680964e76fdf16ae971aa0981de0
                                      • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                      • Instruction Fuzzy Hash: 64215A7150010ABFDF129F90CE89EEF7A7DEB14398F110076B909B21A0D7B48E54AA64
                                      APIs
                                      • GetDlgItem.USER32(?,?), ref: 00401DBF
                                      • GetClientRect.USER32(?,?), ref: 00401E0A
                                      • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                      • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                      • DeleteObject.GDI32(00000000), ref: 00401E5E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                      • String ID:
                                      • API String ID: 1849352358-0
                                      • Opcode ID: f9512a0e8a514307da24a6b29ff575f3dda491a4b437724600ff434ac20b261f
                                      • Instruction ID: bf706e621430f2b8e1e8296bf8ea73d697ba0e02d4cfc8f60e3200fcd9798b2c
                                      • Opcode Fuzzy Hash: f9512a0e8a514307da24a6b29ff575f3dda491a4b437724600ff434ac20b261f
                                      • Instruction Fuzzy Hash: 57212A72904119AFCB05DF94DE45AEEBBB5EB08300F14403AF945F62A0DB389D81DB98
                                      APIs
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6FAF22D8,?,00000808), ref: 6FAF16D5
                                      • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6FAF22D8,?,00000808), ref: 6FAF16DC
                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6FAF22D8,?,00000808), ref: 6FAF16F0
                                      • GetProcAddress.KERNEL32(6FAF22D8,00000000), ref: 6FAF16F7
                                      • GlobalFree.KERNEL32(00000000), ref: 6FAF1700
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                      • String ID:
                                      • API String ID: 1148316912-0
                                      • Opcode ID: c973de10a5640689d3f4cbd1887e8e1443c61e861a4dfdafe472f91dfc510296
                                      • Instruction ID: 3c3b80487b57b1ef88abada50393bd83b18fcff4c64aa78dd5cc1ff66d23e1b0
                                      • Opcode Fuzzy Hash: c973de10a5640689d3f4cbd1887e8e1443c61e861a4dfdafe472f91dfc510296
                                      • Instruction Fuzzy Hash: C0F012721076387BDA2016AADD4CC9B7E9CEF8B2F5B114215F6189119085654C12D7F1
                                      APIs
                                      • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                      • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: MessageSend$Timeout
                                      • String ID: !
                                      • API String ID: 1777923405-2657877971
                                      • Opcode ID: c23d5500826537fa29cebf8011e108a036ebafb4b175d524911a422f69a294dc
                                      • Instruction ID: 31ba3c168d84f0c85bcad1357d39928db2ba622a9cc012c1a012c7db44d830b4
                                      • Opcode Fuzzy Hash: c23d5500826537fa29cebf8011e108a036ebafb4b175d524911a422f69a294dc
                                      • Instruction Fuzzy Hash: 66218071D1421AAEEB05AFA4D94AAFE7BB0EF44304F10453FF505B61D0D7B88941DB98
                                      APIs
                                      • lstrlenW.KERNEL32(007A1748,007A1748,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E21
                                      • wsprintfW.USER32 ref: 00404E2A
                                      • SetDlgItemTextW.USER32(?,007A1748), ref: 00404E3D
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: ItemTextlstrlenwsprintf
                                      • String ID: %u.%u%s%s
                                      • API String ID: 3540041739-3551169577
                                      • Opcode ID: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                                      • Instruction ID: afd2be291b2a15d2af8ae11ee91158e81c8ac3063311500d61ab43a3e8b0c9b4
                                      • Opcode Fuzzy Hash: 21d04326a64a20976fb5de8d07180004ad871368d5848da8d0db5094891019e4
                                      • Instruction Fuzzy Hash: 6F11E77360423837DB10996D9C45E9E3298DF85374F254237FA66F31D1EA79DC2182E8
                                      APIs
                                        • Part of subcall function 00406554: lstrcpynW.KERNEL32(?,?,00000400,004036A1,007A7260,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406561
                                        • Part of subcall function 00405ECE: CharNextW.USER32(?,?,007A3F50,?,00405F42,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"), ref: 00405EDC
                                        • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EE1
                                        • Part of subcall function 00405ECE: CharNextW.USER32(00000000), ref: 00405EF9
                                      • lstrlenW.KERNEL32(007A3F50,00000000,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\TRIAL_ORDER_CP.exe"), ref: 00405F84
                                      • GetFileAttributesW.KERNEL32(007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,007A3F50,00000000,007A3F50,007A3F50,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C80,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405F94
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                      • String ID: C:\Users\user\AppData\Local\Temp\$P?z
                                      • API String ID: 3248276644-3492887852
                                      • Opcode ID: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                      • Instruction ID: f4f6e0775867387827aab8404002f3e8856b431f62ec50d584846b16db6dccac
                                      • Opcode Fuzzy Hash: bcbf200ecc0ebcd9a110e0aedcb8263399075ff3aca88ce7f3d60eb64f48f27a
                                      • Instruction Fuzzy Hash: 9BF02D36105E5319D62273365C09AAF1544CF86358709057BF852B12D5CF3C8A53CC7E
                                      APIs
                                      • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405E29
                                      • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00403819,?,00000008,0000000A,0000000C), ref: 00405E33
                                      • lstrcatW.KERNEL32(?,0040A014), ref: 00405E45
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E23
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CharPrevlstrcatlstrlen
                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 2659869361-3081826266
                                      • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                      • Instruction ID: d63f260b1a4b66e3edf6d37d75e222a08c60d96d58f132ba82df153afabc7d48
                                      • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                      • Instruction Fuzzy Hash: EDD0A771101534BAC212AB54AC04CDF73ACAF46344342403BF541B30A5C77C5D5187FD
                                      APIs
                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6FAF1171
                                      • GlobalAlloc.KERNEL32(00000040,?), ref: 6FAF11E3
                                      • GlobalFree.KERNEL32 ref: 6FAF124A
                                      • GlobalFree.KERNEL32(?), ref: 6FAF129B
                                      • GlobalFree.KERNEL32(00000000), ref: 6FAF12B1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4125142859.000000006FAF1000.00000020.00000001.01000000.00000008.sdmp, Offset: 6FAF0000, based on PE: true
                                      • Associated: 00000000.00000002.4125121702.000000006FAF0000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125160526.000000006FAF4000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      • Associated: 00000000.00000002.4125186187.000000006FAF6000.00000002.00000001.01000000.00000008.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_6faf0000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Global$Free$Alloc
                                      • String ID:
                                      • API String ID: 1780285237-0
                                      • Opcode ID: 6944af44adb0b6fadc019ed735d46a456de3509ba5361d762bc52d8bdf0aa12a
                                      • Instruction ID: e03be69105db3ec57847989dd7280b1b34eedad113507ff198c1a5d9281b7303
                                      • Opcode Fuzzy Hash: 6944af44adb0b6fadc019ed735d46a456de3509ba5361d762bc52d8bdf0aa12a
                                      • Instruction Fuzzy Hash: 1D516DF59027019FDB00CFA8E944A657BA8FF06365B04852AF945DF250E738A992CB54
                                      APIs
                                      • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll), ref: 004026BA
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: lstrlen
                                      • String ID: C:\Users\user\AppData\Local\Temp\nsc5063.tmp$C:\Users\user\AppData\Local\Temp\nsc5063.tmp\System.dll
                                      • API String ID: 1659193697-130509334
                                      • Opcode ID: 9b1e63793fec7cddd71c9e4d09a620ca33840b4aa6a8db6fbdf3e38666f13665
                                      • Instruction ID: 017f71272b68274a12e342b3970613002fe1d3414b89f7e2a3fd3533f9475010
                                      • Opcode Fuzzy Hash: 9b1e63793fec7cddd71c9e4d09a620ca33840b4aa6a8db6fbdf3e38666f13665
                                      • Instruction Fuzzy Hash: C7110D72A10206BBCB00BBB19F46AAE7B616F51748F20843FF502F61D1DAFD8851631E
                                      APIs
                                      • DestroyWindow.USER32(00000000,00000000,0040321C,00000001), ref: 00403051
                                      • GetTickCount.KERNEL32 ref: 0040306F
                                      • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 0040308C
                                      • ShowWindow.USER32(00000000,00000005), ref: 0040309A
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                      • String ID:
                                      • API String ID: 2102729457-0
                                      • Opcode ID: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                      • Instruction ID: 04dff40eaa5975d4421a2039d3eb5be5080597dcfa90b8d0ab21d67e5ec7c10f
                                      • Opcode Fuzzy Hash: 69c8c07bcb791fb785738829cd10c29190a6685c9026359a959baa5e0d41d55b
                                      • Instruction Fuzzy Hash: BFF05430406621AFC6616F50FD08A9B7B69FB45B12B45843BF145F11E8C73C48818B9D
                                      APIs
                                      • IsWindowVisible.USER32(?), ref: 0040557C
                                      • CallWindowProcW.USER32(?,?,?,?), ref: 004055CD
                                        • Part of subcall function 0040451F: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404531
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Window$CallMessageProcSendVisible
                                      • String ID:
                                      • API String ID: 3748168415-3916222277
                                      • Opcode ID: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                                      • Instruction ID: 8cb385540c394feb6b7acedb458c1b163c7bd0e2eecbca803c6ec6ccc0281e24
                                      • Opcode Fuzzy Hash: 1c6db2fb8bf2a941a381235c92e780c462a7a47fd759007b21bb5a8fe18e5fa5
                                      • Instruction Fuzzy Hash: 68017C71101609FBEF205F11DD84A9B3A2BEBC4754F20403BFA05761D5D73A8D929E6D
                                      APIs
                                      • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,00403B69,00403A7F,?,?,00000008,0000000A,0000000C), ref: 00403BAB
                                      • GlobalFree.KERNEL32(009C6E40), ref: 00403BB2
                                      Strings
                                      • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: Free$GlobalLibrary
                                      • String ID: C:\Users\user\AppData\Local\Temp\
                                      • API String ID: 1100898210-3081826266
                                      • Opcode ID: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                      • Instruction ID: b7081a2a86391088548fef66407111aafa244a1a89fd4905b066b82f00895e7d
                                      • Opcode Fuzzy Hash: 00efa9c9f1272b7cc7d931f24958e2d47b6ee42ce3838b547fcba19599468942
                                      • Instruction Fuzzy Hash: 59E0C23340053057CB211F45ED04B1AB778AF95B26F09807BE940BB2618BBC2C438FC8
                                      APIs
                                      • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,80000000,00000003), ref: 00405E75
                                      • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,0040310E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,C:\Users\user\Desktop\TRIAL_ORDER_CP.exe,80000000,00000003), ref: 00405E85
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: CharPrevlstrlen
                                      • String ID: C:\Users\user\Desktop
                                      • API String ID: 2709904686-224404859
                                      • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                      • Instruction ID: e625fb8110be14d05545ed3956eb9dcd351d24123ebbdb87cfc6543e98ba95a5
                                      • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                      • Instruction Fuzzy Hash: 27D05EB3400920AAC312A704DD00DAF73A8EF523447464466F881A71A5D7785D8186EC
                                      APIs
                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB9
                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FD1
                                      • CharNextA.USER32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FE2
                                      • lstrlenA.KERNEL32(00000000,?,00000000,0040628E,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEB
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.4121681308.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                      • Associated: 00000000.00000002.4121662061.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121703162.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.000000000077C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000782000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000786000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.0000000000789000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007A5000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007AB000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007B3000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4121721837.00000000007D1000.00000004.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.00000000007E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000817000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000081B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.0000000000829000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      • Associated: 00000000.00000002.4122108165.000000000082B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_400000_TRIAL_ORDER_CP.jbxd
                                      Similarity
                                      • API ID: lstrlen$CharNextlstrcmpi
                                      • String ID:
                                      • API String ID: 190613189-0
                                      • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                      • Instruction ID: 0ddac3552a90187c63c7b8d1f8650bd486a880c4da7af56fddea67c471c8745b
                                      • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                      • Instruction Fuzzy Hash: 5AF09631104515FFCB029FA5DE04D9FBBA8EF05350B2540B9F880F7250D678DE01ABA9