Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe

Overview

General Information

Sample name:D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
renamed because original name is a hash value
Original sample name:DZELTLD SZLEME-pdf.bat.exe
Analysis ID:1518274
MD5:8681ab3286a883dbfaad479b99aef9d1
SHA1:c3df94522f79f288c5178083bb3085bb61f6ce01
SHA256:3c74c62451d876da8642fc1b4f1e689b7b6d03aa74dd9baa0aefde62cd3c13b5
Tags:exeguloaderuser-malwarelabnet
Infos:

Detection

GuLoader
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3731251224.0000000004A2C000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeReversingLabs: Detection: 28%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
    Source: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_0040687E FindFirstFileW,FindClose,0_2_0040687E
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_00405C2D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C2D
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
    Source: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_004056E5 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_004056E5
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_004034FC EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034FC
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_00406C3F0_2_00406C3F
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_701C1BFF0_2_701C1BFF
    Source: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe, 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamenygifte.exe4 vs D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
    Source: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeBinary or memory string: OriginalFilenamenygifte.exe4 vs D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
    Source: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal64.troj.evad.winEXE@1/9@0/0
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_004034FC EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034FC
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_00404991 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404991
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_004021AF CoCreateInstance,0_2_004021AF
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeFile created: C:\Users\user\polaritetsJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeFile created: C:\Users\user~1\AppData\Local\Temp\nsm4210.tmpJump to behavior
    Source: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeReversingLabs: Detection: 28%
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeFile read: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.3731251224.0000000004A2C000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_701C1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_701C1BFF
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_701C30C0 push eax; ret 0_2_701C30EE
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nss458C.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeRDTSC instruction interceptor: First address: 50DF5D4 second address: 50DF5D4 instructions: 0x00000000 rdtsc 0x00000002 cmp cx, EA24h 0x00000007 cmp ebx, ecx 0x00000009 jc 00007FBE2144F33Ch 0x0000000b test ebx, 1A4ED6F3h 0x00000011 inc ebp 0x00000012 inc ebx 0x00000013 test dx, bx 0x00000016 rdtsc
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nss458C.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_0040687E FindFirstFileW,FindClose,0_2_0040687E
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_00405C2D GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405C2D
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4910
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4913
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_701C1BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_701C1BFF
    Source: C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exeCode function: 0_2_004034FC EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004034FC
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Access Token Manipulation
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe29%ReversingLabsWin32.Trojan.Guloader
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nss458C.tmp\System.dll0%ReversingLabs
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorD#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1518274
    Start date and time:2024-09-25 14:58:19 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 13s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:8
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
    renamed because original name is a hash value
    Original Sample Name:DZELTLD SZLEME-pdf.bat.exe
    Detection:MAL
    Classification:mal64.troj.evad.winEXE@1/9@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 54
    • Number of non-executed functions: 31
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nss458C.tmp\System.dllUMOWA_PD.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
      UMOWA_PD.BAT.exeGet hashmaliciousGuLoaderBrowse
        Payment_Advice.1.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
          Payment_Advice..exeGet hashmaliciousFormBook, GuLoaderBrowse
            Payment_Advice..exeGet hashmaliciousGuLoaderBrowse
              Payment_Advice.1.bat.exeGet hashmaliciousGuLoaderBrowse
                Payment_Advice..exeGet hashmaliciousGuLoaderBrowse
                  Payment_Advice..exeGet hashmaliciousGuLoaderBrowse
                    Overdoers.exeGet hashmaliciousFormBook, GuLoaderBrowse
                      Pedido_52038923_CotizacionS_max2024.bat.exeGet hashmaliciousGuLoaderBrowse
                        Process:C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:modified
                        Size (bytes):12288
                        Entropy (8bit):5.805604762622714
                        Encrypted:false
                        SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
                        MD5:4ADD245D4BA34B04F213409BFE504C07
                        SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
                        SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
                        SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        Joe Sandbox View:
                        • Filename: UMOWA_PD.BAT.exe, Detection: malicious, Browse
                        • Filename: UMOWA_PD.BAT.exe, Detection: malicious, Browse
                        • Filename: Payment_Advice.1.bat.exe, Detection: malicious, Browse
                        • Filename: Payment_Advice..exe, Detection: malicious, Browse
                        • Filename: Payment_Advice..exe, Detection: malicious, Browse
                        • Filename: Payment_Advice.1.bat.exe, Detection: malicious, Browse
                        • Filename: Payment_Advice..exe, Detection: malicious, Browse
                        • Filename: Payment_Advice..exe, Detection: malicious, Browse
                        • Filename: Overdoers.exe, Detection: malicious, Browse
                        • Filename: Pedido_52038923_CotizacionS_max2024.bat.exe, Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):350435
                        Entropy (8bit):7.65262084357849
                        Encrypted:false
                        SSDEEP:6144:mKb/u4/ufpUdDwQDQPAVFfRSWT7FvrCeeFDLLyDTn3x/oq289/8jwxQVAvq:3/u4ufpU+yQPcRSWF+xB+L3NoqlW8x9C
                        MD5:9AD9B86B31C31D272945A6FBEE0F02CC
                        SHA1:8801326C827A8136F8FBB3CFEA4A18CF724B7DB3
                        SHA-256:29E6367EA7491895A7886488D1B9728B4175EFB2A565B1A698EB5AE2E7661F5F
                        SHA-512:2F458F6498316512FA1DCDB6A7F337BE8E0E034C9C660B89323C04931D5770FDB4B85C002462287242CD8B71DF6A6DEC7786FA1764EF82D2EEEB560EE3E46514
                        Malicious:false
                        Reputation:low
                        Preview:..WW..1.ZZZZZZZ.p.%..............ffff........... .3....RR..........2...........z...........HHHHHHH....WW...+++........hh..................[[[..............{.......>.....................F.....................;;.........TT...........................|...........b...+..x....#.u..M8.e5.L.*).,..........A.....h- .]N.*.....?......./...=ild|3.4...TgtK...EQ.BY..7z;.}..p..........j%9.:qS...{...G...._F.....&....'f....h..F.....@a..ZV....b>.......HH..6.".2...........D....<..(1..OwC.......f.......:.'.....$.K@.........J..s........m.Ro\...W^...5."A..0.....5f.........+..x....#.u..M8.e5.L.*).,...2C.......6......h- .]N.*.....?......./...=ild|3.4...TgtK...EQ.,.f......%Y..7z;.}..p.j%9.:qS...{...G...._F.........w.C.&....@a..ZV....b>.......HH..6.".2...........D....<..(1..OwC..n..A...f....B......'.....$.K@.........J..s........m.Ro\...W^...5."A..0....f...f.q....+..x....#.u..M8.e5.L.*).,......f.b..A.....h- .]N.*.....?......./...=ild|3.4...TgtK...EQ.BY..7z;.}..p.......f.g
                        Process:C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):143392
                        Entropy (8bit):4.6129056498521
                        Encrypted:false
                        SSDEEP:1536:Tv6vTAGdJBwl0FwPFn1sya482iCr/F3OeQCWybIFGvMXhgdB0Rz0Ci3/DfeXc:WUgC0aB1PaCiCrxOL+yG0Xe850CkeM
                        MD5:0D2B0FFC862A504CD5D61DD8E1C254F9
                        SHA1:178BF178CAEEFCA4B824F3ACDF0C6A48362C1132
                        SHA-256:F4D66D740C59C00A53D4116541DB7D08B440D38EB993872F143360B0949ED9DC
                        SHA-512:E4177B9D2B5E11AD639F16B044A792230DED1D55B2EF98321C2FC6D7AA13B0BE139075218AF263D1FDA10944FF28F01D97FE0C56DB934F610F97336FC3B007CA
                        Malicious:false
                        Reputation:low
                        Preview:...........C..........nn.............i......5555555..........4....... ....\.......<<.....:::::...........II.....}........\\.PPPPP.....N..y......4...OO.....k.....................|..................................DD......................22222..[[[..p.v..;;;;.............q............................V.....FFFF......T.55......\\\......ll.......:.TTT.....e.'./..F...............//////......y........::......!!....GGG.........o...........................5....33333..999.............9....................gg............LLL.\\.........................k..............6..0...0..HH."......7......U.x.[.................................................p........................=....<........J...........d.I.....................C........&&&&&&....#.~.....""..............vvvvv............@..hh......................ii.........'''.'.'..ff............1....ZZZ.w.......A.............................o......t..............7.KKKK...............###....8.....ggggg....ddddd......................k.............ss........
                        Process:C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):97664
                        Entropy (8bit):1.2371741628878217
                        Encrypted:false
                        SSDEEP:768:XEFQJPKWWG5ARWTJqBshVmdboj6UJY3VBCwYw2ZDRnv+mRQN:XUE/m2O3N
                        MD5:2B4D5FD79400969869ED030F4803BE99
                        SHA1:163C23302E2DA2B2265A7CD7ED08BE16A3853DCA
                        SHA-256:49C47AAA67085C8B38D02DC0F1F792E83FA17D41CE16927888C9085F530E9DB4
                        SHA-512:7EE103CCCC54B148E7AD62F37FF4ACFC4438436C6F75D15E5248CB19643348C70F2B63062712817002CE4D173E51A7A0C8B3851FCD0FC0D6E1302838909B1C2D
                        Malicious:false
                        Reputation:low
                        Preview:...........4................................................K..............................................W.......................................N........................................................@...5..................o............................................)............................................................~....=.................................................................................2................................................5.........................!....................................f.....k....%..................................................................................H...............%.@....................................(...........$.................V..........................................................6..6...........................................................................|....\................................................_........................y...................................................................6..
                        Process:C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):244138
                        Entropy (8bit):1.252663089946015
                        Encrypted:false
                        SSDEEP:768:cv49C5wBVa5O2Fx8p7KLOTSo3NTuAG15VTvfAX+H7v+uQVsfpqSC26Pn6DD/SNsg:JBQxurv96jREO3X2r
                        MD5:BBD77A921062C9B6CBF4BEDFF50E1514
                        SHA1:C25712C5F69E016A364E8898B59E7229E3C5E7A4
                        SHA-256:E2882B3589FF6D9FA79AC2D88FC8DE8FD94BA046E8B9796203A4916C73731EAD
                        SHA-512:9BDFC20EFFD587EC19B524E36D392F4863C8242C8D4C8C7F81164A0E0DF84C5BF1633400873D0F68C40079113F9F2568706642334FCFDCCE4C6E0B1D7D5FB660
                        Malicious:false
                        Reputation:low
                        Preview:....'........................`............Z......`.................................$..................S........J.........................................................................................................................................................................-........................N....E.......................y.........................................A..........k.............................2...............................%.........................................P.........................................e........................w.....................p.........................o.......................................F........)........................................~................................................................u.....................................................<...............................}.9......................^.................c.................A..............O.........................................................................|.
                        Process:C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):438128
                        Entropy (8bit):1.2562406175237242
                        Encrypted:false
                        SSDEEP:1536:zN/79C7p5KmH/e6grFLDiN8w27kdDZK5M9aR:hyp5K4e6kFLoMV
                        MD5:E883CEF7CF2793E15A52C9BAC1CDE472
                        SHA1:1D4973110569354FA072BA3AFF0BD21EA0DF109A
                        SHA-256:2FF67336CFEEE418E565B0C79855927FC0CD0B1E9F2F40A59F1CB7EF2328635A
                        SHA-512:372BE015C3FA19C0EEAA981803900CA088B92188187A69697EEE808068F8033225BFD2927E2DB54EABEECAC05A421DC6CCCABFE19F39788B4F6D4E6F80CE04A5
                        Malicious:false
                        Reputation:low
                        Preview:......q......y........................".........................................-....................................................n#............................Jj.........................................................................w.........................$................................................................i.............j.....K...................*.........................................=.........i..........0........~............................[......./.........,........Y.................~..............................................!.......w....................t....................F.......`........................................c.......................j................................................................................................".......................................<..............{..?.J............v........................................................................................................+..................+..................
                        Process:C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):15722
                        Entropy (8bit):1.1774803541140593
                        Encrypted:false
                        SSDEEP:96:QlmaSsDp47EcNFpMw8GM4Zq+AUUnPMN61WN1:QbSc47/lv8n4Zq+AUQmy4
                        MD5:A8FD81B22FDC76D0AAE4ABF40CC1E8F4
                        SHA1:ECA25609E68636E12C3AB63D7E9F1B7717CE450A
                        SHA-256:13148F74A847C0F474385F1E62C01A5065700A472BF689D7299D3F420A7CC45D
                        SHA-512:7E0CE6444E0F402278704066AE74F442684B80959CB90CFABA6A3BBCA1EB754EEBCDE11A61FE17D8DE1F708F035BDC2C7825BF9E8F92D761CE0E78BA68544C6B
                        Malicious:false
                        Preview:.............L..........................M...................................................................{.........................H.....................................................................................................................................................................................................................................9......8.....'...............}..........................F......................A......aO..........k.....................................................................................P..................................j.......'..:..................................n..............................................~......t.....2...............................................................................{u................................'.................................#.......................................................................t.......j...............r.................................................................
                        Process:C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):38361
                        Entropy (8bit):1.2166387306020765
                        Encrypted:false
                        SSDEEP:384:X+F+sq/qAweG+1AI4KbEElQxRqKJOPOXALDW3uYBspm5NfXDZ9:X6M/l17oEnYjP
                        MD5:2BF0CAC964058C5B0D73930FC7412775
                        SHA1:003BEC59CB10BDD8B5B760C14DB899637E85AFBE
                        SHA-256:5A823D12E477927D5133F5B4DE1A5BCB0973FDBBDC4C966C821928CB439FC97A
                        SHA-512:303CF2DE6CFC652A10E543E0F6484097042234C786624F1B67668CA254B03DE2CCF4D7EB0FB6E13172F605B1B4B742D8694CF3549952523753C5DDE741975564
                        Malicious:false
                        Preview:......4......;................g....................................V..................s................................................t........................]...L.........................j...........`.....L..................?........o.............................Oq........................................................................F..............................................................V..................................................C.........../.......{................................................................?...............g.............R....4................................w(........................................c..p.................a....................mt...&..............................X........................Z.......................D.................<.......................h..........b..........X........................................................................m...................0...............F............................w.............r.......
                        Process:C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):434
                        Entropy (8bit):4.305884836882498
                        Encrypted:false
                        SSDEEP:12:mBX7vwwJDXCuNQLIU/0vkxuYAz8/p7QTrYSCmDEIHlwq+:mBXUWEzR7ylCeEUw
                        MD5:3F6632F26EBA2C111F54C97312D4C4EA
                        SHA1:8D3FB7505058C8C5CB22133C77213D6B37CDD5F9
                        SHA-256:CE8824C6205F36A17C4476BF02839F065009CD15E88970E653CE5F6A89BD9954
                        SHA-512:EED0879B222E9F074C109B2FA8548F441AD1A4C1CEF8EDB3BAE6D05308E2916061F2A2835E9252A2EDE27608435E40E8C52849B9DD8D38A5FBBEC995628D28E7
                        Malicious:false
                        Preview:kumquat equilibrious invector occludes vesteuroperen knippelfines,laparosplenotomy subagents skatkisternes sovehjertet angiospermous abastard caprate efterbyrdens exercised organisationsliniens puberties..ansvarhavendes unhumidified fordjelsesproces forureningsomraades,nondivisive famle illicitly lithophone lattins cubit rougens svmmebrillerne..untestamental transect subfestively subserviently hyldevarer.maaske pastoral overlooks,
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.957749119185549
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        File size:567'532 bytes
                        MD5:8681ab3286a883dbfaad479b99aef9d1
                        SHA1:c3df94522f79f288c5178083bb3085bb61f6ce01
                        SHA256:3c74c62451d876da8642fc1b4f1e689b7b6d03aa74dd9baa0aefde62cd3c13b5
                        SHA512:9430594953d979cab8fc58dd493c8bc248cf70051093ac4c415addcf7c2c1c1c39a4c695aa89a6dcf42cb8596302d4d8be5ebe79e317a0b910de3fee5b49e2fb
                        SSDEEP:12288:qX6kgpq5+/10ikjy6jEgMNtTJXPjQewu5xWUPJbbiEUW34/:qX68W1P6jEgMDFjmUBqEUW
                        TLSH:F2C42351F630DA6BD54A3538273B937A05EE3C715150B74A2B64BFBFBC162C0990EAC2
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...c..d.................f...".....
                        Icon Hash:9193c9a1858b8db5
                        Entrypoint:0x4034fc
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x64A0DC63 [Sun Jul 2 02:09:39 2023 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f4639a0b3116c2cfc71144b88a929cfd
                        Instruction
                        sub esp, 000003F8h
                        push ebp
                        push esi
                        push edi
                        push 00000020h
                        pop edi
                        xor ebp, ebp
                        push 00008001h
                        mov dword ptr [esp+20h], ebp
                        mov dword ptr [esp+18h], 0040A2D8h
                        mov dword ptr [esp+14h], ebp
                        call dword ptr [004080A4h]
                        mov esi, dword ptr [004080A8h]
                        lea eax, dword ptr [esp+34h]
                        push eax
                        mov dword ptr [esp+4Ch], ebp
                        mov dword ptr [esp+0000014Ch], ebp
                        mov dword ptr [esp+00000150h], ebp
                        mov dword ptr [esp+38h], 0000011Ch
                        call esi
                        test eax, eax
                        jne 00007FBE208180DAh
                        lea eax, dword ptr [esp+34h]
                        mov dword ptr [esp+34h], 00000114h
                        push eax
                        call esi
                        mov ax, word ptr [esp+48h]
                        mov ecx, dword ptr [esp+62h]
                        sub ax, 00000053h
                        add ecx, FFFFFFD0h
                        neg ax
                        sbb eax, eax
                        mov byte ptr [esp+0000014Eh], 00000004h
                        not eax
                        and eax, ecx
                        mov word ptr [esp+00000148h], ax
                        cmp dword ptr [esp+38h], 0Ah
                        jnc 00007FBE208180A8h
                        and word ptr [esp+42h], 0000h
                        mov eax, dword ptr [esp+40h]
                        movzx ecx, byte ptr [esp+3Ch]
                        mov dword ptr [00429AD8h], eax
                        xor eax, eax
                        mov ah, byte ptr [esp+38h]
                        movzx eax, ax
                        or eax, ecx
                        xor ecx, ecx
                        mov ch, byte ptr [esp+00000148h]
                        movzx ecx, cx
                        shl eax, 10h
                        or eax, ecx
                        movzx ecx, byte ptr [esp+0000004Eh]
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4c0000x3440.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x65560x6600dd25e171f2e0fe45f2800cc9e162537dFalse0.6652113970588235data6.456753840355455IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x13580x1400f0b500ff912dda10f31f36da3efc8a1eFalse0.44296875data5.102094016108248IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x1fb380x6002bc02714ee74ba781d92e94eeaccb080False0.501953125data4.040639308682379IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x2a0000x220000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x4c0000x34400x36005950a4e36f0f510396fb34e6e03b573aFalse0.5579427083333334data5.567094918094419IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x4c2f80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.7190831556503199
                        RT_ICON0x4d1a00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.7035198555956679
                        RT_ICON0x4da480x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.33963414634146344
                        RT_ICON0x4e0b00x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.6423410404624278
                        RT_ICON0x4e6180x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.39381720430107525
                        RT_ICON0x4e9000x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.5101351351351351
                        RT_DIALOG0x4ea280x100dataEnglishUnited States0.5234375
                        RT_DIALOG0x4eb280x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x4ec480xc4dataEnglishUnited States0.5918367346938775
                        RT_DIALOG0x4ed100x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x4ed700x5adataEnglishUnited States0.7111111111111111
                        RT_VERSION0x4edd00x248dataEnglishUnited States0.4811643835616438
                        RT_MANIFEST0x4f0180x423XML 1.0 document, ASCII text, with very long lines (1059), with no line terminatorsEnglishUnited States0.5127478753541076
                        DLLImport
                        ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                        SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                        ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                        COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                        USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                        GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                        KERNEL32.dlllstrcmpiA, CreateFileW, GetTempFileNameW, RemoveDirectoryW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, WriteFile, CopyFileW, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, SetEnvironmentVariableW
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:08:59:17
                        Start date:25/09/2024
                        Path:C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"
                        Imagebase:0x400000
                        File size:567'532 bytes
                        MD5 hash:8681AB3286A883DBFAAD479B99AEF9D1
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3731251224.0000000004A2C000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:19.6%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:16.3%
                          Total number of Nodes:1603
                          Total number of Limit Nodes:40
                          execution_graph 5293 402643 5294 402672 5293->5294 5295 402657 5293->5295 5297 4026a2 5294->5297 5298 402677 5294->5298 5296 402d89 21 API calls 5295->5296 5306 40265e 5296->5306 5299 402dab 21 API calls 5297->5299 5300 402dab 21 API calls 5298->5300 5301 4026a9 lstrlenW 5299->5301 5302 40267e 5300->5302 5301->5306 5310 406543 WideCharToMultiByte 5302->5310 5304 402692 lstrlenA 5304->5306 5305 4026ec 5306->5305 5308 4060f2 5 API calls 5306->5308 5309 4026d6 5306->5309 5307 4060c3 WriteFile 5307->5305 5308->5309 5309->5305 5309->5307 5310->5304 4542 401946 4543 401948 4542->4543 4544 402dab 21 API calls 4543->4544 4545 40194d 4544->4545 4548 405c2d 4545->4548 4587 405ef8 4548->4587 4551 405c55 DeleteFileW 4553 401956 4551->4553 4552 405c6c 4554 405d97 4552->4554 4601 406521 lstrcpynW 4552->4601 4554->4553 4561 40687e 2 API calls 4554->4561 4556 405c92 4557 405ca5 4556->4557 4558 405c98 lstrcatW 4556->4558 4602 405e3c lstrlenW 4557->4602 4559 405cab 4558->4559 4563 405cbb lstrcatW 4559->4563 4565 405cc6 lstrlenW FindFirstFileW 4559->4565 4562 405db1 4561->4562 4562->4553 4564 405db5 4562->4564 4563->4565 4619 405df0 lstrlenW CharPrevW 4564->4619 4566 405d8c 4565->4566 4585 405ce8 4565->4585 4566->4554 4569 405d6f FindNextFileW 4573 405d85 FindClose 4569->4573 4569->4585 4570 405be5 5 API calls 4572 405dc7 4570->4572 4574 405de1 4572->4574 4575 405dcb 4572->4575 4573->4566 4577 4055a6 28 API calls 4574->4577 4575->4553 4578 4055a6 28 API calls 4575->4578 4577->4553 4580 405dd8 4578->4580 4579 405c2d 64 API calls 4579->4585 4582 4062e1 40 API calls 4580->4582 4581 4055a6 28 API calls 4581->4569 4584 405ddf 4582->4584 4583 4055a6 28 API calls 4583->4585 4584->4553 4585->4569 4585->4579 4585->4581 4585->4583 4606 406521 lstrcpynW 4585->4606 4607 405be5 4585->4607 4615 4062e1 MoveFileExW 4585->4615 4622 406521 lstrcpynW 4587->4622 4589 405f09 4623 405e9b CharNextW CharNextW 4589->4623 4592 405c4d 4592->4551 4592->4552 4593 4067cf 5 API calls 4598 405f1f 4593->4598 4594 405f50 lstrlenW 4595 405f5b 4594->4595 4594->4598 4597 405df0 3 API calls 4595->4597 4596 40687e 2 API calls 4596->4598 4599 405f60 GetFileAttributesW 4597->4599 4598->4592 4598->4594 4598->4596 4600 405e3c 2 API calls 4598->4600 4599->4592 4600->4594 4601->4556 4603 405e4a 4602->4603 4604 405e50 CharPrevW 4603->4604 4605 405e5c 4603->4605 4604->4603 4604->4605 4605->4559 4606->4585 4629 405fec GetFileAttributesW 4607->4629 4610 405c12 4610->4585 4611 405c00 RemoveDirectoryW 4613 405c0e 4611->4613 4612 405c08 DeleteFileW 4612->4613 4613->4610 4614 405c1e SetFileAttributesW 4613->4614 4614->4610 4616 406302 4615->4616 4617 4062f5 4615->4617 4616->4585 4632 406167 4617->4632 4620 405dbb 4619->4620 4621 405e0c lstrcatW 4619->4621 4620->4570 4621->4620 4622->4589 4624 405eb8 4623->4624 4627 405eca 4623->4627 4626 405ec5 CharNextW 4624->4626 4624->4627 4625 405eee 4625->4592 4625->4593 4626->4625 4627->4625 4628 405e1d CharNextW 4627->4628 4628->4627 4630 405bf1 4629->4630 4631 405ffe SetFileAttributesW 4629->4631 4630->4610 4630->4611 4630->4612 4631->4630 4633 406197 4632->4633 4634 4061bd GetShortPathNameW 4632->4634 4659 406011 GetFileAttributesW CreateFileW 4633->4659 4636 4061d2 4634->4636 4637 4062dc 4634->4637 4636->4637 4639 4061da wsprintfA 4636->4639 4637->4616 4638 4061a1 CloseHandle GetShortPathNameW 4638->4637 4640 4061b5 4638->4640 4641 40655e 21 API calls 4639->4641 4640->4634 4640->4637 4642 406202 4641->4642 4660 406011 GetFileAttributesW CreateFileW 4642->4660 4644 40620f 4644->4637 4645 40621e GetFileSize GlobalAlloc 4644->4645 4646 406240 4645->4646 4647 4062d5 CloseHandle 4645->4647 4661 406094 ReadFile 4646->4661 4647->4637 4652 406273 4654 405f76 4 API calls 4652->4654 4653 40625f lstrcpyA 4655 406281 4653->4655 4654->4655 4656 4062b8 SetFilePointer 4655->4656 4668 4060c3 WriteFile 4656->4668 4659->4638 4660->4644 4662 4060b2 4661->4662 4662->4647 4663 405f76 lstrlenA 4662->4663 4664 405fb7 lstrlenA 4663->4664 4665 405f90 lstrcmpiA 4664->4665 4666 405fbf 4664->4666 4665->4666 4667 405fae CharNextA 4665->4667 4666->4652 4666->4653 4667->4664 4669 4060e1 GlobalFree 4668->4669 4669->4647 4670 4015c6 4671 402dab 21 API calls 4670->4671 4672 4015cd 4671->4672 4673 405e9b 4 API calls 4672->4673 4687 4015d6 4673->4687 4674 401636 4676 401668 4674->4676 4677 40163b 4674->4677 4675 405e1d CharNextW 4675->4687 4680 401423 28 API calls 4676->4680 4695 401423 4677->4695 4685 401660 4680->4685 4684 40164f SetCurrentDirectoryW 4684->4685 4686 40161c GetFileAttributesW 4686->4687 4687->4674 4687->4675 4687->4686 4689 405aec 4687->4689 4692 405a75 CreateDirectoryW 4687->4692 4699 405acf CreateDirectoryW 4687->4699 4690 406915 5 API calls 4689->4690 4691 405af3 4690->4691 4691->4687 4693 405ac5 GetLastError 4692->4693 4694 405ac1 4692->4694 4693->4694 4694->4687 4696 4055a6 28 API calls 4695->4696 4697 401431 4696->4697 4698 406521 lstrcpynW 4697->4698 4698->4684 4700 405ae3 GetLastError 4699->4700 4701 405adf 4699->4701 4700->4701 4701->4687 5311 401c48 5312 402d89 21 API calls 5311->5312 5313 401c4f 5312->5313 5314 402d89 21 API calls 5313->5314 5315 401c5c 5314->5315 5316 401c71 5315->5316 5317 402dab 21 API calls 5315->5317 5318 402dab 21 API calls 5316->5318 5323 401c81 5316->5323 5317->5316 5318->5323 5319 401cd8 5322 402dab 21 API calls 5319->5322 5320 401c8c 5321 402d89 21 API calls 5320->5321 5324 401c91 5321->5324 5325 401cdd 5322->5325 5323->5319 5323->5320 5326 402d89 21 API calls 5324->5326 5327 402dab 21 API calls 5325->5327 5328 401c9d 5326->5328 5329 401ce6 FindWindowExW 5327->5329 5330 401cc8 SendMessageW 5328->5330 5331 401caa SendMessageTimeoutW 5328->5331 5332 401d08 5329->5332 5330->5332 5331->5332 5340 4028c9 5341 4028cf 5340->5341 5342 4028d7 FindClose 5341->5342 5343 402c2f 5341->5343 5342->5343 5344 40494a 5345 404980 5344->5345 5346 40495a 5344->5346 5348 404507 8 API calls 5345->5348 5347 4044a0 22 API calls 5346->5347 5349 404967 SetDlgItemTextW 5347->5349 5350 40498c 5348->5350 5349->5345 5354 701c170d 5360 701c15b6 5354->5360 5356 701c176b GlobalFree 5357 701c1740 5357->5356 5358 701c1725 5358->5356 5358->5357 5359 701c1757 VirtualFree 5358->5359 5359->5356 5361 701c15bc 5360->5361 5362 701c15c2 5361->5362 5363 701c15ce GlobalFree 5361->5363 5362->5358 5363->5358 5364 4016d1 5365 402dab 21 API calls 5364->5365 5366 4016d7 GetFullPathNameW 5365->5366 5369 4016f1 5366->5369 5373 401713 5366->5373 5367 401728 GetShortPathNameW 5368 402c2f 5367->5368 5370 40687e 2 API calls 5369->5370 5369->5373 5371 401703 5370->5371 5371->5373 5374 406521 lstrcpynW 5371->5374 5373->5367 5373->5368 5374->5373 5375 401e53 GetDC 5376 402d89 21 API calls 5375->5376 5377 401e65 GetDeviceCaps MulDiv ReleaseDC 5376->5377 5378 402d89 21 API calls 5377->5378 5379 401e96 5378->5379 5380 40655e 21 API calls 5379->5380 5381 401ed3 CreateFontIndirectW 5380->5381 5382 40263d 5381->5382 5383 402955 5384 402dab 21 API calls 5383->5384 5385 402961 5384->5385 5386 402977 5385->5386 5387 402dab 21 API calls 5385->5387 5388 405fec 2 API calls 5386->5388 5387->5386 5389 40297d 5388->5389 5411 406011 GetFileAttributesW CreateFileW 5389->5411 5391 40298a 5392 402a40 5391->5392 5395 4029a5 GlobalAlloc 5391->5395 5396 402a28 5391->5396 5393 402a47 DeleteFileW 5392->5393 5394 402a5a 5392->5394 5393->5394 5395->5396 5397 4029be 5395->5397 5398 4032b9 39 API calls 5396->5398 5412 4034b4 SetFilePointer 5397->5412 5400 402a35 CloseHandle 5398->5400 5400->5392 5401 4029c4 5402 40349e ReadFile 5401->5402 5403 4029cd GlobalAlloc 5402->5403 5404 402a11 5403->5404 5405 4029dd 5403->5405 5407 4060c3 WriteFile 5404->5407 5406 4032b9 39 API calls 5405->5406 5410 4029ea 5406->5410 5408 402a1d GlobalFree 5407->5408 5408->5396 5409 402a08 GlobalFree 5409->5404 5410->5409 5411->5391 5412->5401 5413 4045d6 lstrcpynW lstrlenW 4825 4014d7 4826 402d89 21 API calls 4825->4826 4827 4014dd Sleep 4826->4827 4829 402c2f 4827->4829 5414 40195b 5415 402dab 21 API calls 5414->5415 5416 401962 lstrlenW 5415->5416 5417 40263d 5416->5417 5418 701c1000 5421 701c101b 5418->5421 5422 701c15b6 GlobalFree 5421->5422 5423 701c1020 5422->5423 5424 701c1024 5423->5424 5425 701c1027 GlobalAlloc 5423->5425 5426 701c15dd 3 API calls 5424->5426 5425->5424 5427 701c1019 5426->5427 5099 4020dd 5100 4020ef 5099->5100 5101 4021a1 5099->5101 5102 402dab 21 API calls 5100->5102 5103 401423 28 API calls 5101->5103 5104 4020f6 5102->5104 5110 4022fb 5103->5110 5105 402dab 21 API calls 5104->5105 5106 4020ff 5105->5106 5107 402115 LoadLibraryExW 5106->5107 5108 402107 GetModuleHandleW 5106->5108 5107->5101 5109 402126 5107->5109 5108->5107 5108->5109 5122 406984 5109->5122 5113 402170 5117 4055a6 28 API calls 5113->5117 5114 402137 5115 402156 5114->5115 5116 40213f 5114->5116 5127 701c1817 5115->5127 5119 401423 28 API calls 5116->5119 5118 402147 5117->5118 5118->5110 5120 402193 FreeLibrary 5118->5120 5119->5118 5120->5110 5169 406543 WideCharToMultiByte 5122->5169 5124 4069a1 5125 4069a8 GetProcAddress 5124->5125 5126 402131 5124->5126 5125->5126 5126->5113 5126->5114 5128 701c184a 5127->5128 5170 701c1bff 5128->5170 5130 701c1851 5131 701c1976 5130->5131 5132 701c1869 5130->5132 5133 701c1862 5130->5133 5131->5118 5204 701c2480 5132->5204 5220 701c243e 5133->5220 5138 701c18cd 5142 701c191e 5138->5142 5143 701c18d3 5138->5143 5139 701c18af 5233 701c2655 5139->5233 5140 701c187f 5145 701c1885 5140->5145 5146 701c1890 5140->5146 5141 701c1898 5153 701c188e 5141->5153 5230 701c2e23 5141->5230 5150 701c2655 10 API calls 5142->5150 5252 701c1666 5143->5252 5145->5153 5214 701c2b98 5145->5214 5224 701c2810 5146->5224 5156 701c190f 5150->5156 5151 701c18b5 5244 701c1654 5151->5244 5153->5138 5153->5139 5168 701c1965 5156->5168 5258 701c2618 5156->5258 5158 701c1896 5158->5153 5159 701c2655 10 API calls 5159->5156 5162 701c196f GlobalFree 5162->5131 5165 701c1951 5165->5168 5262 701c15dd wsprintfW 5165->5262 5166 701c194a FreeLibrary 5166->5165 5168->5131 5168->5162 5169->5124 5265 701c12bb GlobalAlloc 5170->5265 5172 701c1c26 5266 701c12bb GlobalAlloc 5172->5266 5174 701c1e6b GlobalFree GlobalFree GlobalFree 5175 701c1e88 5174->5175 5188 701c1ed2 5174->5188 5177 701c227e 5175->5177 5185 701c1e9d 5175->5185 5175->5188 5176 701c1d26 GlobalAlloc 5198 701c1c31 5176->5198 5178 701c22a0 GetModuleHandleW 5177->5178 5177->5188 5181 701c22c6 5178->5181 5182 701c22b1 LoadLibraryW 5178->5182 5179 701c1d71 lstrcpyW 5184 701c1d7b lstrcpyW 5179->5184 5180 701c1d8f GlobalFree 5180->5198 5273 701c16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5181->5273 5182->5181 5182->5188 5184->5198 5185->5188 5269 701c12cc 5185->5269 5186 701c2318 5186->5188 5190 701c2325 lstrlenW 5186->5190 5187 701c2126 5272 701c12bb GlobalAlloc 5187->5272 5188->5130 5274 701c16bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5190->5274 5192 701c2067 GlobalFree 5192->5198 5193 701c21ae 5193->5188 5201 701c2216 lstrcpyW 5193->5201 5194 701c22d8 5194->5186 5202 701c2302 GetProcAddress 5194->5202 5196 701c1dcd 5196->5198 5267 701c162f GlobalSize GlobalAlloc 5196->5267 5197 701c233f 5197->5188 5198->5174 5198->5176 5198->5179 5198->5180 5198->5184 5198->5187 5198->5188 5198->5192 5198->5193 5198->5196 5199 701c12cc 2 API calls 5198->5199 5199->5198 5201->5188 5202->5186 5203 701c212f 5203->5130 5205 701c2498 5204->5205 5207 701c25c1 GlobalFree 5205->5207 5209 701c256b GlobalAlloc 5205->5209 5210 701c2540 GlobalAlloc WideCharToMultiByte 5205->5210 5211 701c12cc GlobalAlloc lstrcpynW 5205->5211 5212 701c2582 5205->5212 5276 701c135a 5205->5276 5207->5205 5208 701c186f 5207->5208 5208->5140 5208->5141 5208->5153 5209->5212 5210->5207 5211->5205 5212->5207 5280 701c27a4 5212->5280 5216 701c2baa 5214->5216 5215 701c2c4f VirtualAlloc 5219 701c2c6d 5215->5219 5216->5215 5218 701c2d39 5218->5153 5283 701c2b42 5219->5283 5221 701c2453 5220->5221 5222 701c245e GlobalAlloc 5221->5222 5223 701c1868 5221->5223 5222->5221 5223->5132 5228 701c2840 5224->5228 5225 701c28ee 5227 701c28f4 GlobalSize 5225->5227 5229 701c28fe 5225->5229 5226 701c28db GlobalAlloc 5226->5229 5227->5229 5228->5225 5228->5226 5229->5158 5231 701c2e2e 5230->5231 5232 701c2e6e GlobalFree 5231->5232 5287 701c12bb GlobalAlloc 5233->5287 5235 701c26d8 MultiByteToWideChar 5241 701c265f 5235->5241 5236 701c26fa StringFromGUID2 5236->5241 5237 701c270b lstrcpynW 5237->5241 5238 701c271e wsprintfW 5238->5241 5239 701c2742 GlobalFree 5239->5241 5240 701c2777 GlobalFree 5240->5151 5241->5235 5241->5236 5241->5237 5241->5238 5241->5239 5241->5240 5242 701c1312 2 API calls 5241->5242 5288 701c1381 5241->5288 5242->5241 5292 701c12bb GlobalAlloc 5244->5292 5246 701c1659 5247 701c1666 2 API calls 5246->5247 5248 701c1663 5247->5248 5249 701c1312 5248->5249 5250 701c131b GlobalAlloc lstrcpynW 5249->5250 5251 701c1355 GlobalFree 5249->5251 5250->5251 5251->5156 5253 701c1672 wsprintfW 5252->5253 5256 701c169f lstrcpyW 5252->5256 5257 701c16b8 5253->5257 5256->5257 5257->5159 5259 701c1931 5258->5259 5260 701c2626 5258->5260 5259->5165 5259->5166 5260->5259 5261 701c2642 GlobalFree 5260->5261 5261->5260 5263 701c1312 2 API calls 5262->5263 5264 701c15fe 5263->5264 5264->5168 5265->5172 5266->5198 5268 701c164d 5267->5268 5268->5196 5275 701c12bb GlobalAlloc 5269->5275 5271 701c12db lstrcpynW 5271->5188 5272->5203 5273->5194 5274->5197 5275->5271 5277 701c1361 5276->5277 5278 701c12cc 2 API calls 5277->5278 5279 701c137f 5278->5279 5279->5205 5281 701c2808 5280->5281 5282 701c27b2 VirtualAlloc 5280->5282 5281->5212 5282->5281 5284 701c2b4d 5283->5284 5285 701c2b52 GetLastError 5284->5285 5286 701c2b5d 5284->5286 5285->5286 5286->5218 5287->5241 5289 701c13ac 5288->5289 5290 701c138a 5288->5290 5289->5241 5290->5289 5291 701c1390 lstrcpyW 5290->5291 5291->5289 5292->5246 5428 402b5e 5429 402bb0 5428->5429 5430 402b65 5428->5430 5431 406915 5 API calls 5429->5431 5432 402bae 5430->5432 5434 402d89 21 API calls 5430->5434 5433 402bb7 5431->5433 5435 402dab 21 API calls 5433->5435 5436 402b73 5434->5436 5438 402bc0 5435->5438 5437 402d89 21 API calls 5436->5437 5441 402b7f 5437->5441 5438->5432 5439 402bc4 IIDFromString 5438->5439 5439->5432 5440 402bd3 5439->5440 5440->5432 5446 406521 lstrcpynW 5440->5446 5445 406468 wsprintfW 5441->5445 5443 402bf0 CoTaskMemFree 5443->5432 5445->5432 5446->5443 5454 40465f 5455 404791 5454->5455 5456 404677 5454->5456 5457 4047fb 5455->5457 5460 4048c5 5455->5460 5463 4047cc GetDlgItem SendMessageW 5455->5463 5459 4044a0 22 API calls 5456->5459 5458 404805 GetDlgItem 5457->5458 5457->5460 5461 404886 5458->5461 5462 40481f 5458->5462 5464 4046de 5459->5464 5465 404507 8 API calls 5460->5465 5461->5460 5466 404898 5461->5466 5462->5461 5470 404845 SendMessageW LoadCursorW SetCursor 5462->5470 5487 4044c2 KiUserCallbackDispatcher 5463->5487 5468 4044a0 22 API calls 5464->5468 5469 4048c0 5465->5469 5471 4048ae 5466->5471 5472 40489e SendMessageW 5466->5472 5474 4046eb CheckDlgButton 5468->5474 5491 40490e 5470->5491 5471->5469 5476 4048b4 SendMessageW 5471->5476 5472->5471 5473 4047f6 5488 4048ea 5473->5488 5485 4044c2 KiUserCallbackDispatcher 5474->5485 5476->5469 5480 404709 GetDlgItem 5486 4044d5 SendMessageW 5480->5486 5482 40471f SendMessageW 5483 404745 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5482->5483 5484 40473c GetSysColor 5482->5484 5483->5469 5484->5483 5485->5480 5486->5482 5487->5473 5489 4048f8 5488->5489 5490 4048fd SendMessageW 5488->5490 5489->5490 5490->5457 5494 405b47 ShellExecuteExW 5491->5494 5493 404874 LoadCursorW SetCursor 5493->5461 5494->5493 5495 402a60 5496 402d89 21 API calls 5495->5496 5497 402a66 5496->5497 5498 402aa9 5497->5498 5499 402a8d 5497->5499 5504 402933 5497->5504 5502 402ac3 5498->5502 5503 402ab3 5498->5503 5500 402a92 5499->5500 5501 402aa3 5499->5501 5509 406521 lstrcpynW 5500->5509 5510 406468 wsprintfW 5501->5510 5506 40655e 21 API calls 5502->5506 5505 402d89 21 API calls 5503->5505 5505->5504 5506->5504 5509->5504 5510->5504 4301 401761 4307 402dab 4301->4307 4305 40176f 4306 406040 2 API calls 4305->4306 4306->4305 4308 402db7 4307->4308 4309 40655e 21 API calls 4308->4309 4311 402dd8 4309->4311 4310 401768 4313 406040 4310->4313 4311->4310 4312 4067cf 5 API calls 4311->4312 4312->4310 4314 40604d GetTickCount GetTempFileNameW 4313->4314 4315 406087 4314->4315 4316 406083 4314->4316 4315->4305 4316->4314 4316->4315 5511 701c103d 5512 701c101b 5 API calls 5511->5512 5513 701c1056 5512->5513 5514 401d62 5515 402d89 21 API calls 5514->5515 5516 401d73 SetWindowLongW 5515->5516 5517 402c2f 5516->5517 4429 401ee3 4437 402d89 4429->4437 4431 401ee9 4432 402d89 21 API calls 4431->4432 4433 401ef5 4432->4433 4434 401f01 ShowWindow 4433->4434 4435 401f0c EnableWindow 4433->4435 4436 402c2f 4434->4436 4435->4436 4438 40655e 21 API calls 4437->4438 4439 402d9e 4438->4439 4439->4431 5518 4028e3 5519 4028eb 5518->5519 5520 4028ef FindNextFileW 5519->5520 5522 402901 5519->5522 5521 402948 5520->5521 5520->5522 5524 406521 lstrcpynW 5521->5524 5524->5522 4486 4056e5 4487 405706 GetDlgItem GetDlgItem GetDlgItem 4486->4487 4488 40588f 4486->4488 4532 4044d5 SendMessageW 4487->4532 4489 4058c0 4488->4489 4490 405898 GetDlgItem CreateThread CloseHandle 4488->4490 4493 4058eb 4489->4493 4494 405910 4489->4494 4495 4058d7 ShowWindow ShowWindow 4489->4495 4490->4489 4535 405679 OleInitialize 4490->4535 4492 405776 4497 40577d GetClientRect GetSystemMetrics SendMessageW SendMessageW 4492->4497 4496 4058f7 4493->4496 4498 40594b 4493->4498 4502 404507 8 API calls 4494->4502 4534 4044d5 SendMessageW 4495->4534 4500 405925 ShowWindow 4496->4500 4501 4058ff 4496->4501 4503 4057eb 4497->4503 4504 4057cf SendMessageW SendMessageW 4497->4504 4498->4494 4505 405959 SendMessageW 4498->4505 4508 405945 4500->4508 4509 405937 4500->4509 4506 404479 SendMessageW 4501->4506 4507 40591e 4502->4507 4511 4057f0 SendMessageW 4503->4511 4512 4057fe 4503->4512 4504->4503 4505->4507 4513 405972 CreatePopupMenu 4505->4513 4506->4494 4510 404479 SendMessageW 4508->4510 4514 4055a6 28 API calls 4509->4514 4510->4498 4511->4512 4516 4044a0 22 API calls 4512->4516 4515 40655e 21 API calls 4513->4515 4514->4508 4517 405982 AppendMenuW 4515->4517 4518 40580e 4516->4518 4519 4059b2 TrackPopupMenu 4517->4519 4520 40599f GetWindowRect 4517->4520 4521 405817 ShowWindow 4518->4521 4522 40584b GetDlgItem SendMessageW 4518->4522 4519->4507 4523 4059cd 4519->4523 4520->4519 4524 40582d ShowWindow 4521->4524 4527 40583a 4521->4527 4522->4507 4525 405872 SendMessageW SendMessageW 4522->4525 4526 4059e9 SendMessageW 4523->4526 4524->4527 4525->4507 4526->4526 4528 405a06 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4526->4528 4533 4044d5 SendMessageW 4527->4533 4530 405a2b SendMessageW 4528->4530 4530->4530 4531 405a54 GlobalUnlock SetClipboardData CloseClipboard 4530->4531 4531->4507 4532->4492 4533->4522 4534->4493 4536 4044ec SendMessageW 4535->4536 4540 40569c 4536->4540 4537 4056c3 4538 4044ec SendMessageW 4537->4538 4539 4056d5 OleUninitialize 4538->4539 4540->4537 4541 401389 2 API calls 4540->4541 4541->4540 5525 404ce7 5526 404d13 5525->5526 5527 404cf7 5525->5527 5529 404d46 5526->5529 5530 404d19 SHGetPathFromIDListW 5526->5530 5536 405b65 GetDlgItemTextW 5527->5536 5532 404d29 5530->5532 5535 404d30 SendMessageW 5530->5535 5531 404d04 SendMessageW 5531->5526 5533 40140b 2 API calls 5532->5533 5533->5535 5535->5529 5536->5531 5537 401568 5538 402ba9 5537->5538 5541 406468 wsprintfW 5538->5541 5540 402bae 5541->5540 5542 40196d 5543 402d89 21 API calls 5542->5543 5544 401974 5543->5544 5545 402d89 21 API calls 5544->5545 5546 401981 5545->5546 5547 402dab 21 API calls 5546->5547 5548 401998 lstrlenW 5547->5548 5550 4019a9 5548->5550 5549 4019ea 5550->5549 5554 406521 lstrcpynW 5550->5554 5552 4019da 5552->5549 5553 4019df lstrlenW 5552->5553 5553->5549 5554->5552 5555 40166f 5556 402dab 21 API calls 5555->5556 5557 401675 5556->5557 5558 40687e 2 API calls 5557->5558 5559 40167b 5558->5559 5560 402af0 5561 402d89 21 API calls 5560->5561 5562 402af6 5561->5562 5563 40655e 21 API calls 5562->5563 5564 402933 5562->5564 5563->5564 4718 4026f1 4719 402d89 21 API calls 4718->4719 4727 402700 4719->4727 4720 40274a ReadFile 4720->4727 4731 40283d 4720->4731 4721 4027e3 4721->4727 4721->4731 4732 4060f2 SetFilePointer 4721->4732 4722 406094 ReadFile 4722->4727 4724 40278a MultiByteToWideChar 4724->4727 4725 40283f 4741 406468 wsprintfW 4725->4741 4727->4720 4727->4721 4727->4722 4727->4724 4727->4725 4728 4027b0 SetFilePointer MultiByteToWideChar 4727->4728 4729 402850 4727->4729 4727->4731 4728->4727 4730 402871 SetFilePointer 4729->4730 4729->4731 4730->4731 4733 40610e 4732->4733 4740 406126 4732->4740 4734 406094 ReadFile 4733->4734 4735 40611a 4734->4735 4736 406157 SetFilePointer 4735->4736 4737 40612f SetFilePointer 4735->4737 4735->4740 4736->4740 4737->4736 4738 40613a 4737->4738 4739 4060c3 WriteFile 4738->4739 4739->4740 4740->4721 4741->4731 4742 401774 4743 402dab 21 API calls 4742->4743 4744 40177b 4743->4744 4745 4017a3 4744->4745 4746 40179b 4744->4746 4804 406521 lstrcpynW 4745->4804 4803 406521 lstrcpynW 4746->4803 4749 4017a1 4753 4067cf 5 API calls 4749->4753 4750 4017ae 4751 405df0 3 API calls 4750->4751 4752 4017b4 lstrcatW 4751->4752 4752->4749 4772 4017c0 4753->4772 4754 4017fc 4756 405fec 2 API calls 4754->4756 4755 40687e 2 API calls 4755->4772 4756->4772 4758 4017d2 CompareFileTime 4758->4772 4759 401892 4761 4055a6 28 API calls 4759->4761 4760 401869 4762 4055a6 28 API calls 4760->4762 4770 40187e 4760->4770 4764 40189c 4761->4764 4762->4770 4763 406521 lstrcpynW 4763->4772 4782 4032b9 4764->4782 4767 4018c3 SetFileTime 4768 4018d5 CloseHandle 4767->4768 4768->4770 4771 4018e6 4768->4771 4769 40655e 21 API calls 4769->4772 4773 4018eb 4771->4773 4774 4018fe 4771->4774 4772->4754 4772->4755 4772->4758 4772->4759 4772->4760 4772->4763 4772->4769 4777 405b81 MessageBoxIndirectW 4772->4777 4781 406011 GetFileAttributesW CreateFileW 4772->4781 4775 40655e 21 API calls 4773->4775 4776 40655e 21 API calls 4774->4776 4778 4018f3 lstrcatW 4775->4778 4779 401906 4776->4779 4777->4772 4778->4779 4779->4770 4780 405b81 MessageBoxIndirectW 4779->4780 4780->4770 4781->4772 4784 4032d2 4782->4784 4783 4032fd 4805 40349e 4783->4805 4784->4783 4815 4034b4 SetFilePointer 4784->4815 4788 40331a GetTickCount 4799 40332d 4788->4799 4789 40343e 4790 403442 4789->4790 4795 40345a 4789->4795 4792 40349e ReadFile 4790->4792 4791 4018af 4791->4767 4791->4768 4792->4791 4793 40349e ReadFile 4793->4795 4794 40349e ReadFile 4794->4799 4795->4791 4795->4793 4796 4060c3 WriteFile 4795->4796 4796->4795 4798 403393 GetTickCount 4798->4799 4799->4791 4799->4794 4799->4798 4800 4033bc MulDiv wsprintfW 4799->4800 4802 4060c3 WriteFile 4799->4802 4808 406a90 4799->4808 4801 4055a6 28 API calls 4800->4801 4801->4799 4802->4799 4803->4749 4804->4750 4806 406094 ReadFile 4805->4806 4807 403308 4806->4807 4807->4788 4807->4789 4807->4791 4809 406ab5 4808->4809 4810 406abd 4808->4810 4809->4799 4810->4809 4811 406b44 GlobalFree 4810->4811 4812 406b4d GlobalAlloc 4810->4812 4813 406bc4 GlobalAlloc 4810->4813 4814 406bbb GlobalFree 4810->4814 4811->4812 4812->4809 4812->4810 4813->4809 4813->4810 4814->4813 4815->4783 5579 4014f5 SetForegroundWindow 5580 402c2f 5579->5580 5581 401a77 5582 402d89 21 API calls 5581->5582 5583 401a80 5582->5583 5584 402d89 21 API calls 5583->5584 5585 401a25 5584->5585 5586 401578 5587 401591 5586->5587 5588 401588 ShowWindow 5586->5588 5589 40159f ShowWindow 5587->5589 5590 402c2f 5587->5590 5588->5587 5589->5590 5591 4023f9 5592 402dab 21 API calls 5591->5592 5593 402408 5592->5593 5594 402dab 21 API calls 5593->5594 5595 402411 5594->5595 5596 402dab 21 API calls 5595->5596 5597 40241b GetPrivateProfileStringW 5596->5597 5598 401ffb 5599 402dab 21 API calls 5598->5599 5600 402002 5599->5600 5601 40687e 2 API calls 5600->5601 5602 402008 5601->5602 5604 402019 5602->5604 5605 406468 wsprintfW 5602->5605 5605->5604 4865 4034fc SetErrorMode GetVersionExW 4866 403550 GetVersionExW 4865->4866 4867 403588 4865->4867 4866->4867 4868 4035df 4867->4868 4869 406915 5 API calls 4867->4869 4870 4068a5 3 API calls 4868->4870 4869->4868 4871 4035f5 lstrlenA 4870->4871 4871->4868 4872 403605 4871->4872 4873 406915 5 API calls 4872->4873 4874 40360c 4873->4874 4875 406915 5 API calls 4874->4875 4876 403613 4875->4876 4877 406915 5 API calls 4876->4877 4878 40361f #17 OleInitialize SHGetFileInfoW 4877->4878 4953 406521 lstrcpynW 4878->4953 4881 40366e GetCommandLineW 4954 406521 lstrcpynW 4881->4954 4883 403680 4884 405e1d CharNextW 4883->4884 4885 4036a6 CharNextW 4884->4885 4890 4036b8 4885->4890 4886 4037ba 4887 4037ce GetTempPathW 4886->4887 4955 4034cb 4887->4955 4889 4037e6 4891 403840 DeleteFileW 4889->4891 4892 4037ea GetWindowsDirectoryW lstrcatW 4889->4892 4890->4886 4893 405e1d CharNextW 4890->4893 4899 4037bc 4890->4899 4965 403082 GetTickCount GetModuleFileNameW 4891->4965 4894 4034cb 12 API calls 4892->4894 4893->4890 4896 403806 4894->4896 4896->4891 4898 40380a GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4896->4898 4897 403854 4903 405e1d CharNextW 4897->4903 4935 4038fb 4897->4935 4945 40390b 4897->4945 4901 4034cb 12 API calls 4898->4901 5049 406521 lstrcpynW 4899->5049 4905 403838 4901->4905 4918 403873 4903->4918 4905->4891 4905->4945 4907 403a59 4909 405b81 MessageBoxIndirectW 4907->4909 4908 403a7d 4910 403b01 ExitProcess 4908->4910 4911 403a85 GetCurrentProcess OpenProcessToken 4908->4911 4913 403a67 ExitProcess 4909->4913 4914 403ad1 4911->4914 4915 403a9d LookupPrivilegeValueW AdjustTokenPrivileges 4911->4915 4920 406915 5 API calls 4914->4920 4915->4914 4916 4038d1 4921 405ef8 18 API calls 4916->4921 4917 403914 4919 405aec 5 API calls 4917->4919 4918->4916 4918->4917 4922 403919 lstrlenW 4919->4922 4930 403ad8 4920->4930 4923 4038dd 4921->4923 5052 406521 lstrcpynW 4922->5052 4923->4945 5050 406521 lstrcpynW 4923->5050 4925 403aed ExitWindowsEx 4925->4910 4927 403afa 4925->4927 4926 403933 4929 40394b 4926->4929 5053 406521 lstrcpynW 4926->5053 4931 40140b 2 API calls 4927->4931 4936 403971 wsprintfW 4929->4936 4950 40399d 4929->4950 4930->4925 4930->4927 4931->4910 4932 4038f0 5051 406521 lstrcpynW 4932->5051 4993 403bf3 4935->4993 4937 40655e 21 API calls 4936->4937 4937->4929 4938 405a75 2 API calls 4938->4950 4939 405acf 2 API calls 4939->4950 4940 4039e7 SetCurrentDirectoryW 4943 4062e1 40 API calls 4940->4943 4941 4039ad GetFileAttributesW 4942 4039b9 DeleteFileW 4941->4942 4941->4950 4942->4950 4944 4039f6 CopyFileW 4943->4944 4944->4945 4944->4950 5057 403b19 4945->5057 4946 405c2d 71 API calls 4946->4950 4947 4062e1 40 API calls 4947->4950 4948 40655e 21 API calls 4948->4950 4950->4929 4950->4936 4950->4938 4950->4939 4950->4940 4950->4941 4950->4945 4950->4946 4950->4947 4950->4948 4951 403a6f CloseHandle 4950->4951 4952 40687e 2 API calls 4950->4952 5054 405b04 CreateProcessW 4950->5054 4951->4945 4952->4950 4953->4881 4954->4883 4956 4067cf 5 API calls 4955->4956 4958 4034d7 4956->4958 4957 4034e1 4957->4889 4958->4957 4959 405df0 3 API calls 4958->4959 4960 4034e9 4959->4960 4961 405acf 2 API calls 4960->4961 4962 4034ef 4961->4962 4963 406040 2 API calls 4962->4963 4964 4034fa 4963->4964 4964->4889 5064 406011 GetFileAttributesW CreateFileW 4965->5064 4967 4030c2 4987 4030d2 4967->4987 5065 406521 lstrcpynW 4967->5065 4969 4030e8 4970 405e3c 2 API calls 4969->4970 4971 4030ee 4970->4971 5066 406521 lstrcpynW 4971->5066 4973 4030f9 GetFileSize 4974 403110 4973->4974 4990 4031f3 4973->4990 4977 40349e ReadFile 4974->4977 4980 40325f 4974->4980 4974->4987 4988 40301e 6 API calls 4974->4988 4974->4990 4976 4031fc 4978 40322c GlobalAlloc 4976->4978 4976->4987 5079 4034b4 SetFilePointer 4976->5079 4977->4974 5078 4034b4 SetFilePointer 4978->5078 4984 40301e 6 API calls 4980->4984 4982 403215 4985 40349e ReadFile 4982->4985 4983 403247 4986 4032b9 39 API calls 4983->4986 4984->4987 4989 403220 4985->4989 4991 403253 4986->4991 4987->4897 4988->4974 4989->4978 4989->4987 5067 40301e 4990->5067 4991->4987 4991->4991 4992 403290 SetFilePointer 4991->4992 4992->4987 4994 406915 5 API calls 4993->4994 4995 403c07 4994->4995 4996 403c0d 4995->4996 4997 403c1f 4995->4997 5092 406468 wsprintfW 4996->5092 4998 4063ef 3 API calls 4997->4998 4999 403c4f 4998->4999 5000 403c6e lstrcatW 4999->5000 5002 4063ef 3 API calls 4999->5002 5003 403c1d 5000->5003 5002->5000 5084 403ec9 5003->5084 5006 405ef8 18 API calls 5007 403ca0 5006->5007 5008 403d34 5007->5008 5010 4063ef 3 API calls 5007->5010 5009 405ef8 18 API calls 5008->5009 5011 403d3a 5009->5011 5013 403cd2 5010->5013 5012 403d4a LoadImageW 5011->5012 5014 40655e 21 API calls 5011->5014 5015 403df0 5012->5015 5016 403d71 RegisterClassW 5012->5016 5013->5008 5017 403cf3 lstrlenW 5013->5017 5021 405e1d CharNextW 5013->5021 5014->5012 5020 40140b 2 API calls 5015->5020 5018 403da7 SystemParametersInfoW CreateWindowExW 5016->5018 5019 403dfa 5016->5019 5022 403d01 lstrcmpiW 5017->5022 5023 403d27 5017->5023 5018->5015 5019->4945 5024 403df6 5020->5024 5025 403cf0 5021->5025 5022->5023 5026 403d11 GetFileAttributesW 5022->5026 5027 405df0 3 API calls 5023->5027 5024->5019 5029 403ec9 22 API calls 5024->5029 5025->5017 5028 403d1d 5026->5028 5030 403d2d 5027->5030 5028->5023 5031 405e3c 2 API calls 5028->5031 5032 403e07 5029->5032 5093 406521 lstrcpynW 5030->5093 5031->5023 5034 403e13 ShowWindow 5032->5034 5035 403e96 5032->5035 5037 4068a5 3 API calls 5034->5037 5036 405679 5 API calls 5035->5036 5038 403e9c 5036->5038 5039 403e2b 5037->5039 5040 403ea0 5038->5040 5041 403eb8 5038->5041 5042 403e39 GetClassInfoW 5039->5042 5044 4068a5 3 API calls 5039->5044 5040->5019 5048 40140b 2 API calls 5040->5048 5043 40140b 2 API calls 5041->5043 5045 403e63 DialogBoxParamW 5042->5045 5046 403e4d GetClassInfoW RegisterClassW 5042->5046 5043->5019 5044->5042 5047 40140b 2 API calls 5045->5047 5046->5045 5047->5019 5048->5019 5049->4887 5050->4932 5051->4935 5052->4926 5053->4929 5055 405b43 5054->5055 5056 405b37 CloseHandle 5054->5056 5055->4950 5056->5055 5058 403b31 5057->5058 5059 403b23 CloseHandle 5057->5059 5095 403b5e 5058->5095 5059->5058 5062 405c2d 71 API calls 5063 403a4c OleUninitialize 5062->5063 5063->4907 5063->4908 5064->4967 5065->4969 5066->4973 5068 403027 5067->5068 5069 40303f 5067->5069 5070 403030 DestroyWindow 5068->5070 5071 403037 5068->5071 5072 403047 5069->5072 5073 40304f GetTickCount 5069->5073 5070->5071 5071->4976 5080 406951 5072->5080 5075 403080 5073->5075 5076 40305d CreateDialogParamW ShowWindow 5073->5076 5075->4976 5076->5075 5078->4983 5079->4982 5081 40696e PeekMessageW 5080->5081 5082 406964 DispatchMessageW 5081->5082 5083 40304d 5081->5083 5082->5081 5083->4976 5085 403edd 5084->5085 5094 406468 wsprintfW 5085->5094 5087 403f4e 5088 403f82 22 API calls 5087->5088 5090 403f53 5088->5090 5089 403c7e 5089->5006 5090->5089 5091 40655e 21 API calls 5090->5091 5091->5090 5092->5003 5093->5008 5094->5087 5096 403b6c 5095->5096 5097 403b36 5096->5097 5098 403b71 FreeLibrary GlobalFree 5096->5098 5097->5062 5098->5097 5098->5098 5606 401b7c 5607 402dab 21 API calls 5606->5607 5608 401b83 5607->5608 5609 402d89 21 API calls 5608->5609 5610 401b8c wsprintfW 5609->5610 5611 402c2f 5610->5611 5619 401000 5620 401037 BeginPaint GetClientRect 5619->5620 5621 40100c DefWindowProcW 5619->5621 5623 4010f3 5620->5623 5624 401179 5621->5624 5625 401073 CreateBrushIndirect FillRect DeleteObject 5623->5625 5626 4010fc 5623->5626 5625->5623 5627 401102 CreateFontIndirectW 5626->5627 5628 401167 EndPaint 5626->5628 5627->5628 5629 401112 6 API calls 5627->5629 5628->5624 5629->5628 5630 401680 5631 402dab 21 API calls 5630->5631 5632 401687 5631->5632 5633 402dab 21 API calls 5632->5633 5634 401690 5633->5634 5635 402dab 21 API calls 5634->5635 5636 401699 MoveFileW 5635->5636 5637 4016ac 5636->5637 5643 4016a5 5636->5643 5639 40687e 2 API calls 5637->5639 5641 4022fb 5637->5641 5638 401423 28 API calls 5638->5641 5640 4016bb 5639->5640 5640->5641 5642 4062e1 40 API calls 5640->5642 5642->5643 5643->5638 5644 401503 5645 401508 5644->5645 5647 401520 5644->5647 5646 402d89 21 API calls 5645->5646 5646->5647 4457 402304 4458 402dab 21 API calls 4457->4458 4459 40230a 4458->4459 4460 402dab 21 API calls 4459->4460 4461 402313 4460->4461 4462 402dab 21 API calls 4461->4462 4463 40231c 4462->4463 4472 40687e FindFirstFileW 4463->4472 4466 402336 lstrlenW lstrlenW 4468 4055a6 28 API calls 4466->4468 4469 402374 SHFileOperationW 4468->4469 4470 402329 4469->4470 4471 402331 4469->4471 4470->4471 4475 4055a6 4470->4475 4473 406894 FindClose 4472->4473 4474 402325 4472->4474 4473->4474 4474->4466 4474->4470 4476 405663 4475->4476 4477 4055c1 4475->4477 4476->4471 4478 4055dd lstrlenW 4477->4478 4481 40655e 21 API calls 4477->4481 4479 405606 4478->4479 4480 4055eb lstrlenW 4478->4480 4483 405619 4479->4483 4484 40560c SetWindowTextW 4479->4484 4480->4476 4482 4055fd lstrcatW 4480->4482 4481->4478 4482->4479 4483->4476 4485 40561f SendMessageW SendMessageW SendMessageW 4483->4485 4484->4483 4485->4476 5648 701c1058 5650 701c1074 5648->5650 5649 701c10dd 5650->5649 5651 701c15b6 GlobalFree 5650->5651 5652 701c1092 5650->5652 5651->5652 5653 701c15b6 GlobalFree 5652->5653 5654 701c10a2 5653->5654 5655 701c10a9 GlobalSize 5654->5655 5656 701c10b2 5654->5656 5655->5656 5657 701c10c7 5656->5657 5658 701c10b6 GlobalAlloc 5656->5658 5660 701c10d2 GlobalFree 5657->5660 5659 701c15dd 3 API calls 5658->5659 5659->5657 5660->5649 5661 401a04 5662 402dab 21 API calls 5661->5662 5663 401a0b 5662->5663 5664 402dab 21 API calls 5663->5664 5665 401a14 5664->5665 5666 401a1b lstrcmpiW 5665->5666 5667 401a2d lstrcmpW 5665->5667 5668 401a21 5666->5668 5667->5668 5669 401d86 5670 401d99 GetDlgItem 5669->5670 5671 401d8c 5669->5671 5673 401d93 5670->5673 5672 402d89 21 API calls 5671->5672 5672->5673 5674 401dda GetClientRect LoadImageW SendMessageW 5673->5674 5675 402dab 21 API calls 5673->5675 5677 401e38 5674->5677 5679 401e44 5674->5679 5675->5674 5678 401e3d DeleteObject 5677->5678 5677->5679 5678->5679 5680 402388 5681 40238f 5680->5681 5684 4023a2 5680->5684 5682 40655e 21 API calls 5681->5682 5683 40239c 5682->5683 5683->5684 5685 405b81 MessageBoxIndirectW 5683->5685 5685->5684 5686 402c0a SendMessageW 5687 402c24 InvalidateRect 5686->5687 5688 402c2f 5686->5688 5687->5688 5696 404f0d GetDlgItem GetDlgItem 5697 404f5f 7 API calls 5696->5697 5706 405184 5696->5706 5698 405006 DeleteObject 5697->5698 5699 404ff9 SendMessageW 5697->5699 5700 40500f 5698->5700 5699->5698 5701 405046 5700->5701 5705 40655e 21 API calls 5700->5705 5703 4044a0 22 API calls 5701->5703 5702 405266 5704 405312 5702->5704 5709 405177 5702->5709 5715 4052bf SendMessageW 5702->5715 5708 40505a 5703->5708 5710 405324 5704->5710 5711 40531c SendMessageW 5704->5711 5707 405028 SendMessageW SendMessageW 5705->5707 5706->5702 5730 4051f3 5706->5730 5750 404e5b SendMessageW 5706->5750 5707->5700 5714 4044a0 22 API calls 5708->5714 5712 404507 8 API calls 5709->5712 5718 405336 ImageList_Destroy 5710->5718 5719 40533d 5710->5719 5726 40534d 5710->5726 5711->5710 5717 405513 5712->5717 5731 40506b 5714->5731 5715->5709 5721 4052d4 SendMessageW 5715->5721 5716 405258 SendMessageW 5716->5702 5718->5719 5722 405346 GlobalFree 5719->5722 5719->5726 5720 4054c7 5720->5709 5727 4054d9 ShowWindow GetDlgItem ShowWindow 5720->5727 5724 4052e7 5721->5724 5722->5726 5723 405146 GetWindowLongW SetWindowLongW 5725 40515f 5723->5725 5735 4052f8 SendMessageW 5724->5735 5728 405164 ShowWindow 5725->5728 5729 40517c 5725->5729 5726->5720 5741 405388 5726->5741 5755 404edb 5726->5755 5727->5709 5748 4044d5 SendMessageW 5728->5748 5749 4044d5 SendMessageW 5729->5749 5730->5702 5730->5716 5731->5723 5734 4050be SendMessageW 5731->5734 5736 405141 5731->5736 5737 405110 SendMessageW 5731->5737 5738 4050fc SendMessageW 5731->5738 5734->5731 5735->5704 5736->5723 5736->5725 5737->5731 5738->5731 5740 405492 5742 40549d InvalidateRect 5740->5742 5744 4054a9 5740->5744 5743 4053b6 SendMessageW 5741->5743 5746 4053cc 5741->5746 5742->5744 5743->5746 5744->5720 5764 404e16 5744->5764 5745 405440 SendMessageW SendMessageW 5745->5746 5746->5740 5746->5745 5748->5709 5749->5706 5751 404eba SendMessageW 5750->5751 5752 404e7e GetMessagePos ScreenToClient SendMessageW 5750->5752 5753 404eb2 5751->5753 5752->5753 5754 404eb7 5752->5754 5753->5730 5754->5751 5767 406521 lstrcpynW 5755->5767 5757 404eee 5768 406468 wsprintfW 5757->5768 5759 404ef8 5760 40140b 2 API calls 5759->5760 5761 404f01 5760->5761 5769 406521 lstrcpynW 5761->5769 5763 404f08 5763->5741 5770 404d4d 5764->5770 5766 404e2b 5766->5720 5767->5757 5768->5759 5769->5763 5771 404d66 5770->5771 5772 40655e 21 API calls 5771->5772 5773 404dca 5772->5773 5774 40655e 21 API calls 5773->5774 5775 404dd5 5774->5775 5776 40655e 21 API calls 5775->5776 5777 404deb lstrlenW wsprintfW SetDlgItemTextW 5776->5777 5777->5766 5778 40248f 5779 402dab 21 API calls 5778->5779 5780 4024a1 5779->5780 5781 402dab 21 API calls 5780->5781 5782 4024ab 5781->5782 5795 402e3b 5782->5795 5784 402c2f 5786 4024e3 5788 4024ef 5786->5788 5790 402d89 21 API calls 5786->5790 5787 402dab 21 API calls 5789 4024d9 lstrlenW 5787->5789 5791 40250e RegSetValueExW 5788->5791 5792 4032b9 39 API calls 5788->5792 5789->5786 5790->5788 5793 402524 RegCloseKey 5791->5793 5792->5791 5793->5784 5796 402e56 5795->5796 5799 4063bc 5796->5799 5800 4063cb 5799->5800 5801 4024bb 5800->5801 5802 4063d6 RegCreateKeyExW 5800->5802 5801->5784 5801->5786 5801->5787 5802->5801 5803 404610 lstrlenW 5804 404631 WideCharToMultiByte 5803->5804 5805 40462f 5803->5805 5805->5804 5806 402910 5807 402dab 21 API calls 5806->5807 5808 402917 FindFirstFileW 5807->5808 5809 40293f 5808->5809 5813 40292a 5808->5813 5811 402948 5809->5811 5814 406468 wsprintfW 5809->5814 5815 406521 lstrcpynW 5811->5815 5814->5811 5815->5813 5816 401911 5817 401948 5816->5817 5818 402dab 21 API calls 5817->5818 5819 40194d 5818->5819 5820 405c2d 71 API calls 5819->5820 5821 401956 5820->5821 5822 401491 5823 4055a6 28 API calls 5822->5823 5824 401498 5823->5824 5825 404991 5826 4049bd 5825->5826 5827 4049ce 5825->5827 5886 405b65 GetDlgItemTextW 5826->5886 5828 4049da GetDlgItem 5827->5828 5836 404a39 5827->5836 5830 4049ee 5828->5830 5834 404a02 SetWindowTextW 5830->5834 5839 405e9b 4 API calls 5830->5839 5831 404b1d 5835 404ccc 5831->5835 5888 405b65 GetDlgItemTextW 5831->5888 5832 4049c8 5833 4067cf 5 API calls 5832->5833 5833->5827 5840 4044a0 22 API calls 5834->5840 5838 404507 8 API calls 5835->5838 5836->5831 5836->5835 5841 40655e 21 API calls 5836->5841 5843 404ce0 5838->5843 5844 4049f8 5839->5844 5845 404a1e 5840->5845 5846 404aad SHBrowseForFolderW 5841->5846 5842 404b4d 5847 405ef8 18 API calls 5842->5847 5844->5834 5851 405df0 3 API calls 5844->5851 5848 4044a0 22 API calls 5845->5848 5846->5831 5849 404ac5 CoTaskMemFree 5846->5849 5850 404b53 5847->5850 5852 404a2c 5848->5852 5853 405df0 3 API calls 5849->5853 5889 406521 lstrcpynW 5850->5889 5851->5834 5887 4044d5 SendMessageW 5852->5887 5855 404ad2 5853->5855 5858 404b09 SetDlgItemTextW 5855->5858 5862 40655e 21 API calls 5855->5862 5857 404a32 5861 406915 5 API calls 5857->5861 5858->5831 5859 404b6a 5860 406915 5 API calls 5859->5860 5868 404b71 5860->5868 5861->5836 5863 404af1 lstrcmpiW 5862->5863 5863->5858 5865 404b02 lstrcatW 5863->5865 5864 404bb2 5890 406521 lstrcpynW 5864->5890 5865->5858 5867 404bb9 5869 405e9b 4 API calls 5867->5869 5868->5864 5873 405e3c 2 API calls 5868->5873 5874 404c0a 5868->5874 5870 404bbf GetDiskFreeSpaceW 5869->5870 5872 404be3 MulDiv 5870->5872 5870->5874 5872->5874 5873->5868 5875 404c7b 5874->5875 5877 404e16 24 API calls 5874->5877 5876 404c9e 5875->5876 5878 40140b 2 API calls 5875->5878 5891 4044c2 KiUserCallbackDispatcher 5876->5891 5879 404c68 5877->5879 5878->5876 5880 404c7d SetDlgItemTextW 5879->5880 5881 404c6d 5879->5881 5880->5875 5883 404d4d 24 API calls 5881->5883 5883->5875 5884 404cba 5884->5835 5885 4048ea SendMessageW 5884->5885 5885->5835 5886->5832 5887->5857 5888->5842 5889->5859 5890->5867 5891->5884 5892 401914 5893 402dab 21 API calls 5892->5893 5894 40191b 5893->5894 5895 405b81 MessageBoxIndirectW 5894->5895 5896 401924 5895->5896 4816 402896 4817 40289d 4816->4817 4819 402bae 4816->4819 4818 402d89 21 API calls 4817->4818 4820 4028a4 4818->4820 4821 4028b3 SetFilePointer 4820->4821 4821->4819 4822 4028c3 4821->4822 4824 406468 wsprintfW 4822->4824 4824->4819 5897 401f17 5898 402dab 21 API calls 5897->5898 5899 401f1d 5898->5899 5900 402dab 21 API calls 5899->5900 5901 401f26 5900->5901 5902 402dab 21 API calls 5901->5902 5903 401f2f 5902->5903 5904 402dab 21 API calls 5903->5904 5905 401f38 5904->5905 5906 401423 28 API calls 5905->5906 5907 401f3f 5906->5907 5914 405b47 ShellExecuteExW 5907->5914 5909 401f87 5911 402933 5909->5911 5915 4069c0 WaitForSingleObject 5909->5915 5912 401fa4 CloseHandle 5912->5911 5914->5909 5916 4069da 5915->5916 5917 4069ec GetExitCodeProcess 5916->5917 5918 406951 2 API calls 5916->5918 5917->5912 5919 4069e1 WaitForSingleObject 5918->5919 5919->5916 5920 402f98 5921 402fc3 5920->5921 5922 402faa SetTimer 5920->5922 5923 403018 5921->5923 5924 402fdd MulDiv wsprintfW SetWindowTextW SetDlgItemTextW 5921->5924 5922->5921 5924->5923 5925 40551a 5926 40552a 5925->5926 5927 40553e 5925->5927 5928 405530 5926->5928 5929 405587 5926->5929 5930 405546 IsWindowVisible 5927->5930 5936 40555d 5927->5936 5932 4044ec SendMessageW 5928->5932 5931 40558c CallWindowProcW 5929->5931 5930->5929 5933 405553 5930->5933 5934 40553a 5931->5934 5932->5934 5935 404e5b 5 API calls 5933->5935 5935->5936 5936->5931 5937 404edb 4 API calls 5936->5937 5937->5929 5938 401d1c 5939 402d89 21 API calls 5938->5939 5940 401d22 IsWindow 5939->5940 5941 401a25 5940->5941 5942 40149e 5943 4023a2 5942->5943 5944 4014ac PostQuitMessage 5942->5944 5944->5943 5945 701c2d43 5946 701c2d5b 5945->5946 5947 701c162f 2 API calls 5946->5947 5948 701c2d76 5947->5948 4223 401ba0 4224 401bf1 4223->4224 4225 401bad 4223->4225 4227 401bf6 4224->4227 4228 401c1b GlobalAlloc 4224->4228 4226 401c36 4225->4226 4232 401bc4 4225->4232 4230 40655e 21 API calls 4226->4230 4236 4023a2 4226->4236 4227->4236 4261 406521 lstrcpynW 4227->4261 4242 40655e 4228->4242 4231 40239c 4230->4231 4231->4236 4262 405b81 4231->4262 4259 406521 lstrcpynW 4232->4259 4235 401c08 GlobalFree 4235->4236 4237 401bd3 4260 406521 lstrcpynW 4237->4260 4240 401be2 4266 406521 lstrcpynW 4240->4266 4257 406569 4242->4257 4243 4067b0 4244 4067c9 4243->4244 4289 406521 lstrcpynW 4243->4289 4244->4226 4246 406781 lstrlenW 4246->4257 4250 40667a GetSystemDirectoryW 4250->4257 4251 40655e 15 API calls 4251->4246 4252 406690 GetWindowsDirectoryW 4252->4257 4253 40655e 15 API calls 4253->4257 4254 406722 lstrcatW 4254->4257 4257->4243 4257->4246 4257->4250 4257->4251 4257->4252 4257->4253 4257->4254 4258 4066f2 SHGetPathFromIDListW CoTaskMemFree 4257->4258 4267 4063ef 4257->4267 4272 406915 GetModuleHandleA 4257->4272 4278 4067cf 4257->4278 4287 406468 wsprintfW 4257->4287 4288 406521 lstrcpynW 4257->4288 4258->4257 4259->4237 4260->4240 4261->4235 4263 405b96 4262->4263 4264 405be2 4263->4264 4265 405baa MessageBoxIndirectW 4263->4265 4264->4236 4265->4264 4266->4236 4290 40638e 4267->4290 4270 406423 RegQueryValueExW RegCloseKey 4271 406453 4270->4271 4271->4257 4273 406931 4272->4273 4274 40693b GetProcAddress 4272->4274 4294 4068a5 GetSystemDirectoryW 4273->4294 4276 40694a 4274->4276 4276->4257 4277 406937 4277->4274 4277->4276 4279 4067dc 4278->4279 4281 406845 CharNextW 4279->4281 4282 406852 4279->4282 4285 406831 CharNextW 4279->4285 4286 406840 CharNextW 4279->4286 4297 405e1d 4279->4297 4280 406857 CharPrevW 4280->4282 4281->4279 4281->4282 4282->4280 4283 406878 4282->4283 4283->4257 4285->4279 4286->4281 4287->4257 4288->4257 4289->4244 4291 40639d 4290->4291 4292 4063a6 RegOpenKeyExW 4291->4292 4293 4063a1 4291->4293 4292->4293 4293->4270 4293->4271 4295 4068c7 wsprintfW LoadLibraryExW 4294->4295 4295->4277 4298 405e23 4297->4298 4299 405e39 4298->4299 4300 405e2a CharNextW 4298->4300 4299->4279 4300->4298 4317 403fa1 4318 403fb9 4317->4318 4319 40411a 4317->4319 4318->4319 4320 403fc5 4318->4320 4321 40416b 4319->4321 4322 40412b GetDlgItem GetDlgItem 4319->4322 4324 403fd0 SetWindowPos 4320->4324 4325 403fe3 4320->4325 4323 4041c5 4321->4323 4331 401389 2 API calls 4321->4331 4326 4044a0 22 API calls 4322->4326 4344 404115 4323->4344 4390 4044ec 4323->4390 4324->4325 4328 403fec ShowWindow 4325->4328 4329 40402e 4325->4329 4330 404155 SetClassLongW 4326->4330 4332 404107 4328->4332 4333 40400c GetWindowLongW 4328->4333 4334 404036 DestroyWindow 4329->4334 4335 40404d 4329->4335 4336 40140b 2 API calls 4330->4336 4339 40419d 4331->4339 4412 404507 4332->4412 4333->4332 4341 404025 ShowWindow 4333->4341 4389 404429 4334->4389 4337 404052 SetWindowLongW 4335->4337 4338 404063 4335->4338 4336->4321 4337->4344 4338->4332 4342 40406f GetDlgItem 4338->4342 4339->4323 4343 4041a1 SendMessageW 4339->4343 4341->4329 4347 404080 SendMessageW IsWindowEnabled 4342->4347 4348 40409d 4342->4348 4343->4344 4345 40140b 2 API calls 4356 4041d7 4345->4356 4346 40442b DestroyWindow EndDialog 4346->4389 4347->4344 4347->4348 4351 4040aa 4348->4351 4353 4040f1 SendMessageW 4348->4353 4354 4040bd 4348->4354 4363 4040a2 4348->4363 4349 40445a ShowWindow 4349->4344 4350 40655e 21 API calls 4350->4356 4351->4353 4351->4363 4353->4332 4357 4040c5 4354->4357 4358 4040da 4354->4358 4355 4040d8 4355->4332 4356->4344 4356->4345 4356->4346 4356->4350 4359 4044a0 22 API calls 4356->4359 4380 40436b DestroyWindow 4356->4380 4393 4044a0 4356->4393 4406 40140b 4357->4406 4360 40140b 2 API calls 4358->4360 4359->4356 4362 4040e1 4360->4362 4362->4332 4362->4363 4409 404479 4363->4409 4365 404252 GetDlgItem 4366 404267 4365->4366 4367 40426f ShowWindow KiUserCallbackDispatcher 4365->4367 4366->4367 4396 4044c2 KiUserCallbackDispatcher 4367->4396 4369 404299 EnableWindow 4374 4042ad 4369->4374 4370 4042b2 GetSystemMenu EnableMenuItem SendMessageW 4371 4042e2 SendMessageW 4370->4371 4370->4374 4371->4374 4374->4370 4397 4044d5 SendMessageW 4374->4397 4398 403f82 4374->4398 4401 406521 lstrcpynW 4374->4401 4376 404311 lstrlenW 4377 40655e 21 API calls 4376->4377 4378 404327 SetWindowTextW 4377->4378 4402 401389 4378->4402 4381 404385 CreateDialogParamW 4380->4381 4380->4389 4382 4043b8 4381->4382 4381->4389 4383 4044a0 22 API calls 4382->4383 4384 4043c3 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4383->4384 4385 401389 2 API calls 4384->4385 4386 404409 4385->4386 4386->4344 4387 404411 ShowWindow 4386->4387 4388 4044ec SendMessageW 4387->4388 4388->4389 4389->4344 4389->4349 4391 404504 4390->4391 4392 4044f5 SendMessageW 4390->4392 4391->4356 4392->4391 4394 40655e 21 API calls 4393->4394 4395 4044ab SetDlgItemTextW 4394->4395 4395->4365 4396->4369 4397->4374 4399 40655e 21 API calls 4398->4399 4400 403f90 SetWindowTextW 4399->4400 4400->4374 4401->4376 4404 401390 4402->4404 4403 4013fe 4403->4356 4404->4403 4405 4013cb MulDiv SendMessageW 4404->4405 4405->4404 4407 401389 2 API calls 4406->4407 4408 401420 4407->4408 4408->4363 4410 404480 4409->4410 4411 404486 SendMessageW 4409->4411 4410->4411 4411->4355 4413 40451f GetWindowLongW 4412->4413 4414 4045ca 4412->4414 4413->4414 4415 404534 4413->4415 4414->4344 4415->4414 4416 404561 GetSysColor 4415->4416 4417 404564 4415->4417 4416->4417 4418 404574 SetBkMode 4417->4418 4419 40456a SetTextColor 4417->4419 4420 404592 4418->4420 4421 40458c GetSysColor 4418->4421 4419->4418 4422 4045a3 4420->4422 4423 404599 SetBkColor 4420->4423 4421->4420 4422->4414 4424 4045b6 DeleteObject 4422->4424 4425 4045bd CreateBrushIndirect 4422->4425 4423->4422 4424->4425 4425->4414 5949 402621 5950 402dab 21 API calls 5949->5950 5951 402628 5950->5951 5954 406011 GetFileAttributesW CreateFileW 5951->5954 5953 402634 5954->5953 4426 701c2a7f 4427 701c2acf 4426->4427 4428 701c2a8f VirtualProtect 4426->4428 4428->4427 4440 4025a3 4452 402deb 4440->4452 4443 402d89 21 API calls 4444 4025b6 4443->4444 4445 4025c5 4444->4445 4450 402933 4444->4450 4446 4025d2 RegEnumKeyW 4445->4446 4447 4025de RegEnumValueW 4445->4447 4448 4025fa RegCloseKey 4446->4448 4447->4448 4449 4025f3 4447->4449 4448->4450 4449->4448 4453 402dab 21 API calls 4452->4453 4454 402e02 4453->4454 4455 40638e RegOpenKeyExW 4454->4455 4456 4025ad 4455->4456 4456->4443 5962 701c1979 5963 701c199c 5962->5963 5964 701c19d1 GlobalFree 5963->5964 5965 701c19e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5963->5965 5964->5965 5966 701c1312 2 API calls 5965->5966 5967 701c1b6e GlobalFree GlobalFree 5966->5967 4702 4015a8 4703 402dab 21 API calls 4702->4703 4704 4015af SetFileAttributesW 4703->4704 4705 4015c1 4704->4705 5968 701c1774 5969 701c17a3 5968->5969 5970 701c1bff 22 API calls 5969->5970 5971 701c17aa 5970->5971 5972 701c17bd 5971->5972 5973 701c17b1 5971->5973 5975 701c17e4 5972->5975 5976 701c17c7 5972->5976 5974 701c1312 2 API calls 5973->5974 5977 701c17bb 5974->5977 5979 701c180e 5975->5979 5980 701c17ea 5975->5980 5978 701c15dd 3 API calls 5976->5978 5982 701c17cc 5978->5982 5981 701c15dd 3 API calls 5979->5981 5983 701c1654 3 API calls 5980->5983 5981->5977 5985 701c1654 3 API calls 5982->5985 5984 701c17ef 5983->5984 5986 701c1312 2 API calls 5984->5986 5987 701c17d2 5985->5987 5988 701c17f5 GlobalFree 5986->5988 5989 701c1312 2 API calls 5987->5989 5988->5977 5990 701c1809 GlobalFree 5988->5990 5991 701c17d8 GlobalFree 5989->5991 5990->5977 5991->5977 5992 401fa9 5993 402dab 21 API calls 5992->5993 5994 401faf 5993->5994 5995 4055a6 28 API calls 5994->5995 5996 401fb9 5995->5996 5997 405b04 2 API calls 5996->5997 5998 401fbf 5997->5998 5999 402933 5998->5999 6000 4069c0 5 API calls 5998->6000 6003 401fe2 CloseHandle 5998->6003 6002 401fd4 6000->6002 6002->6003 6005 406468 wsprintfW 6002->6005 6003->5999 6005->6003 4706 40252f 4707 402deb 21 API calls 4706->4707 4708 402539 4707->4708 4709 402dab 21 API calls 4708->4709 4710 402542 4709->4710 4711 402933 4710->4711 4712 40254d RegQueryValueExW 4710->4712 4713 40256d 4712->4713 4716 402573 RegCloseKey 4712->4716 4713->4716 4717 406468 wsprintfW 4713->4717 4716->4711 4717->4716 6006 40202f 6007 402dab 21 API calls 6006->6007 6008 402036 6007->6008 6009 406915 5 API calls 6008->6009 6010 402045 6009->6010 6011 402061 GlobalAlloc 6010->6011 6013 4020d1 6010->6013 6012 402075 6011->6012 6011->6013 6014 406915 5 API calls 6012->6014 6015 40207c 6014->6015 6016 406915 5 API calls 6015->6016 6017 402086 6016->6017 6017->6013 6021 406468 wsprintfW 6017->6021 6019 4020bf 6022 406468 wsprintfW 6019->6022 6021->6019 6022->6013 6023 4021af 6024 402dab 21 API calls 6023->6024 6025 4021b6 6024->6025 6026 402dab 21 API calls 6025->6026 6027 4021c0 6026->6027 6028 402dab 21 API calls 6027->6028 6029 4021ca 6028->6029 6030 402dab 21 API calls 6029->6030 6031 4021d4 6030->6031 6032 402dab 21 API calls 6031->6032 6033 4021de 6032->6033 6034 40221d CoCreateInstance 6033->6034 6035 402dab 21 API calls 6033->6035 6038 40223c 6034->6038 6035->6034 6036 401423 28 API calls 6037 4022fb 6036->6037 6038->6036 6038->6037 6039 403bb1 6040 403bbc 6039->6040 6041 403bc3 GlobalAlloc 6040->6041 6042 403bc0 6040->6042 6041->6042 6050 401a35 6051 402dab 21 API calls 6050->6051 6052 401a3e ExpandEnvironmentStringsW 6051->6052 6053 401a52 6052->6053 6055 401a65 6052->6055 6054 401a57 lstrcmpW 6053->6054 6053->6055 6054->6055 6056 701c23e9 6057 701c2453 6056->6057 6058 701c245e GlobalAlloc 6057->6058 6059 701c247d 6057->6059 6058->6057 6065 4023b7 6066 4023bf 6065->6066 6068 4023c5 6065->6068 6067 402dab 21 API calls 6066->6067 6067->6068 6069 402dab 21 API calls 6068->6069 6071 4023d3 6068->6071 6069->6071 6070 4023e1 6072 402dab 21 API calls 6070->6072 6071->6070 6073 402dab 21 API calls 6071->6073 6074 4023ea WritePrivateProfileStringW 6072->6074 6073->6070 6075 4014b8 6076 4014be 6075->6076 6077 401389 2 API calls 6076->6077 6078 4014c6 6077->6078 4830 402439 4831 402441 4830->4831 4832 40246c 4830->4832 4834 402deb 21 API calls 4831->4834 4833 402dab 21 API calls 4832->4833 4835 402473 4833->4835 4836 402448 4834->4836 4842 402e69 4835->4842 4838 402452 4836->4838 4839 402480 4836->4839 4840 402dab 21 API calls 4838->4840 4841 402459 RegDeleteValueW RegCloseKey 4840->4841 4841->4839 4843 402e76 4842->4843 4844 402e7d 4842->4844 4843->4839 4844->4843 4846 402eae 4844->4846 4847 40638e RegOpenKeyExW 4846->4847 4848 402edc 4847->4848 4849 402f91 4848->4849 4850 402ee6 4848->4850 4849->4843 4851 402eec RegEnumValueW 4850->4851 4856 402f0f 4850->4856 4852 402f76 RegCloseKey 4851->4852 4851->4856 4852->4849 4853 402f4b RegEnumKeyW 4854 402f54 RegCloseKey 4853->4854 4853->4856 4855 406915 5 API calls 4854->4855 4858 402f64 4855->4858 4856->4852 4856->4853 4856->4854 4857 402eae 6 API calls 4856->4857 4857->4856 4859 402f86 4858->4859 4860 402f68 RegDeleteKeyW 4858->4860 4859->4849 4860->4849 4861 40173a 4862 402dab 21 API calls 4861->4862 4863 401741 SearchPathW 4862->4863 4864 40175c 4863->4864 6079 401d3d 6080 402d89 21 API calls 6079->6080 6081 401d44 6080->6081 6082 402d89 21 API calls 6081->6082 6083 401d50 GetDlgItem 6082->6083 6084 40263d 6083->6084 6085 701c10e1 6087 701c1111 6085->6087 6086 701c12b0 GlobalFree 6087->6086 6088 701c1240 GlobalFree 6087->6088 6089 701c11d7 GlobalAlloc 6087->6089 6090 701c12ab 6087->6090 6091 701c135a 2 API calls 6087->6091 6092 701c129a GlobalFree 6087->6092 6093 701c1312 2 API calls 6087->6093 6094 701c116b GlobalAlloc 6087->6094 6095 701c1381 lstrcpyW 6087->6095 6088->6087 6089->6087 6090->6086 6091->6087 6092->6087 6093->6087 6094->6087 6095->6087 6096 406c3f 6098 406ac3 6096->6098 6097 40742e 6098->6097 6099 406b44 GlobalFree 6098->6099 6100 406b4d GlobalAlloc 6098->6100 6101 406bc4 GlobalAlloc 6098->6101 6102 406bbb GlobalFree 6098->6102 6099->6100 6100->6097 6100->6098 6101->6097 6101->6098 6102->6101

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 4034fc-40354e SetErrorMode GetVersionExW 1 403550-403580 GetVersionExW 0->1 2 403588-40358d 0->2 1->2 3 403595-4035d7 2->3 4 40358f 2->4 5 4035d9-4035e1 call 406915 3->5 6 4035ea 3->6 4->3 5->6 11 4035e3 5->11 7 4035ef-403603 call 4068a5 lstrlenA 6->7 13 403605-403621 call 406915 * 3 7->13 11->6 20 403632-403696 #17 OleInitialize SHGetFileInfoW call 406521 GetCommandLineW call 406521 13->20 21 403623-403629 13->21 28 403698-40369a 20->28 29 40369f-4036b3 call 405e1d CharNextW 20->29 21->20 25 40362b 21->25 25->20 28->29 32 4037ae-4037b4 29->32 33 4036b8-4036be 32->33 34 4037ba 32->34 36 4036c0-4036c5 33->36 37 4036c7-4036ce 33->37 35 4037ce-4037e8 GetTempPathW call 4034cb 34->35 46 403840-40385a DeleteFileW call 403082 35->46 47 4037ea-403808 GetWindowsDirectoryW lstrcatW call 4034cb 35->47 36->36 36->37 39 4036d0-4036d5 37->39 40 4036d6-4036da 37->40 39->40 41 4036e0-4036e6 40->41 42 40379b-4037aa call 405e1d 40->42 44 403700-403739 41->44 45 4036e8-4036ef 41->45 42->32 61 4037ac-4037ad 42->61 51 403756-403790 44->51 52 40373b-403740 44->52 49 4036f1-4036f4 45->49 50 4036f6 45->50 62 403860-403866 46->62 63 403a47-403a57 call 403b19 OleUninitialize 46->63 47->46 66 40380a-40383a GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 4034cb 47->66 49->44 49->50 50->44 58 403792-403796 51->58 59 403798-40379a 51->59 52->51 56 403742-40374a 52->56 64 403751 56->64 65 40374c-40374f 56->65 58->59 67 4037bc-4037c9 call 406521 58->67 59->42 61->32 68 40386c-403877 call 405e1d 62->68 69 4038ff-403906 call 403bf3 62->69 77 403a59-403a69 call 405b81 ExitProcess 63->77 78 403a7d-403a83 63->78 64->51 65->51 65->64 66->46 66->63 67->35 82 4038c5-4038cf 68->82 83 403879-4038ae 68->83 80 40390b-40390f 69->80 84 403b01-403b09 78->84 85 403a85-403a9b GetCurrentProcess OpenProcessToken 78->85 80->63 92 4038d1-4038df call 405ef8 82->92 93 403914-40393a call 405aec lstrlenW call 406521 82->93 89 4038b0-4038b4 83->89 86 403b0b 84->86 87 403b0f-403b13 ExitProcess 84->87 90 403ad1-403adf call 406915 85->90 91 403a9d-403acb LookupPrivilegeValueW AdjustTokenPrivileges 85->91 86->87 94 4038b6-4038bb 89->94 95 4038bd-4038c1 89->95 104 403ae1-403aeb 90->104 105 403aed-403af8 ExitWindowsEx 90->105 91->90 92->63 106 4038e5-4038fb call 406521 * 2 92->106 110 40394b-403963 93->110 111 40393c-403946 call 406521 93->111 94->95 99 4038c3 94->99 95->89 95->99 99->82 104->105 108 403afa-403afc call 40140b 104->108 105->84 105->108 106->69 108->84 117 403968-40396c 110->117 111->110 119 403971-40399b wsprintfW call 40655e 117->119 122 4039a4 call 405acf 119->122 123 40399d-4039a2 call 405a75 119->123 127 4039a9-4039ab 122->127 123->127 128 4039e7-403a06 SetCurrentDirectoryW call 4062e1 CopyFileW 127->128 129 4039ad-4039b7 GetFileAttributesW 127->129 136 403a45 128->136 137 403a08-403a29 call 4062e1 call 40655e call 405b04 128->137 130 4039d8-4039e3 129->130 131 4039b9-4039c2 DeleteFileW 129->131 130->117 135 4039e5 130->135 131->130 134 4039c4-4039d6 call 405c2d 131->134 134->119 134->130 135->63 136->63 146 403a2b-403a35 137->146 147 403a6f-403a7b CloseHandle 137->147 146->136 148 403a37-403a3f call 40687e 146->148 147->136 148->119 148->136
                          APIs
                          • SetErrorMode.KERNELBASE ref: 0040351F
                          • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 0040354A
                          • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 0040355D
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 004035F6
                          • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403633
                          • OleInitialize.OLE32(00000000), ref: 0040363A
                          • SHGetFileInfoW.SHELL32(00420EC8,00000000,?,000002B4,00000000), ref: 00403659
                          • GetCommandLineW.KERNEL32(00428A20,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040366E
                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe",00000020,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe",00000000,?,00000008,0000000A,0000000C), ref: 004036A7
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037DF
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037F0
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037FC
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403810
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403818
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403829
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403831
                          • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403845
                          • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040391E
                            • Part of subcall function 00406521: lstrcpynW.KERNEL32(?,?,00000400,0040366E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040652E
                          • wsprintfW.USER32 ref: 0040397B
                          • GetFileAttributesW.KERNEL32(880,C:\Users\user~1\AppData\Local\Temp\), ref: 004039AE
                          • DeleteFileW.KERNEL32(880), ref: 004039BA
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\), ref: 004039E8
                            • Part of subcall function 004062E1: MoveFileExW.KERNEL32(?,?,00000005,00405DDF,?,00000000,000000F1,?,?,?,?,?), ref: 004062EB
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,880,00000001,C:\Users\user~1\AppData\Local\Temp\,00000000), ref: 004039FE
                            • Part of subcall function 00405B04: CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00425F10,?,?,?,880,?), ref: 00405B2D
                            • Part of subcall function 00405B04: CloseHandle.KERNEL32(?,?,?,880,?), ref: 00405B3A
                            • Part of subcall function 0040687E: FindFirstFileW.KERNELBASE(771B3420,00425F58,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00405F41,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00406889
                            • Part of subcall function 0040687E: FindClose.KERNEL32(00000000), ref: 00406895
                          • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A4C
                          • ExitProcess.KERNEL32 ref: 00403A69
                          • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,880,00000000), ref: 00403A70
                          • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A8C
                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403A93
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403AA8
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403ACB
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403AF0
                          • ExitProcess.KERNEL32 ref: 00403B13
                            • Part of subcall function 00405ACF: CreateDirectoryW.KERNELBASE(?,00000000,004034EF,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00405AD5
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                          • String ID: "C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"$1033$880$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe$C:\Users\user\polaritets$C:\Users\user\polaritets$Error launching installer$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                          • API String ID: 1813718867-708000906
                          • Opcode ID: 861c3a791dac713e5dc6c418a8dec487fa289242a5d5f99aa186722fda572ff2
                          • Instruction ID: bee44f309595f2ff458e9cecae568de25c9667724a66d0f49069eb89ae1a0629
                          • Opcode Fuzzy Hash: 861c3a791dac713e5dc6c418a8dec487fa289242a5d5f99aa186722fda572ff2
                          • Instruction Fuzzy Hash: FDF10170204301ABD720AF659D05B2B3EE8EB8570AF11483EF581B62D1DB7DCA45CB6E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 151 4056e5-405700 152 405706-4057cd GetDlgItem * 3 call 4044d5 call 404e2e GetClientRect GetSystemMetrics SendMessageW * 2 151->152 153 40588f-405896 151->153 171 4057eb-4057ee 152->171 172 4057cf-4057e9 SendMessageW * 2 152->172 154 4058c0-4058cd 153->154 155 405898-4058ba GetDlgItem CreateThread CloseHandle 153->155 158 4058eb-4058f5 154->158 159 4058cf-4058d5 154->159 155->154 163 4058f7-4058fd 158->163 164 40594b-40594f 158->164 161 405910-405919 call 404507 159->161 162 4058d7-4058e6 ShowWindow * 2 call 4044d5 159->162 175 40591e-405922 161->175 162->158 168 405925-405935 ShowWindow 163->168 169 4058ff-40590b call 404479 163->169 164->161 166 405951-405957 164->166 166->161 173 405959-40596c SendMessageW 166->173 176 405945-405946 call 404479 168->176 177 405937-405940 call 4055a6 168->177 169->161 179 4057f0-4057fc SendMessageW 171->179 180 4057fe-405815 call 4044a0 171->180 172->171 181 405972-40599d CreatePopupMenu call 40655e AppendMenuW 173->181 182 405a6e-405a70 173->182 176->164 177->176 179->180 190 405817-40582b ShowWindow 180->190 191 40584b-40586c GetDlgItem SendMessageW 180->191 188 4059b2-4059c7 TrackPopupMenu 181->188 189 40599f-4059af GetWindowRect 181->189 182->175 188->182 192 4059cd-4059e4 188->192 189->188 193 40583a 190->193 194 40582d-405838 ShowWindow 190->194 191->182 195 405872-40588a SendMessageW * 2 191->195 196 4059e9-405a04 SendMessageW 192->196 197 405840-405846 call 4044d5 193->197 194->197 195->182 196->196 198 405a06-405a29 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 196->198 197->191 200 405a2b-405a52 SendMessageW 198->200 200->200 201 405a54-405a68 GlobalUnlock SetClipboardData CloseClipboard 200->201 201->182
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 00405743
                          • GetDlgItem.USER32(?,000003EE), ref: 00405752
                          • GetClientRect.USER32(?,?), ref: 0040578F
                          • GetSystemMetrics.USER32(00000002), ref: 00405796
                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 004057B7
                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 004057C8
                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 004057DB
                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 004057E9
                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 004057FC
                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040581E
                          • ShowWindow.USER32(?,00000008), ref: 00405832
                          • GetDlgItem.USER32(?,000003EC), ref: 00405853
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00405863
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 0040587C
                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405888
                          • GetDlgItem.USER32(?,000003F8), ref: 00405761
                            • Part of subcall function 004044D5: SendMessageW.USER32(00000028,?,00000001,00404300), ref: 004044E3
                          • GetDlgItem.USER32(?,000003EC), ref: 004058A5
                          • CreateThread.KERNELBASE(00000000,00000000,Function_00005679,00000000), ref: 004058B3
                          • CloseHandle.KERNELBASE(00000000), ref: 004058BA
                          • ShowWindow.USER32(00000000), ref: 004058DE
                          • ShowWindow.USER32(?,00000008), ref: 004058E3
                          • ShowWindow.USER32(00000008), ref: 0040592D
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405961
                          • CreatePopupMenu.USER32 ref: 00405972
                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405986
                          • GetWindowRect.USER32(?,?), ref: 004059A6
                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004059BF
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 004059F7
                          • OpenClipboard.USER32(00000000), ref: 00405A07
                          • EmptyClipboard.USER32 ref: 00405A0D
                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405A19
                          • GlobalLock.KERNEL32(00000000), ref: 00405A23
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405A37
                          • GlobalUnlock.KERNEL32(00000000), ref: 00405A57
                          • SetClipboardData.USER32(0000000D,00000000), ref: 00405A62
                          • CloseClipboard.USER32 ref: 00405A68
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                          • String ID: {
                          • API String ID: 590372296-366298937
                          • Opcode ID: bcd6524ca319c6da9779c5e50c73cceb5f6d9afdf0ecbcca2ead9855fe138ddf
                          • Instruction ID: bfdbfabbc3eccdd340dcac883e36f8678c6b127a6a9b52dc92d7db9eae4071ee
                          • Opcode Fuzzy Hash: bcd6524ca319c6da9779c5e50c73cceb5f6d9afdf0ecbcca2ead9855fe138ddf
                          • Instruction Fuzzy Hash: FBB127B1900618FFDB11AF60DD89AAE7B79FB44354F00813AFA41B61A0CB754A92DF58
                          APIs
                            • Part of subcall function 701C12BB: GlobalAlloc.KERNELBASE(00000040,?,701C12DB,?,701C137F,00000019,701C11CA,-000000A0), ref: 701C12C5
                          • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 701C1D2D
                          • lstrcpyW.KERNEL32(00000008,?), ref: 701C1D75
                          • lstrcpyW.KERNEL32(00000808,?), ref: 701C1D7F
                          • GlobalFree.KERNEL32(00000000), ref: 701C1D92
                          • GlobalFree.KERNEL32(?), ref: 701C1E74
                          • GlobalFree.KERNEL32(?), ref: 701C1E79
                          • GlobalFree.KERNEL32(?), ref: 701C1E7E
                          • GlobalFree.KERNEL32(00000000), ref: 701C2068
                          • lstrcpyW.KERNEL32(?,?), ref: 701C2222
                          • GetModuleHandleW.KERNEL32(00000008), ref: 701C22A1
                          • LoadLibraryW.KERNEL32(00000008), ref: 701C22B2
                          • GetProcAddress.KERNEL32(?,?), ref: 701C230C
                          • lstrlenW.KERNEL32(00000808), ref: 701C2326
                          Memory Dump Source
                          • Source File: 00000000.00000002.3732328148.00000000701C1000.00000020.00000001.01000000.00000004.sdmp, Offset: 701C0000, based on PE: true
                          • Associated: 00000000.00000002.3732308554.00000000701C0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732344875.00000000701C4000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732362879.00000000701C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_701c0000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                          • String ID:
                          • API String ID: 245916457-0
                          • Opcode ID: 6b06437f4f00289f4ccf1955d4146c906debd8f361eacf9c0cc0fa4c53919856
                          • Instruction ID: 501d5b1d09cc96950cd5aac496ff9b6f943dfc90c8b2ba4cb92d76038b5b69a7
                          • Opcode Fuzzy Hash: 6b06437f4f00289f4ccf1955d4146c906debd8f361eacf9c0cc0fa4c53919856
                          • Instruction Fuzzy Hash: 8722AB71D80206DFCB128FA4C8843EFBBB5FB2A315F22456EE566E2680D774D981DB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 730 405c2d-405c53 call 405ef8 733 405c55-405c67 DeleteFileW 730->733 734 405c6c-405c73 730->734 735 405de9-405ded 733->735 736 405c75-405c77 734->736 737 405c86-405c96 call 406521 734->737 738 405d97-405d9c 736->738 739 405c7d-405c80 736->739 743 405ca5-405ca6 call 405e3c 737->743 744 405c98-405ca3 lstrcatW 737->744 738->735 742 405d9e-405da1 738->742 739->737 739->738 745 405da3-405da9 742->745 746 405dab-405db3 call 40687e 742->746 747 405cab-405caf 743->747 744->747 745->735 746->735 753 405db5-405dc9 call 405df0 call 405be5 746->753 751 405cb1-405cb9 747->751 752 405cbb-405cc1 lstrcatW 747->752 751->752 754 405cc6-405ce2 lstrlenW FindFirstFileW 751->754 752->754 770 405de1-405de4 call 4055a6 753->770 771 405dcb-405dce 753->771 755 405ce8-405cf0 754->755 756 405d8c-405d90 754->756 758 405d10-405d24 call 406521 755->758 759 405cf2-405cfa 755->759 756->738 761 405d92 756->761 772 405d26-405d2e 758->772 773 405d3b-405d46 call 405be5 758->773 762 405cfc-405d04 759->762 763 405d6f-405d7f FindNextFileW 759->763 761->738 762->758 766 405d06-405d0e 762->766 763->755 769 405d85-405d86 FindClose 763->769 766->758 766->763 769->756 770->735 771->745 774 405dd0-405ddf call 4055a6 call 4062e1 771->774 772->763 775 405d30-405d39 call 405c2d 772->775 783 405d67-405d6a call 4055a6 773->783 784 405d48-405d4b 773->784 774->735 775->763 783->763 787 405d4d-405d5d call 4055a6 call 4062e1 784->787 788 405d5f-405d65 784->788 787->763 788->763
                          APIs
                          • DeleteFileW.KERNELBASE(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"), ref: 00405C56
                          • lstrcatW.KERNEL32(00424F10,\*.*,00424F10,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"), ref: 00405C9E
                          • lstrcatW.KERNEL32(?,0040A014,?,00424F10,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"), ref: 00405CC1
                          • lstrlenW.KERNEL32(?,?,0040A014,?,00424F10,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"), ref: 00405CC7
                          • FindFirstFileW.KERNEL32(00424F10,?,?,?,0040A014,?,00424F10,?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"), ref: 00405CD7
                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405D77
                          • FindClose.KERNEL32(00000000), ref: 00405D86
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405C3A
                          • "C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe", xrefs: 00405C36
                          • \*.*, xrefs: 00405C98
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"$C:\Users\user~1\AppData\Local\Temp\$\*.*
                          • API String ID: 2035342205-2067410175
                          • Opcode ID: 9251ba415d381c0528a68256adb7b13e134a55f337ff098e8b7b00a93e79b23f
                          • Instruction ID: aec485693c4c1533f42b9347a66a6bbcb57ea8568fe9c979ecac7928daa7b7f5
                          • Opcode Fuzzy Hash: 9251ba415d381c0528a68256adb7b13e134a55f337ff098e8b7b00a93e79b23f
                          • Instruction Fuzzy Hash: 8741D230801A14BADB31BB659D4DAAF7678EF41718F14813FF801B11D5D77C8A829EAE
                          APIs
                          • FindFirstFileW.KERNELBASE(771B3420,00425F58,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00405F41,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00406889
                          • FindClose.KERNEL32(00000000), ref: 00406895
                          Strings
                          • X_B, xrefs: 0040687F
                          • C:\Users\user~1\AppData\Local\Temp\nss458C.tmp, xrefs: 0040687E
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp$X_B
                          • API String ID: 2295610775-2462452876
                          • Opcode ID: 368a1c0a689282c2aa5195ddf357efb180b92b440bed087baa82a07527058284
                          • Instruction ID: 6d56574ea64d1328abe48e6f64e5cab5a12c2004fb3b9259b4ed260009733db8
                          • Opcode Fuzzy Hash: 368a1c0a689282c2aa5195ddf357efb180b92b440bed087baa82a07527058284
                          • Instruction Fuzzy Hash: AFD0123250A5205BC6406B386E0C84B7A58AF553717268A36F5AAF21E0CB788C6696AC
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 8964584eaf82ae0cb152a3b9d71f3809ce5605a589357672a1976e67bd0135b4
                          • Instruction ID: 98dfc50ccd9688b87079ede1b44bfc78bfb7a95d74622a08e623e0ee65e5f8c5
                          • Opcode Fuzzy Hash: 8964584eaf82ae0cb152a3b9d71f3809ce5605a589357672a1976e67bd0135b4
                          • Instruction Fuzzy Hash: B2F17870D04229CBDF28CFA8C8946ADBBB0FF44305F25816ED456BB281D7786A86CF45

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 202 403fa1-403fb3 203 403fb9-403fbf 202->203 204 40411a-404129 202->204 203->204 205 403fc5-403fce 203->205 206 404178-40418d 204->206 207 40412b-404173 GetDlgItem * 2 call 4044a0 SetClassLongW call 40140b 204->207 210 403fd0-403fdd SetWindowPos 205->210 211 403fe3-403fea 205->211 208 4041cd-4041d2 call 4044ec 206->208 209 40418f-404192 206->209 207->206 221 4041d7-4041f2 208->221 213 404194-40419f call 401389 209->213 214 4041c5-4041c7 209->214 210->211 216 403fec-404006 ShowWindow 211->216 217 40402e-404034 211->217 213->214 238 4041a1-4041c0 SendMessageW 213->238 214->208 220 40446d 214->220 222 404107-404115 call 404507 216->222 223 40400c-40401f GetWindowLongW 216->223 224 404036-404048 DestroyWindow 217->224 225 40404d-404050 217->225 234 40446f-404476 220->234 231 4041f4-4041f6 call 40140b 221->231 232 4041fb-404201 221->232 222->234 223->222 233 404025-404028 ShowWindow 223->233 235 40444a-404450 224->235 227 404052-40405e SetWindowLongW 225->227 228 404063-404069 225->228 227->234 228->222 237 40406f-40407e GetDlgItem 228->237 231->232 242 404207-404212 232->242 243 40442b-404444 DestroyWindow EndDialog 232->243 233->217 235->220 241 404452-404458 235->241 244 404080-404097 SendMessageW IsWindowEnabled 237->244 245 40409d-4040a0 237->245 238->234 241->220 246 40445a-404463 ShowWindow 241->246 242->243 247 404218-404265 call 40655e call 4044a0 * 3 GetDlgItem 242->247 243->235 244->220 244->245 248 4040a2-4040a3 245->248 249 4040a5-4040a8 245->249 246->220 274 404267-40426c 247->274 275 40426f-4042ab ShowWindow KiUserCallbackDispatcher call 4044c2 EnableWindow 247->275 252 4040d3-4040d8 call 404479 248->252 253 4040b6-4040bb 249->253 254 4040aa-4040b0 249->254 252->222 257 4040f1-404101 SendMessageW 253->257 259 4040bd-4040c3 253->259 254->257 258 4040b2-4040b4 254->258 257->222 258->252 262 4040c5-4040cb call 40140b 259->262 263 4040da-4040e3 call 40140b 259->263 272 4040d1 262->272 263->222 271 4040e5-4040ef 263->271 271->272 272->252 274->275 278 4042b0 275->278 279 4042ad-4042ae 275->279 280 4042b2-4042e0 GetSystemMenu EnableMenuItem SendMessageW 278->280 279->280 281 4042e2-4042f3 SendMessageW 280->281 282 4042f5 280->282 283 4042fb-40433a call 4044d5 call 403f82 call 406521 lstrlenW call 40655e SetWindowTextW call 401389 281->283 282->283 283->221 294 404340-404342 283->294 294->221 295 404348-40434c 294->295 296 40436b-40437f DestroyWindow 295->296 297 40434e-404354 295->297 296->235 298 404385-4043b2 CreateDialogParamW 296->298 297->220 299 40435a-404360 297->299 298->235 300 4043b8-40440f call 4044a0 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 298->300 299->221 301 404366 299->301 300->220 306 404411-404424 ShowWindow call 4044ec 300->306 301->220 308 404429 306->308 308->235
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403FDD
                          • ShowWindow.USER32(?), ref: 00403FFD
                          • GetWindowLongW.USER32(?,000000F0), ref: 0040400F
                          • ShowWindow.USER32(?,00000004), ref: 00404028
                          • DestroyWindow.USER32 ref: 0040403C
                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00404055
                          • GetDlgItem.USER32(?,?), ref: 00404074
                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404088
                          • IsWindowEnabled.USER32(00000000), ref: 0040408F
                          • GetDlgItem.USER32(?,00000001), ref: 0040413A
                          • GetDlgItem.USER32(?,00000002), ref: 00404144
                          • SetClassLongW.USER32(?,000000F2,?), ref: 0040415E
                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004041AF
                          • GetDlgItem.USER32(?,00000003), ref: 00404255
                          • ShowWindow.USER32(00000000,?), ref: 00404276
                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00404288
                          • EnableWindow.USER32(?,?), ref: 004042A3
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004042B9
                          • EnableMenuItem.USER32(00000000), ref: 004042C0
                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 004042D8
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 004042EB
                          • lstrlenW.KERNEL32(00422F08,?,00422F08,00000000), ref: 00404315
                          • SetWindowTextW.USER32(?,00422F08), ref: 00404329
                          • ShowWindow.USER32(?,0000000A), ref: 0040445D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSendShow$Long$EnableMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                          • String ID:
                          • API String ID: 121052019-0
                          • Opcode ID: f0b43cd8e7f2e41f431c118fff2888e9d111a3339ebed408ace792690fb64996
                          • Instruction ID: 6cd4652e30ec862c23bd12a6162173760bab2c1fa5186c41ecc3a298f9dddab8
                          • Opcode Fuzzy Hash: f0b43cd8e7f2e41f431c118fff2888e9d111a3339ebed408ace792690fb64996
                          • Instruction Fuzzy Hash: 7FC1C0B1600204ABDB216F21EE49E2B3A69FB94709F41053EF751B51F0CB795882DB2E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 309 403bf3-403c0b call 406915 312 403c0d-403c1d call 406468 309->312 313 403c1f-403c56 call 4063ef 309->313 321 403c79-403ca2 call 403ec9 call 405ef8 312->321 317 403c58-403c69 call 4063ef 313->317 318 403c6e-403c74 lstrcatW 313->318 317->318 318->321 327 403d34-403d3c call 405ef8 321->327 328 403ca8-403cad 321->328 333 403d4a-403d6f LoadImageW 327->333 334 403d3e-403d45 call 40655e 327->334 328->327 329 403cb3-403ccd call 4063ef 328->329 335 403cd2-403cdb 329->335 337 403df0-403df8 call 40140b 333->337 338 403d71-403da1 RegisterClassW 333->338 334->333 335->327 339 403cdd-403ce1 335->339 352 403e02-403e0d call 403ec9 337->352 353 403dfa-403dfd 337->353 342 403da7-403deb SystemParametersInfoW CreateWindowExW 338->342 343 403ebf 338->343 340 403cf3-403cff lstrlenW 339->340 341 403ce3-403cf0 call 405e1d 339->341 347 403d01-403d0f lstrcmpiW 340->347 348 403d27-403d2f call 405df0 call 406521 340->348 341->340 342->337 346 403ec1-403ec8 343->346 347->348 351 403d11-403d1b GetFileAttributesW 347->351 348->327 355 403d21-403d22 call 405e3c 351->355 356 403d1d-403d1f 351->356 362 403e13-403e2d ShowWindow call 4068a5 352->362 363 403e96-403e97 call 405679 352->363 353->346 355->348 356->348 356->355 370 403e39-403e4b GetClassInfoW 362->370 371 403e2f-403e34 call 4068a5 362->371 366 403e9c-403e9e 363->366 368 403ea0-403ea6 366->368 369 403eb8-403eba call 40140b 366->369 368->353 376 403eac-403eb3 call 40140b 368->376 369->343 374 403e63-403e86 DialogBoxParamW call 40140b 370->374 375 403e4d-403e5d GetClassInfoW RegisterClassW 370->375 371->370 379 403e8b-403e94 call 403b43 374->379 375->374 376->353 379->346
                          APIs
                            • Part of subcall function 00406915: GetModuleHandleA.KERNEL32(?,00000020,?,0040360C,0000000C,?,?,?,?,?,?,?,?), ref: 00406927
                            • Part of subcall function 00406915: GetProcAddress.KERNEL32(00000000,?), ref: 00406942
                          • lstrcatW.KERNEL32(1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000,00000002,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe",00008001), ref: 00403C74
                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\polaritets,1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000,00000002,771B3420), ref: 00403CF4
                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\polaritets,1033,00422F08,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F08,00000000), ref: 00403D07
                          • GetFileAttributesW.KERNEL32(Call), ref: 00403D12
                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\polaritets), ref: 00403D5B
                            • Part of subcall function 00406468: wsprintfW.USER32 ref: 00406475
                          • RegisterClassW.USER32(004289C0), ref: 00403D98
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403DB0
                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403DE5
                          • ShowWindow.USER32(00000005,00000000), ref: 00403E1B
                          • GetClassInfoW.USER32(00000000,RichEdit20W,004289C0), ref: 00403E47
                          • GetClassInfoW.USER32(00000000,RichEdit,004289C0), ref: 00403E54
                          • RegisterClassW.USER32(004289C0), ref: 00403E5D
                          • DialogBoxParamW.USER32(?,00000000,00403FA1,00000000), ref: 00403E7C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\polaritets$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                          • API String ID: 1975747703-4035508068
                          • Opcode ID: 0ef04955f1a6976a10593322067df9edaff6e7f7a832361b73f8beed2d85b6c9
                          • Instruction ID: 6a74b9b34ded998ebd2751605f77428bf44f11e359ee0ac59d58ca77ea789e65
                          • Opcode Fuzzy Hash: 0ef04955f1a6976a10593322067df9edaff6e7f7a832361b73f8beed2d85b6c9
                          • Instruction Fuzzy Hash: 2C61B770200740BAD620AF669D46F2B3A7CEB84B45F81453FF941B61E2CB7D5942CB6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 383 403082-4030d0 GetTickCount GetModuleFileNameW call 406011 386 4030d2-4030d7 383->386 387 4030dc-40310a call 406521 call 405e3c call 406521 GetFileSize 383->387 388 4032b2-4032b6 386->388 395 403110 387->395 396 4031f5-403203 call 40301e 387->396 398 403115-40312c 395->398 403 403205-403208 396->403 404 403258-40325d 396->404 399 403130-403139 call 40349e 398->399 400 40312e 398->400 409 40325f-403267 call 40301e 399->409 410 40313f-403146 399->410 400->399 406 40320a-403222 call 4034b4 call 40349e 403->406 407 40322c-403256 GlobalAlloc call 4034b4 call 4032b9 403->407 404->388 406->404 429 403224-40322a 406->429 407->404 434 403269-40327a 407->434 409->404 413 4031c2-4031c6 410->413 414 403148-40315c call 405fcc 410->414 418 4031d0-4031d6 413->418 419 4031c8-4031cf call 40301e 413->419 414->418 432 40315e-403165 414->432 425 4031e5-4031ed 418->425 426 4031d8-4031e2 call 406a02 418->426 419->418 425->398 433 4031f3 425->433 426->425 429->404 429->407 432->418 436 403167-40316e 432->436 433->396 437 403282-403287 434->437 438 40327c 434->438 436->418 440 403170-403177 436->440 439 403288-40328e 437->439 438->437 439->439 441 403290-4032ab SetFilePointer call 405fcc 439->441 440->418 442 403179-403180 440->442 445 4032b0 441->445 442->418 444 403182-4031a2 442->444 444->404 446 4031a8-4031ac 444->446 445->388 447 4031b4-4031bc 446->447 448 4031ae-4031b2 446->448 447->418 449 4031be-4031c0 447->449 448->433 448->447 449->418
                          APIs
                          • GetTickCount.KERNEL32 ref: 00403093
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,00000400), ref: 004030AF
                            • Part of subcall function 00406011: GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,80000000,00000003), ref: 00406015
                            • Part of subcall function 00406011: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406037
                          • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,80000000,00000003), ref: 004030FB
                          • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403231
                          Strings
                          • Error launching installer, xrefs: 004030D2
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403089
                          • C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe, xrefs: 00403099, 004030A8, 004030BC, 004030DC
                          • Null, xrefs: 00403179
                          • soft, xrefs: 00403170
                          • C:\Users\user\Desktop, xrefs: 004030DD, 004030E2, 004030E8
                          • "C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe", xrefs: 00403088
                          • Inst, xrefs: 00403167
                          • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403258
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: "C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                          • API String ID: 2803837635-920863323
                          • Opcode ID: f6f149303cde104692999693530b98443d3dd0b2c967e283c98aa5a581eac7be
                          • Instruction ID: 0271efb430f2efbe2fca7880162b12dddab7439e54d706f300c55aed9b32fb97
                          • Opcode Fuzzy Hash: f6f149303cde104692999693530b98443d3dd0b2c967e283c98aa5a581eac7be
                          • Instruction Fuzzy Hash: 7B51C071A01304ABDB209F65DD85B9E7FACAB09316F10407BF904B62D1D7789E818B5D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 671 40655e-406567 672 406569-406578 671->672 673 40657a-406594 671->673 672->673 674 4067a4-4067aa 673->674 675 40659a-4065a6 673->675 676 4067b0-4067bd 674->676 677 4065b8-4065c5 674->677 675->674 678 4065ac-4065b3 675->678 679 4067c9-4067cc 676->679 680 4067bf-4067c4 call 406521 676->680 677->676 681 4065cb-4065d4 677->681 678->674 680->679 683 406791 681->683 684 4065da-40661d 681->684 685 406793-40679d 683->685 686 40679f-4067a2 683->686 687 406623-40662f 684->687 688 406735-406739 684->688 685->674 686->674 689 406631 687->689 690 406639-40663b 687->690 691 40673b-406742 688->691 692 40676d-406771 688->692 689->690 695 406675-406678 690->695 696 40663d-40665b call 4063ef 690->696 693 406752-40675e call 406521 691->693 694 406744-406750 call 406468 691->694 697 406781-40678f lstrlenW 692->697 698 406773-40677c call 40655e 692->698 707 406763-406769 693->707 694->707 702 40667a-406686 GetSystemDirectoryW 695->702 703 40668b-40668e 695->703 706 406660-406663 696->706 697->674 698->697 708 406718-40671b 702->708 709 4066a0-4066a4 703->709 710 406690-40669c GetWindowsDirectoryW 703->710 711 406669-406670 call 40655e 706->711 712 40671d-406720 706->712 707->697 713 40676b 707->713 708->712 714 40672d-406733 call 4067cf 708->714 709->708 715 4066a6-4066c4 709->715 710->709 711->708 712->714 717 406722-406728 lstrcatW 712->717 713->714 714->697 719 4066c6-4066cc 715->719 720 4066d8-4066f0 call 406915 715->720 717->714 724 4066d4-4066d6 719->724 728 4066f2-406705 SHGetPathFromIDListW CoTaskMemFree 720->728 729 406707-406710 720->729 724->720 726 406712-406716 724->726 726->708 728->726 728->729 729->715 729->726
                          APIs
                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406680
                          • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,?,?,00000000,00000000,00418EC0,00000000), ref: 00406696
                          • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 004066F4
                          • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 004066FD
                          • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,?,?,00000000,00000000,00418EC0,00000000), ref: 00406728
                          • lstrlenW.KERNEL32(Call,00000000,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,?,?,00000000,00000000,00418EC0,00000000), ref: 00406782
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                          • String ID: Call$Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 4024019347-317080508
                          • Opcode ID: 14c9f03641932d7153c154bb414b77852189b75d1473d82c894b9adbe9647435
                          • Instruction ID: c1bee3e663878f3afad94de22ef935420ccf361ce06c76a1d76179cfc985cdfa
                          • Opcode Fuzzy Hash: 14c9f03641932d7153c154bb414b77852189b75d1473d82c894b9adbe9647435
                          • Instruction Fuzzy Hash: 266146B1A043019BDB205F28DD80B6B77E4AF84318F65053FF646B32D1DA7D89A18B5E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 794 401774-401799 call 402dab call 405e67 799 4017a3-4017b5 call 406521 call 405df0 lstrcatW 794->799 800 40179b-4017a1 call 406521 794->800 805 4017ba-4017bb call 4067cf 799->805 800->805 809 4017c0-4017c4 805->809 810 4017c6-4017d0 call 40687e 809->810 811 4017f7-4017fa 809->811 819 4017e2-4017f4 810->819 820 4017d2-4017e0 CompareFileTime 810->820 812 401802-40181e call 406011 811->812 813 4017fc-4017fd call 405fec 811->813 821 401820-401823 812->821 822 401892-4018bb call 4055a6 call 4032b9 812->822 813->812 819->811 820->819 823 401874-40187e call 4055a6 821->823 824 401825-401863 call 406521 * 2 call 40655e call 406521 call 405b81 821->824 834 4018c3-4018cf SetFileTime 822->834 835 4018bd-4018c1 822->835 836 401887-40188d 823->836 824->809 856 401869-40186a 824->856 838 4018d5-4018e0 CloseHandle 834->838 835->834 835->838 839 402c38 836->839 842 4018e6-4018e9 838->842 843 402c2f-402c32 838->843 841 402c3a-402c3e 839->841 845 4018eb-4018fc call 40655e lstrcatW 842->845 846 4018fe-401901 call 40655e 842->846 843->839 853 401906-40239d 845->853 846->853 857 4023a2-4023a7 853->857 858 40239d call 405b81 853->858 856->836 859 40186c-40186d 856->859 857->841 858->857 859->823
                          APIs
                          • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\polaritets,?,?,00000031), ref: 004017B5
                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\polaritets,?,?,00000031), ref: 004017DA
                            • Part of subcall function 00406521: lstrcpynW.KERNEL32(?,?,00000400,0040366E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040652E
                            • Part of subcall function 004055A6: lstrlenW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033F2,00000000,?), ref: 004055DE
                            • Part of subcall function 004055A6: lstrlenW.KERNEL32(004033F2,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033F2,00000000), ref: 004055EE
                            • Part of subcall function 004055A6: lstrcatW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,004033F2,004033F2,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,00000000,00418EC0,00000000), ref: 00405601
                            • Part of subcall function 004055A6: SetWindowTextW.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll), ref: 00405613
                            • Part of subcall function 004055A6: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405639
                            • Part of subcall function 004055A6: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405653
                            • Part of subcall function 004055A6: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405661
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp$C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll$C:\Users\user\polaritets$Call
                          • API String ID: 1941528284-2872914338
                          • Opcode ID: 8735ad9560c18e5a7f29f6a8244760e17f86ea249fb7e5f19f194b0f67ebe764
                          • Instruction ID: 1777f765e23ed303a4c4324df0f40fc052c607b9e3f25272d24a03cacca2a4dc
                          • Opcode Fuzzy Hash: 8735ad9560c18e5a7f29f6a8244760e17f86ea249fb7e5f19f194b0f67ebe764
                          • Instruction Fuzzy Hash: 9E41A531900509BACF117BA9DD86DAF3AB5EF45328B20423FF512B10E1DB3C8A52966D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 860 4055a6-4055bb 861 4055c1-4055d2 860->861 862 405672-405676 860->862 863 4055d4-4055d8 call 40655e 861->863 864 4055dd-4055e9 lstrlenW 861->864 863->864 865 405606-40560a 864->865 866 4055eb-4055fb lstrlenW 864->866 869 405619-40561d 865->869 870 40560c-405613 SetWindowTextW 865->870 866->862 868 4055fd-405601 lstrcatW 866->868 868->865 871 405663-405665 869->871 872 40561f-405661 SendMessageW * 3 869->872 870->869 871->862 873 405667-40566a 871->873 872->871 873->862
                          APIs
                          • lstrlenW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033F2,00000000,?), ref: 004055DE
                          • lstrlenW.KERNEL32(004033F2,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033F2,00000000), ref: 004055EE
                          • lstrcatW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,004033F2,004033F2,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,00000000,00418EC0,00000000), ref: 00405601
                          • SetWindowTextW.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll), ref: 00405613
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405639
                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405653
                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 00405661
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID: Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll
                          • API String ID: 2531174081-1359906674
                          • Opcode ID: a9fafcf7327b9621bb894f8e2d9ac48d1397335c234e36f420f2517ccdad5277
                          • Instruction ID: deb6953f75989b306d4e6df0e2073f5bc52164b7b2c012b705af3b177d86a23e
                          • Opcode Fuzzy Hash: a9fafcf7327b9621bb894f8e2d9ac48d1397335c234e36f420f2517ccdad5277
                          • Instruction Fuzzy Hash: 8F21B375900158BACB119FA5DD84ECFBF75EF45364F50803AF944B22A0C77A4A51CF68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 874 4026f1-40270a call 402d89 877 402710-402717 874->877 878 402c2f-402c32 874->878 880 402719 877->880 881 40271c-40271f 877->881 879 402c38-402c3e 878->879 880->881 883 402883-40288b 881->883 884 402725-402734 call 406481 881->884 883->878 884->883 887 40273a 884->887 888 402740-402744 887->888 889 4027d9-4027dc 888->889 890 40274a-402765 ReadFile 888->890 891 4027f4-402804 call 406094 889->891 892 4027de-4027e1 889->892 890->883 893 40276b-402770 890->893 891->883 903 402806 891->903 892->891 894 4027e3-4027ee call 4060f2 892->894 893->883 896 402776-402784 893->896 894->883 894->891 899 40278a-40279c MultiByteToWideChar 896->899 900 40283f-40284b call 406468 896->900 899->903 904 40279e-4027a1 899->904 900->879 906 402809-40280c 903->906 907 4027a3-4027ae 904->907 906->900 909 40280e-402813 906->909 907->906 908 4027b0-4027d5 SetFilePointer MultiByteToWideChar 907->908 908->907 910 4027d7 908->910 911 402850-402854 909->911 912 402815-40281a 909->912 910->903 913 402871-40287d SetFilePointer 911->913 914 402856-40285a 911->914 912->911 915 40281c-40282f 912->915 913->883 916 402862-40286f 914->916 917 40285c-402860 914->917 915->883 918 402831-402837 915->918 916->883 917->913 917->916 918->888 919 40283d 918->919 919->883
                          APIs
                          • ReadFile.KERNELBASE(?,?,?,?), ref: 0040275D
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 00402798
                          • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027BB
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027D1
                            • Part of subcall function 004060F2: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406108
                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040287D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: File$Pointer$ByteCharMultiWide$Read
                          • String ID: 9
                          • API String ID: 163830602-2366072709
                          • Opcode ID: 0fe20a848d4a285c173513a47146d0bdd1f0b43cc80ef0beb9e6d9777ffbd6ad
                          • Instruction ID: 4938fc2aff7960a3a7fedf371d3c64c497049ea43b58312dd80c80f6ae9549af
                          • Opcode Fuzzy Hash: 0fe20a848d4a285c173513a47146d0bdd1f0b43cc80ef0beb9e6d9777ffbd6ad
                          • Instruction Fuzzy Hash: 5051FB75D0421AABDF249FD4CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 920 4032b9-4032d0 921 4032d2 920->921 922 4032d9-4032e1 920->922 921->922 923 4032e3 922->923 924 4032e8-4032ed 922->924 923->924 925 4032fd-40330a call 40349e 924->925 926 4032ef-4032f8 call 4034b4 924->926 930 403310-403314 925->930 931 403455 925->931 926->925 933 40331a-40333a GetTickCount call 406a70 930->933 934 40343e-403440 930->934 932 403457-403458 931->932 935 403497-40349b 932->935 944 403494 933->944 945 403340-403348 933->945 936 403442-403445 934->936 937 403489-40348d 934->937 940 403447 936->940 941 40344a-403453 call 40349e 936->941 942 40345a-403460 937->942 943 40348f 937->943 940->941 941->931 953 403491 941->953 947 403462 942->947 948 403465-403473 call 40349e 942->948 943->944 944->935 949 40334a 945->949 950 40334d-40335b call 40349e 945->950 947->948 948->931 957 403475-403481 call 4060c3 948->957 949->950 950->931 958 403361-40336a 950->958 953->944 963 403483-403486 957->963 964 40343a-40343c 957->964 960 403370-40338d call 406a90 958->960 966 403393-4033aa GetTickCount 960->966 967 403436-403438 960->967 963->937 964->932 968 4033f5-4033f7 966->968 969 4033ac-4033b4 966->969 967->932 970 4033f9-4033fd 968->970 971 40342a-40342e 968->971 972 4033b6-4033ba 969->972 973 4033bc-4033ed MulDiv wsprintfW call 4055a6 969->973 974 403412-403418 970->974 975 4033ff-403404 call 4060c3 970->975 971->945 976 403434 971->976 972->968 972->973 980 4033f2 973->980 979 40341e-403422 974->979 981 403409-40340b 975->981 976->944 979->960 982 403428 979->982 980->968 981->964 983 40340d-403410 981->983 982->944 983->979
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CountTick$wsprintf
                          • String ID: ... %d%%
                          • API String ID: 551687249-2449383134
                          • Opcode ID: bb69fc25e18161a0849df33240b9b7daf63c30e93ac5b68caaa3da3af3354023
                          • Instruction ID: 25ee467b37f7358b1d8943912f63d539eb3ef7c07a249f5ee2dc3eaa61b9464a
                          • Opcode Fuzzy Hash: bb69fc25e18161a0849df33240b9b7daf63c30e93ac5b68caaa3da3af3354023
                          • Instruction Fuzzy Hash: 5B518E31900219EBCB11DF65DA44BAF3FA8AB40726F14417BF804BB2C1D7789E408BA9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 984 4068a5-4068c5 GetSystemDirectoryW 985 4068c7 984->985 986 4068c9-4068cb 984->986 985->986 987 4068dc-4068de 986->987 988 4068cd-4068d6 986->988 990 4068df-406912 wsprintfW LoadLibraryExW 987->990 988->987 989 4068d8-4068da 988->989 989->990
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068BC
                          • wsprintfW.USER32 ref: 004068F7
                          • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040690B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll$UXTHEME
                          • API String ID: 2200240437-1106614640
                          • Opcode ID: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                          • Instruction ID: d40490b37a95929041f6b14fe17981fa15644a851550e805e000283098582d10
                          • Opcode Fuzzy Hash: 7a73cbb44207cafadb11ab8eaaa41fd963bfa172cfc882b2dd9c54e233860d96
                          • Instruction Fuzzy Hash: 41F0FC31511119AACF10BB64DD0DF9B375C9B00305F10847AE546F10D0EB789A68CBA8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 991 402eae-402ed7 call 40638e 993 402edc-402ee0 991->993 994 402f91-402f95 993->994 995 402ee6-402eea 993->995 996 402eec-402f0d RegEnumValueW 995->996 997 402f0f-402f22 995->997 996->997 998 402f76-402f84 RegCloseKey 996->998 999 402f4b-402f52 RegEnumKeyW 997->999 998->994 1000 402f24-402f26 999->1000 1001 402f54-402f66 RegCloseKey call 406915 999->1001 1000->998 1003 402f28-402f3c call 402eae 1000->1003 1007 402f86-402f8c 1001->1007 1008 402f68-402f74 RegDeleteKeyW 1001->1008 1003->1001 1009 402f3e-402f4a 1003->1009 1007->994 1008->994 1009->999
                          APIs
                          • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                          • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CloseEnum$DeleteValue
                          • String ID:
                          • API String ID: 1354259210-0
                          • Opcode ID: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                          • Instruction ID: 48bf034c557530f45265713f896c64b121a5f1f2f5b25ab6521791cb913d5ed3
                          • Opcode Fuzzy Hash: 2404979ab5d72bd1f47e4c5d2100d154d2dcf156ce7fec90999c2a50aae3b712
                          • Instruction Fuzzy Hash: 74215A7150010ABFDF119F90CE89EEF7B7DEB54388F110076B949B11A0D7B49E54AA68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1010 701c1817-701c1856 call 701c1bff 1014 701c185c-701c1860 1010->1014 1015 701c1976-701c1978 1010->1015 1016 701c1869-701c1876 call 701c2480 1014->1016 1017 701c1862-701c1868 call 701c243e 1014->1017 1022 701c1878-701c187d 1016->1022 1023 701c18a6-701c18ad 1016->1023 1017->1016 1026 701c187f-701c1880 1022->1026 1027 701c1898-701c189b 1022->1027 1024 701c18cd-701c18d1 1023->1024 1025 701c18af-701c18cb call 701c2655 call 701c1654 call 701c1312 GlobalFree 1023->1025 1028 701c191e-701c1924 call 701c2655 1024->1028 1029 701c18d3-701c191c call 701c1666 call 701c2655 1024->1029 1051 701c1925-701c1929 1025->1051 1032 701c1888-701c1889 call 701c2b98 1026->1032 1033 701c1882-701c1883 1026->1033 1027->1023 1030 701c189d-701c189e call 701c2e23 1027->1030 1028->1051 1029->1051 1045 701c18a3 1030->1045 1042 701c188e 1032->1042 1034 701c1885-701c1886 1033->1034 1035 701c1890-701c1896 call 701c2810 1033->1035 1034->1023 1034->1032 1050 701c18a5 1035->1050 1042->1045 1045->1050 1050->1023 1054 701c192b-701c1939 call 701c2618 1051->1054 1055 701c1966-701c196d 1051->1055 1060 701c193b-701c193e 1054->1060 1061 701c1951-701c1958 1054->1061 1055->1015 1057 701c196f-701c1970 GlobalFree 1055->1057 1057->1015 1060->1061 1062 701c1940-701c1948 1060->1062 1061->1055 1063 701c195a-701c1965 call 701c15dd 1061->1063 1062->1061 1064 701c194a-701c194b FreeLibrary 1062->1064 1063->1055 1064->1061
                          APIs
                            • Part of subcall function 701C1BFF: GlobalFree.KERNEL32(?), ref: 701C1E74
                            • Part of subcall function 701C1BFF: GlobalFree.KERNEL32(?), ref: 701C1E79
                            • Part of subcall function 701C1BFF: GlobalFree.KERNEL32(?), ref: 701C1E7E
                          • GlobalFree.KERNEL32(00000000), ref: 701C18C5
                          • FreeLibrary.KERNEL32(?), ref: 701C194B
                          • GlobalFree.KERNEL32(00000000), ref: 701C1970
                            • Part of subcall function 701C243E: GlobalAlloc.KERNEL32(00000040,?), ref: 701C246F
                            • Part of subcall function 701C2810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,701C1896,00000000), ref: 701C28E0
                            • Part of subcall function 701C1666: wsprintfW.USER32 ref: 701C1694
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3732328148.00000000701C1000.00000020.00000001.01000000.00000004.sdmp, Offset: 701C0000, based on PE: true
                          • Associated: 00000000.00000002.3732308554.00000000701C0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732344875.00000000701C4000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732362879.00000000701C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_701c0000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarywsprintf
                          • String ID:
                          • API String ID: 3962662361-3916222277
                          • Opcode ID: d2fdaaa097a89456b258ecd654d15cac7d99effd94222eebf06a0c5dccc2c90f
                          • Instruction ID: e408b59234219bc7005faec62bc5615a01f8cc6792b1afb75f40dab5afa601d4
                          • Opcode Fuzzy Hash: d2fdaaa097a89456b258ecd654d15cac7d99effd94222eebf06a0c5dccc2c90f
                          • Instruction Fuzzy Hash: 6241CF728442419FCB009F60DC85B9F3BBCAF36314F154469FE069A68ADBB4D885C760

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1067 406040-40604c 1068 40604d-406081 GetTickCount GetTempFileNameW 1067->1068 1069 406090-406092 1068->1069 1070 406083-406085 1068->1070 1072 40608a-40608d 1069->1072 1070->1068 1071 406087 1070->1071 1071->1072
                          APIs
                          • GetTickCount.KERNEL32 ref: 0040605E
                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,004034FA,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6), ref: 00406079
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: C:\Users\user~1\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-3083371207
                          • Opcode ID: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                          • Instruction ID: 4304e6ca34acc2e603ac9508cdf3fa98200610ac432ccd05af3fd9fdb7d66135
                          • Opcode Fuzzy Hash: 017de5c5da22b1c6cf72d7a8a287ef2c48f88e3ac937424cf3c6df762bd8e462
                          • Instruction Fuzzy Hash: 58F09676B40204FBDB10CF55ED05F9EB7ACEB95750F11403AEE05F7140E6B099548768
                          APIs
                            • Part of subcall function 00405E9B: CharNextW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,?,00405F0F,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"), ref: 00405EA9
                            • Part of subcall function 00405E9B: CharNextW.USER32(00000000), ref: 00405EAE
                            • Part of subcall function 00405E9B: CharNextW.USER32(00000000), ref: 00405EC6
                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                            • Part of subcall function 00405A75: CreateDirectoryW.KERNELBASE(?,?), ref: 00405AB7
                          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\polaritets,?,00000000,000000F0), ref: 00401652
                          Strings
                          • C:\Users\user\polaritets, xrefs: 00401645
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                          • String ID: C:\Users\user\polaritets
                          • API String ID: 1892508949-2790145093
                          • Opcode ID: 4b68a463cc784b1945903bcff3764fd9da93cf801788bc1ee3673f5490bf8ecc
                          • Instruction ID: ceaefb5432ba9a2b041ab88b04bec91c1a8495824eafa6d8534a6d53eb807851
                          • Opcode Fuzzy Hash: 4b68a463cc784b1945903bcff3764fd9da93cf801788bc1ee3673f5490bf8ecc
                          • Instruction Fuzzy Hash: 2D11D031504604ABCF206FA5CD4099F36B0EF04368B29493FE941B22E1DA3E4E819E8E
                          APIs
                          • RegQueryValueExW.KERNELBASE(?,00000000,00000000,?,?,00000800,00000000,?,?,?,?,Call,?,00000000,00406660,80000002), ref: 00406435
                          • RegCloseKey.KERNELBASE(?), ref: 00406440
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID: Call
                          • API String ID: 3356406503-1824292864
                          • Opcode ID: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                          • Instruction ID: 441e6d046e2572fd66e4c77006f0a98464fe89a944563537cf106c849ea921cc
                          • Opcode Fuzzy Hash: 5e421e957683aa7155fe1e1f393967b6404614e05e15b89e99e168e2dc4a01c3
                          • Instruction Fuzzy Hash: 4F017172500209ABDF218F51CD05EDB3BA9EB54354F01403AFD1992191D738D968DF94
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: aff26f2f30a057b7958a1e63094fc459aa306f2dc33e22a09454c964c074026f
                          • Instruction ID: 2d246cc9a99bab59b70d05231fecbcf7b107c6ac3beee636f2a296df3f85dc82
                          • Opcode Fuzzy Hash: aff26f2f30a057b7958a1e63094fc459aa306f2dc33e22a09454c964c074026f
                          • Instruction Fuzzy Hash: 7DA14571E04228DBDF28CFA8C8546ADBBB1FF44305F10816AD856BB281D7786986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3ac8a4bfdb441625c816955e49305bbe8ba575533dfee591c2cbe8a61bd4ebd3
                          • Instruction ID: 7b0bebd33542e08950ef610181a47380a5391ae5859bceecccad38cd1577eaed
                          • Opcode Fuzzy Hash: 3ac8a4bfdb441625c816955e49305bbe8ba575533dfee591c2cbe8a61bd4ebd3
                          • Instruction Fuzzy Hash: 90911370E04228CBDF28CF98C854BADBBB1FF44305F14816AD856BB291D778A986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4946c792fe510ceb6f898f1d350858136886e798b9c642bfd65d449563e2a9d8
                          • Instruction ID: bb56daa647bdc5b8eebe4baaa8fd529e9884befb34821132b6d53cadc5dab3c5
                          • Opcode Fuzzy Hash: 4946c792fe510ceb6f898f1d350858136886e798b9c642bfd65d449563e2a9d8
                          • Instruction Fuzzy Hash: 84814571E04228DBDF24CFA8C844BADBBB1FF44305F24816AD456BB281D778A986DF05
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 40acfd0569c51a0ed8326a41ceea3e1cadcd4e5eff2ca22ce679809f46488b45
                          • Instruction ID: 4c059968f2e2b24eb1e5e0c9ef09b3253d11b2009d36a285a9eb138ea7c1b005
                          • Opcode Fuzzy Hash: 40acfd0569c51a0ed8326a41ceea3e1cadcd4e5eff2ca22ce679809f46488b45
                          • Instruction Fuzzy Hash: 5B815971E04228DBDF24CFA8C8447ADBBB0FF44305F20816AD456BB281D7786986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7ecfdc6a50dff7d8916ace13d1bdc0889b51af96eca2ccc09b1dd9eb10df24f6
                          • Instruction ID: d60cf97a253a7e6a69b3ee1887f4eadeccf904993e12f72ad3f9abe973951288
                          • Opcode Fuzzy Hash: 7ecfdc6a50dff7d8916ace13d1bdc0889b51af96eca2ccc09b1dd9eb10df24f6
                          • Instruction Fuzzy Hash: A1711371E04228DBDF24CFA8C844BADBBB1FF44305F15806AD856BB281D778A986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c11de4171378e898cf9dd0cf6cc2122b5d0c7e9a287f85b53884598f27a71e29
                          • Instruction ID: 85b777fa610547d2183482adb232412925907ddbdaa1129d6a49a25a13354a82
                          • Opcode Fuzzy Hash: c11de4171378e898cf9dd0cf6cc2122b5d0c7e9a287f85b53884598f27a71e29
                          • Instruction Fuzzy Hash: 9D714671E04228DBDF28CF98C844BADBBB1FF44305F14816AD856BB281D778A986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f1fa58480ac5da56fa6cc6281bf6ff7b0f773126a89d504887f275dca7af18c3
                          • Instruction ID: 068c41ea6699cb9b24c5d93e390f6e15a746ef4a0ce6273c00671ddd4a3661d6
                          • Opcode Fuzzy Hash: f1fa58480ac5da56fa6cc6281bf6ff7b0f773126a89d504887f275dca7af18c3
                          • Instruction Fuzzy Hash: E0715771E04228DBDF24CF98C844BADBBB1FF44305F15806AD856BB281C778AA86DF45
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402108
                            • Part of subcall function 004055A6: lstrlenW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033F2,00000000,?), ref: 004055DE
                            • Part of subcall function 004055A6: lstrlenW.KERNEL32(004033F2,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,00000000,00418EC0,00000000,?,?,?,?,?,?,?,?,?,004033F2,00000000), ref: 004055EE
                            • Part of subcall function 004055A6: lstrcatW.KERNEL32(Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,004033F2,004033F2,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,00000000,00418EC0,00000000), ref: 00405601
                            • Part of subcall function 004055A6: SetWindowTextW.USER32(Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll,Skipped: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll), ref: 00405613
                            • Part of subcall function 004055A6: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405639
                            • Part of subcall function 004055A6: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 00405653
                            • Part of subcall function 004055A6: SendMessageW.USER32(?,00001013,?,00000000), ref: 00405661
                          • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402119
                          • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 00402196
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                          • String ID:
                          • API String ID: 334405425-0
                          • Opcode ID: d9c937c8948d5d37c50d665afaa08982dd07723c7233c08654f6d387f6d988e5
                          • Instruction ID: a8e1189db69026d3652efcc6ea6e12950466f7228f8283b9583ebcadfcee3162
                          • Opcode Fuzzy Hash: d9c937c8948d5d37c50d665afaa08982dd07723c7233c08654f6d387f6d988e5
                          • Instruction Fuzzy Hash: 8D215031904108BADF11AFA5CE49A9E7AB1BF44359F20413BF105B91E1CBBD89829A5D
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 00401C10
                          • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C22
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Global$AllocFree
                          • String ID: Call
                          • API String ID: 3394109436-1824292864
                          • Opcode ID: e33d9b87315d49944383bdaefc5ba1c13c649625d32d96b536ae23307826b8e2
                          • Instruction ID: 4f57f46d507340bd06d3479355973fa93edc06c360faa14cbfff374a5dc28ea7
                          • Opcode Fuzzy Hash: e33d9b87315d49944383bdaefc5ba1c13c649625d32d96b536ae23307826b8e2
                          • Instruction Fuzzy Hash: 5721F673904214EBDB30AFA8DE85A5F72B4AB08324714053FF642B32C4C6B8DC418B9D
                          APIs
                            • Part of subcall function 0040687E: FindFirstFileW.KERNELBASE(771B3420,00425F58,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00405F41,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00406889
                            • Part of subcall function 0040687E: FindClose.KERNEL32(00000000), ref: 00406895
                          • lstrlenW.KERNEL32 ref: 00402344
                          • lstrlenW.KERNEL32(00000000), ref: 0040234F
                          • SHFileOperationW.SHELL32(?,?,?,00000000), ref: 00402378
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: FileFindlstrlen$CloseFirstOperation
                          • String ID:
                          • API String ID: 1486964399-0
                          • Opcode ID: c92c3ee3ae18d95aa1771da2fabd1cb2010788539e6b4ab8b952707b1b2048dc
                          • Instruction ID: e570f7e88bbeadde5f19d209a5805755c0aba3de4ac721a8bb04e236ab5037c1
                          • Opcode Fuzzy Hash: c92c3ee3ae18d95aa1771da2fabd1cb2010788539e6b4ab8b952707b1b2048dc
                          • Instruction Fuzzy Hash: 93117071D00318AADB10EFF9DD09A9EB6B8AF14308F10443FA401FB2D1D6BCC9418B59
                          APIs
                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00000000,00000011,00000002), ref: 00402602
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Enum$CloseValue
                          • String ID:
                          • API String ID: 397863658-0
                          • Opcode ID: ba34c4ace152f4771e18115f26e31f873f7731feb8842bd8527d51c3f02d9afa
                          • Instruction ID: fdeb1b79bd1b5feb028a75c257e649ad2cddb418c0fd83a6570d1db0005c2465
                          • Opcode Fuzzy Hash: ba34c4ace152f4771e18115f26e31f873f7731feb8842bd8527d51c3f02d9afa
                          • Instruction Fuzzy Hash: 7D017171904205BFEB149F949E58AAF7678FF40308F10443EF505B61C0DBB84E41976D
                          APIs
                          • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402560
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00000000,00000011,00000002), ref: 00402602
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID:
                          • API String ID: 3356406503-0
                          • Opcode ID: 56531dfc69c8a788bac7fcb245dee4885a6b683f52a9ec3ede9407be23b67ed3
                          • Instruction ID: b0e4e1b430255f92fa12a8c2637aeeefdc8d450e0dea4cce8f1fdd2cec8de2f5
                          • Opcode Fuzzy Hash: 56531dfc69c8a788bac7fcb245dee4885a6b683f52a9ec3ede9407be23b67ed3
                          • Instruction Fuzzy Hash: 61116A71900219EBDF14DFA0DA989AEB7B4BF04349F20447FE406B62C0D7B84A45EB5E
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageW.USER32(0040A2D8,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 24120cd7971efbcf380a3cfcf85aef56aa5faf56da28ec4d1ccb8bb0957475b6
                          • Instruction ID: 2b867b2a322a557ec20ecaa395e060e0be7e2a6973b32d365fcb6e947ad1390c
                          • Opcode Fuzzy Hash: 24120cd7971efbcf380a3cfcf85aef56aa5faf56da28ec4d1ccb8bb0957475b6
                          • Instruction Fuzzy Hash: 9E01F4327242209BE7195B389D05B6B3798E710314F10863FF855F66F1DA78CC429B4C
                          APIs
                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040245B
                          • RegCloseKey.ADVAPI32(00000000), ref: 00402464
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CloseDeleteValue
                          • String ID:
                          • API String ID: 2831762973-0
                          • Opcode ID: 729ecf5bba26eed59db8e40ba0825d20aa39ecfc350fd83ab66bb719c7a4b8e3
                          • Instruction ID: 823524eaaa32c5521ce5516f6f818df3cdafdbc5371ac3c1d9ba599ed9425974
                          • Opcode Fuzzy Hash: 729ecf5bba26eed59db8e40ba0825d20aa39ecfc350fd83ab66bb719c7a4b8e3
                          • Instruction Fuzzy Hash: 46F06232A04520ABDB10BBA89A8DAEE62B5AF54314F11443FE502B71C1CAFC4D02976D
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,?), ref: 00405AB7
                          • GetLastError.KERNEL32 ref: 00405AC5
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                          • Instruction ID: 25953aab165e2e3bb2b5eb59dc1d6ee29197e23c9d0e5a802ce790cbbbfebc39
                          • Opcode Fuzzy Hash: 93d1f65b513afb97053b6d969de6af344d99c991354c8e43ed6bd2c6eb9068ab
                          • Instruction Fuzzy Hash: 33F0F4B1D1060EDADB00DFA4C6497EFBBB4AB04309F04812AD941B6281D7B982488FA9
                          APIs
                          • ShowWindow.USER32(00000000,00000000), ref: 00401F01
                          • EnableWindow.USER32(00000000,00000000), ref: 00401F0C
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Window$EnableShow
                          • String ID:
                          • API String ID: 1136574915-0
                          • Opcode ID: b342668e68410e2d968fedd3eb79c8682b657b25800b9077b5ecd2124e99ac37
                          • Instruction ID: a6cb0e5ea3b461fc76251f348ffd86be0a73501dc920cd99368f231d5504fafc
                          • Opcode Fuzzy Hash: b342668e68410e2d968fedd3eb79c8682b657b25800b9077b5ecd2124e99ac37
                          • Instruction Fuzzy Hash: F2E09A36A082049FE705EBA8AE484AEB3B0EB40325B200A7FE001F11C0CBB94C00866C
                          APIs
                          • GetModuleHandleA.KERNEL32(?,00000020,?,0040360C,0000000C,?,?,?,?,?,?,?,?), ref: 00406927
                          • GetProcAddress.KERNEL32(00000000,?), ref: 00406942
                            • Part of subcall function 004068A5: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004068BC
                            • Part of subcall function 004068A5: wsprintfW.USER32 ref: 004068F7
                            • Part of subcall function 004068A5: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040690B
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID:
                          • API String ID: 2547128583-0
                          • Opcode ID: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                          • Instruction ID: 5852e889d14e736f2df1098d3b7202b06462132acdc852f75f804bf3a6ff6809
                          • Opcode Fuzzy Hash: 38b25401b771ecf209a524bd0999a173af8b0ad39984603ae0a2953bb283c85e
                          • Instruction Fuzzy Hash: FCE08673604310EBD61056755D04D2773A8AF95A50302483EFD46F2144D738DC32A66A
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,80000000,00000003), ref: 00406015
                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406037
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                          • Instruction ID: 9d50a09f5748d4f60ef03139cc16a9656d1073ae209d3065c053d14625e31d4c
                          • Opcode Fuzzy Hash: 6be4d53c09d0ea7202590e2ef391dde9d68f005235e9a58d36352f422cb06a2c
                          • Instruction Fuzzy Hash: 87D09E31654301AFEF098F20DE16F2EBAA2EB84B00F11552CB682941E0DA715819DB15
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00000000,004034EF,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00405AD5
                          • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405AE3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                          • Instruction ID: c141ebc68f4164d0a3663fa1b1ea49181af819f28e12deb644bc081b11005b13
                          • Opcode Fuzzy Hash: 7ce514c051633c67dabed91c1ba2c830ad6f4192d7236d4c27a26ed09d9cb01d
                          • Instruction Fuzzy Hash: 5DC08C30300A02DACF000B218F087073950AB00380F19483AA582E00A0CA308044CD2D
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028B4
                            • Part of subcall function 00406468: wsprintfW.USER32 ref: 00406475
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: FilePointerwsprintf
                          • String ID:
                          • API String ID: 327478801-0
                          • Opcode ID: c408762c6ae6a09676534d13277c6868af0c4062816ce02b100207dfef7a20c8
                          • Instruction ID: 3ecce12b6213660a705480fd24811c4b14f3d13bc743ad81d22bf59cde18bc7d
                          • Opcode Fuzzy Hash: c408762c6ae6a09676534d13277c6868af0c4062816ce02b100207dfef7a20c8
                          • Instruction Fuzzy Hash: 8DE06D71904208AFDB01ABA5AA498AEB379EB44344B10483FF101B10C0CA794C119A2D
                          APIs
                          • SearchPathW.KERNELBASE(?,00000000,?,00000400,?,?,000000FF), ref: 0040174E
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: PathSearch
                          • String ID:
                          • API String ID: 2203818243-0
                          • Opcode ID: 96c3c64599610033e1741a12b780745032a27335a1d6010ee521e40a3137f023
                          • Instruction ID: 71d187b5cc8d7de3a3c01a98f906eab562aacc0ad357dac51c0352885440fd59
                          • Opcode Fuzzy Hash: 96c3c64599610033e1741a12b780745032a27335a1d6010ee521e40a3137f023
                          • Instruction Fuzzy Hash: D9E04871204104ABE700DB64DD48EAA7778DB5035CF20453AE511A60D1E6B55905971D
                          APIs
                          • WriteFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,?,?,0040347F,00000000,00414EC0,?,00414EC0,?,000000FF,00000004,00000000), ref: 004060D7
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                          • Instruction ID: de33e43015841e90b47a85578f5cc3acb86098a1fa118a6604a55d69533944a7
                          • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                          • Instruction Fuzzy Hash: 41E08C3224022AABCF109E508D00EEB3B6CEB003A0F018433FD26E2090D630E83197A4
                          APIs
                          • ReadFile.KERNELBASE(00000000,00000000,00000004,00000004,00000000,000000FF,?,004034B1,00000000,00000000,00403308,000000FF,00000004,00000000,00000000,00000000), ref: 004060A8
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                          • Instruction ID: fd87eb1c4e4509ee71b5dc1f82ee1534a3bbef2287d177a98c1a1ef8e7fccbc0
                          • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                          • Instruction Fuzzy Hash: 11E08C3229021AEBDF119E50CC00AEB7BACEB043A0F018436FD22E3180D671E83187A9
                          APIs
                          • VirtualProtect.KERNELBASE(701C505C,00000004,00000040,701C504C), ref: 701C2A9D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3732328148.00000000701C1000.00000020.00000001.01000000.00000004.sdmp, Offset: 701C0000, based on PE: true
                          • Associated: 00000000.00000002.3732308554.00000000701C0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732344875.00000000701C4000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732362879.00000000701C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_701c0000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: d022d9631aa6bfff8f1b15f3ec3880c396015be5e57ec1649b7de03932096c37
                          • Instruction ID: 9d2b33e990ed4dd5d844e1ba6c3b96c4e474bd3df7cd22692949deb021dd1785
                          • Opcode Fuzzy Hash: d022d9631aa6bfff8f1b15f3ec3880c396015be5e57ec1649b7de03932096c37
                          • Instruction Fuzzy Hash: 2CF0A5B2544280DEC350CF2A8C6472B3FE0B728308BB4456AF588D6A60E374C4E4DBA9
                          APIs
                          • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,0040641C,?,?,?,?,Call,?,00000000), ref: 004063B2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                          • Instruction ID: 99177681843bc7d8b33aa39255ce29306f0e35401c43de39655aaedf71f86506
                          • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                          • Instruction Fuzzy Hash: DAD0173204020DBBDF119E90ED01FAB3B6DAB08350F014826FE06A40A0D776D534ABA8
                          APIs
                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015B3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 58434a7e7cdfb0d0f19199f5504f69f984a7681d240ae9cdceb23cdc370956f4
                          • Instruction ID: f79479eb79e616cc8aec51f56aa6edc525cb8d4391243906608abe1f76efb7bb
                          • Opcode Fuzzy Hash: 58434a7e7cdfb0d0f19199f5504f69f984a7681d240ae9cdceb23cdc370956f4
                          • Instruction Fuzzy Hash: 3DD05B72B08204DBDB01DBE8EA48A9E73B09B50328F20893BD111F11D0D6B9C945A75D
                          APIs
                          • SetDlgItemTextW.USER32(?,?,00000000), ref: 004044BA
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: ItemText
                          • String ID:
                          • API String ID: 3367045223-0
                          • Opcode ID: 9f5f9317995870dd68fcf34551989b3f9c33a874f6e62bdf9e4bbf2fb329bfe5
                          • Instruction ID: ae2ead1ac10e0797e36fe1c05e7dcabccdaa2022beaf041c85de5a3ae6598913
                          • Opcode Fuzzy Hash: 9f5f9317995870dd68fcf34551989b3f9c33a874f6e62bdf9e4bbf2fb329bfe5
                          • Instruction Fuzzy Hash: C9C08C71008200BFD241BB08CC02F1FB3AAEF90325F00C42EB15CA10D2C63595308A26
                          APIs
                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044FE
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: c543a5305144ba01004fe0d35289a86565b01ad173ebec7ef44f324a9b2ac024
                          • Instruction ID: 5c877ab33ec7e7ab303c696e8a99d36134f19a60efc45403e0926baa73fdbb46
                          • Opcode Fuzzy Hash: c543a5305144ba01004fe0d35289a86565b01ad173ebec7ef44f324a9b2ac024
                          • Instruction Fuzzy Hash: 9AC09BF57413017BDA209F509D45F1777585790710F15453D7350F50E0CBB4E450D61D
                          APIs
                          • SendMessageW.USER32(00000028,?,00000001,00404300), ref: 004044E3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 0b5dc737e690c2697fce459c5807109f7a0ee7b6821d5e504b87bae23edcb368
                          • Instruction ID: a1e91a2b22b377b77c28deac9acb262fc7b3ebada01c3a2f9bc193e64980b6bc
                          • Opcode Fuzzy Hash: 0b5dc737e690c2697fce459c5807109f7a0ee7b6821d5e504b87bae23edcb368
                          • Instruction Fuzzy Hash: E9B09236690A40AADA215B00DE09F867B62A7A8701F008438B240640B0CAB204A1DB08
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00403247,?), ref: 004034C2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                          • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                          • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                          • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                          APIs
                          • KiUserCallbackDispatcher.NTDLL(?,00404299), ref: 004044CC
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CallbackDispatcherUser
                          • String ID:
                          • API String ID: 2492992576-0
                          • Opcode ID: 1338f86397f00e2d38996c3f1ae94053e56d426343b35a23e1e428530b57d47f
                          • Instruction ID: bf70c606a766814dc6d2ff6c1013b69bc1ca18b78975ad7518874070628387b3
                          • Opcode Fuzzy Hash: 1338f86397f00e2d38996c3f1ae94053e56d426343b35a23e1e428530b57d47f
                          • Instruction Fuzzy Hash: BEA00176544900ABCA16AB50EF0980ABB72BBA8701B528879A285510388B725921FB19
                          APIs
                          • VirtualAlloc.KERNELBASE(00000000), ref: 701C2C57
                          Memory Dump Source
                          • Source File: 00000000.00000002.3732328148.00000000701C1000.00000020.00000001.01000000.00000004.sdmp, Offset: 701C0000, based on PE: true
                          • Associated: 00000000.00000002.3732308554.00000000701C0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732344875.00000000701C4000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732362879.00000000701C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_701c0000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: fa27c35f1a1893ae4652323a06ac6751f1086de64e16746e6446324c00b5156c
                          • Instruction ID: b7aed2f75d6b314dde7959963604641324b9a99f74f643726654b6d560988e15
                          • Opcode Fuzzy Hash: fa27c35f1a1893ae4652323a06ac6751f1086de64e16746e6446324c00b5156c
                          • Instruction Fuzzy Hash: FA416C735002049FDB119FA5DD96B6F3B78FB74354F3084A9F406C6960D638E8A0DB95
                          APIs
                          • Sleep.KERNELBASE(00000000), ref: 004014EA
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 5065bf49ec89ca03d4d81e0e626b625f4b0a8bbe3ca9100aab93803b3529547f
                          • Instruction ID: a775f6773ee6fca20605c15f6de2f930d7ecc582f877687dc3caa15317c5c1fc
                          • Opcode Fuzzy Hash: 5065bf49ec89ca03d4d81e0e626b625f4b0a8bbe3ca9100aab93803b3529547f
                          • Instruction Fuzzy Hash: 8ED05E73A142008BD710EBB8BE854AF73B8EA403193204C3BD102E1191E6788902461C
                          APIs
                          • GlobalAlloc.KERNELBASE(00000040,?,701C12DB,?,701C137F,00000019,701C11CA,-000000A0), ref: 701C12C5
                          Memory Dump Source
                          • Source File: 00000000.00000002.3732328148.00000000701C1000.00000020.00000001.01000000.00000004.sdmp, Offset: 701C0000, based on PE: true
                          • Associated: 00000000.00000002.3732308554.00000000701C0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732344875.00000000701C4000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732362879.00000000701C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_701c0000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: AllocGlobal
                          • String ID:
                          • API String ID: 3761449716-0
                          • Opcode ID: f930c7c5b286903213ba831c3ab7468af236b4a04612c4fb176f0c1f65bef345
                          • Instruction ID: 84f723251f0919806357adf6da711d896dbf35e30594514c8ab93ca1d9c0301c
                          • Opcode Fuzzy Hash: f930c7c5b286903213ba831c3ab7468af236b4a04612c4fb176f0c1f65bef345
                          • Instruction Fuzzy Hash: 94B012726400009FEF008B15DC0AF363A64F700300F340010BB00C1450C560C8208534
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 004049E0
                          • SetWindowTextW.USER32(00000000,?), ref: 00404A0A
                          • SHBrowseForFolderW.SHELL32(?), ref: 00404ABB
                          • CoTaskMemFree.OLE32(00000000), ref: 00404AC6
                          • lstrcmpiW.KERNEL32(Call,00422F08,00000000,?,?), ref: 00404AF8
                          • lstrcatW.KERNEL32(?,Call), ref: 00404B04
                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404B16
                            • Part of subcall function 00405B65: GetDlgItemTextW.USER32(?,?,00000400,00404B4D), ref: 00405B78
                            • Part of subcall function 004067CF: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406832
                            • Part of subcall function 004067CF: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406841
                            • Part of subcall function 004067CF: CharNextW.USER32(?,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406846
                            • Part of subcall function 004067CF: CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406859
                          • GetDiskFreeSpaceW.KERNEL32(00420ED8,?,?,0000040F,?,00420ED8,00420ED8,?,00000001,00420ED8,?,?,000003FB,?), ref: 00404BD9
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404BF4
                            • Part of subcall function 00404D4D: lstrlenW.KERNEL32(00422F08,00422F08,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DEE
                            • Part of subcall function 00404D4D: wsprintfW.USER32 ref: 00404DF7
                            • Part of subcall function 00404D4D: SetDlgItemTextW.USER32(?,00422F08), ref: 00404E0A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                          • String ID: A$C:\Users\user\polaritets$Call
                          • API String ID: 2624150263-2366791404
                          • Opcode ID: 2c04f043fab078114f436bc2b0f460e04cb31fe4a389aa85165ae8fc382e2e95
                          • Instruction ID: 030197d704291a410dcd06cfc4277a043b64cd4f667f0077e3e502e998d69d3f
                          • Opcode Fuzzy Hash: 2c04f043fab078114f436bc2b0f460e04cb31fe4a389aa85165ae8fc382e2e95
                          • Instruction Fuzzy Hash: CBA1A0B1900208ABDB11AFA5DD45AAF77B8EF84314F11803BF611B62D1D77C9A418B6D
                          APIs
                          • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                          Strings
                          • C:\Users\user\polaritets, xrefs: 0040226E
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID: C:\Users\user\polaritets
                          • API String ID: 542301482-2790145093
                          • Opcode ID: 18b8905a52bb68317a5b1bf06e2d786d8dd953d3db2333650e4a3939e0f89523
                          • Instruction ID: 8307c529eb9feefa1617cd4f78f27985085e4fae61a1ffd37fb0b3adda41be3b
                          • Opcode Fuzzy Hash: 18b8905a52bb68317a5b1bf06e2d786d8dd953d3db2333650e4a3939e0f89523
                          • Instruction Fuzzy Hash: 00410575A00209AFCB40DFE4C989EAD7BB5FF48308B20456EF505EB2D1DB799982CB54
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: 6ffcda492f923abc76daec6159b81a3f5593eca79e3a3c3abc80d0637868bc28
                          • Instruction ID: a06f58704ac02dcae893024ea8a23b5ac4ca5f5a8623c8e138aed3c50dac2e18
                          • Opcode Fuzzy Hash: 6ffcda492f923abc76daec6159b81a3f5593eca79e3a3c3abc80d0637868bc28
                          • Instruction Fuzzy Hash: 44F05E71A04104AAD711EBE4E9499AEB378EF14314F60057BE101F21D0DBB84D019B2A
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 00404F25
                          • GetDlgItem.USER32(?,00000408), ref: 00404F30
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404F7A
                          • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00404F91
                          • SetWindowLongW.USER32(?,000000FC,0040551A), ref: 00404FAA
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404FBE
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404FD0
                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404FE6
                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404FF2
                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405004
                          • DeleteObject.GDI32(00000000), ref: 00405007
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405032
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040503E
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 004050D9
                          • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 00405109
                            • Part of subcall function 004044D5: SendMessageW.USER32(00000028,?,00000001,00404300), ref: 004044E3
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040511D
                          • GetWindowLongW.USER32(?,000000F0), ref: 0040514B
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405159
                          • ShowWindow.USER32(?,00000005), ref: 00405169
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 00405264
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 004052C9
                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 004052DE
                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405302
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405322
                          • ImageList_Destroy.COMCTL32(?), ref: 00405337
                          • GlobalFree.KERNEL32(?), ref: 00405347
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004053C0
                          • SendMessageW.USER32(?,00001102,?,?), ref: 00405469
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 00405478
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 004054A3
                          • ShowWindow.USER32(?,00000000), ref: 004054F1
                          • GetDlgItem.USER32(?,000003FE), ref: 004054FC
                          • ShowWindow.USER32(00000000), ref: 00405503
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 2564846305-813528018
                          • Opcode ID: 963d0e2195837636cb6f5b073c234fd9fc9862b141633064f8114fc5dd327728
                          • Instruction ID: 467e9106b9ab4b1e9b2d04e68362d71007c986f05034cc4a0cb7dcf353c6e141
                          • Opcode Fuzzy Hash: 963d0e2195837636cb6f5b073c234fd9fc9862b141633064f8114fc5dd327728
                          • Instruction Fuzzy Hash: 16029B70A00609EFDB20DF95DD45AAF7BB5FB44314F10817AE610BA2E1D7B98A42CF58
                          APIs
                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 004046FD
                          • GetDlgItem.USER32(?,000003E8), ref: 00404711
                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 0040472E
                          • GetSysColor.USER32(?), ref: 0040473F
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 0040474D
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 0040475B
                          • lstrlenW.KERNEL32(?), ref: 00404760
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 0040476D
                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404782
                          • GetDlgItem.USER32(?,0000040A), ref: 004047DB
                          • SendMessageW.USER32(00000000), ref: 004047E2
                          • GetDlgItem.USER32(?,000003E8), ref: 0040480D
                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 00404850
                          • LoadCursorW.USER32(00000000,00007F02), ref: 0040485E
                          • SetCursor.USER32(00000000), ref: 00404861
                          • LoadCursorW.USER32(00000000,00007F00), ref: 0040487A
                          • SetCursor.USER32(00000000), ref: 0040487D
                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 004048AC
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 004048BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                          • String ID: Call$N
                          • API String ID: 3103080414-3438112850
                          • Opcode ID: d465d3d5382bb59059b47d3503e7a252332af71f120e52871dcbc052c6d80ab7
                          • Instruction ID: fa786ba7610ecb1ae21ae2169d8ef808fc0b2da043ab7544d4c43deaa2774949
                          • Opcode Fuzzy Hash: d465d3d5382bb59059b47d3503e7a252332af71f120e52871dcbc052c6d80ab7
                          • Instruction Fuzzy Hash: 7F61B3B1A00209BFDB10AF64DD85A6A7B79FB84354F00843AFB05B61D0D7B9AD61CF58
                          APIs
                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextW.USER32(00000000,00428A20,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: fcc37e75e13d0dca8524aaa06a8ee829d240d30c68f9aadea354bd02ab1c226a
                          • Instruction ID: d1034cbb9d528375343357a353c0022e70e8214492c202610c441178c5bfc5cd
                          • Opcode Fuzzy Hash: fcc37e75e13d0dca8524aaa06a8ee829d240d30c68f9aadea354bd02ab1c226a
                          • Instruction Fuzzy Hash: FC417B71800249AFCB058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB74DA55DFA4
                          APIs
                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406302,?,?), ref: 004061A2
                          • GetShortPathNameW.KERNEL32(?,004265A8,00000400), ref: 004061AB
                            • Part of subcall function 00405F76: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040625B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F86
                            • Part of subcall function 00405F76: lstrlenA.KERNEL32(00000000,?,00000000,0040625B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB8
                          • GetShortPathNameW.KERNEL32(?,00426DA8,00000400), ref: 004061C8
                          • wsprintfA.USER32 ref: 004061E6
                          • GetFileSize.KERNEL32(00000000,00000000,00426DA8,C0000000,00000004,00426DA8,?,?,?,?,?), ref: 00406221
                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406230
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406268
                          • SetFilePointer.KERNEL32(0040A580,00000000,00000000,00000000,00000000,004261A8,00000000,-0000000A,0040A580,00000000,[Rename],00000000,00000000,00000000), ref: 004062BE
                          • GlobalFree.KERNEL32(00000000), ref: 004062CF
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004062D6
                            • Part of subcall function 00406011: GetFileAttributesW.KERNELBASE(00000003,004030C2,C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,80000000,00000003), ref: 00406015
                            • Part of subcall function 00406011: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00406037
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                          • String ID: %ls=%ls$[Rename]
                          • API String ID: 2171350718-461813615
                          • Opcode ID: ad23c2c12608704314c1a1c2d98a70ea5e027cecb5ac03fef5858bd56b87dd73
                          • Instruction ID: d8f03b5b48010a369f687ed07a259b5d04d98e8e290d987932ab0f9f84d7b5e4
                          • Opcode Fuzzy Hash: ad23c2c12608704314c1a1c2d98a70ea5e027cecb5ac03fef5858bd56b87dd73
                          • Instruction Fuzzy Hash: 89313230201325BFD6207B659D48F2B3A6CDF41714F12007EBA02F62C2EA7D98218ABD
                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406832
                          • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00406841
                          • CharNextW.USER32(?,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe",771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406846
                          • CharPrevW.USER32(?,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,00000000,004034D7,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00406859
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 004067D0
                          • *?|<>/":, xrefs: 00406821
                          • "C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe", xrefs: 00406813
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"$*?|<>/":$C:\Users\user~1\AppData\Local\Temp\
                          • API String ID: 589700163-2468298975
                          • Opcode ID: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                          • Instruction ID: 2d41fa7b6770246c30beeceb47eb68b435a53440eacd13368e2f30b8c56315d6
                          • Opcode Fuzzy Hash: d9890b2689dddc4776a4db6af1629ac80bd1bcc56ba6148264ccbff8cf15ab87
                          • Instruction Fuzzy Hash: A511935680121296DB303B14CC44ABB66E8AF54794F52C03FE999732C1E77C5C9296BD
                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 00404524
                          • GetSysColor.USER32(00000000), ref: 00404562
                          • SetTextColor.GDI32(?,00000000), ref: 0040456E
                          • SetBkMode.GDI32(?,?), ref: 0040457A
                          • GetSysColor.USER32(?), ref: 0040458D
                          • SetBkColor.GDI32(?,?), ref: 0040459D
                          • DeleteObject.GDI32(?), ref: 004045B7
                          • CreateBrushIndirect.GDI32(?), ref: 004045C1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                          • Instruction ID: 524417ed32742d4b72cd17798d780815826fd18a7bcb7bb0f1ed1fdd1052d135
                          • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                          • Instruction Fuzzy Hash: B22135B1500705AFCB319F78DD08B577BF5AF81714B048A2DEA96A26E0D738D944CB54
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 701C25C2
                            • Part of subcall function 701C12CC: lstrcpynW.KERNEL32(00000000,?,701C137F,00000019,701C11CA,-000000A0), ref: 701C12DC
                          • GlobalAlloc.KERNEL32(00000040), ref: 701C2548
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 701C2563
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3732328148.00000000701C1000.00000020.00000001.01000000.00000004.sdmp, Offset: 701C0000, based on PE: true
                          • Associated: 00000000.00000002.3732308554.00000000701C0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732344875.00000000701C4000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732362879.00000000701C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_701c0000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                          • String ID: @H3w
                          • API String ID: 4216380887-4275297014
                          • Opcode ID: c944477257a2c6920e839515054f67bd327e1f24b9ef15753396424a4b34abc5
                          • Instruction ID: 8eec5f38a7e45f98fafefb3bbbb3deab5e6db6c7dc9aa9dc2223cd3966cd2a24
                          • Opcode Fuzzy Hash: c944477257a2c6920e839515054f67bd327e1f24b9ef15753396424a4b34abc5
                          • Instruction Fuzzy Hash: 11418BB1008205DFD7189F25D854BAF7BB8FB78310F2149ADF94687A90EB70E544DB61
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404E76
                          • GetMessagePos.USER32 ref: 00404E7E
                          • ScreenToClient.USER32(?,?), ref: 00404E98
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404EAA
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404ED0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                          • Instruction ID: cfceae8db68972c520d490933057d7cb8d8acba3ea2256e028311c612775fba1
                          • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                          • Instruction Fuzzy Hash: A3015E7190021CBADB00DB94DD85BFFBBBCAF95B11F10412BBA51B61D0C7B49A418BA4
                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FB6
                          • MulDiv.KERNEL32(0008A6E8,00000064,0008A8EC), ref: 00402FE1
                          • wsprintfW.USER32 ref: 00402FF1
                          • SetWindowTextW.USER32(?,?), ref: 00403001
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00403013
                          Strings
                          • verifying installer: %d%%, xrefs: 00402FEB
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: verifying installer: %d%%
                          • API String ID: 1451636040-82062127
                          • Opcode ID: 7c72eb226873640f15370cd8631d515f33e7e0e766319f11269e715f4bf9c46b
                          • Instruction ID: f83dc0eaaa7e9df2961e53678d13a3899a4bf5fcca0c0537cb294ee04905d4b1
                          • Opcode Fuzzy Hash: 7c72eb226873640f15370cd8631d515f33e7e0e766319f11269e715f4bf9c46b
                          • Instruction Fuzzy Hash: EF014F71640208BBEF209F60DD49FEE3B69AB44345F108039FA06A51D0DBB99A559F58
                          APIs
                            • Part of subcall function 701C12BB: GlobalAlloc.KERNELBASE(00000040,?,701C12DB,?,701C137F,00000019,701C11CA,-000000A0), ref: 701C12C5
                          • GlobalFree.KERNEL32(?), ref: 701C2743
                          • GlobalFree.KERNEL32(00000000), ref: 701C2778
                          Memory Dump Source
                          • Source File: 00000000.00000002.3732328148.00000000701C1000.00000020.00000001.01000000.00000004.sdmp, Offset: 701C0000, based on PE: true
                          • Associated: 00000000.00000002.3732308554.00000000701C0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732344875.00000000701C4000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732362879.00000000701C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_701c0000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 10190cf44f148025f833f1e60989072eede437eb717b7111fa5a4629d6c6eb62
                          • Instruction ID: 9e45d14817b2502cdb2eb474079383aae5062158aba9d084d469f51e4f921201
                          • Opcode Fuzzy Hash: 10190cf44f148025f833f1e60989072eede437eb717b7111fa5a4629d6c6eb62
                          • Instruction Fuzzy Hash: 8D31BE72508201DFC7168F55CDD4E6F7BBAFBB630433145A9F60283A20C770E8649B61
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                          • GlobalFree.KERNEL32(?), ref: 00402A0B
                          • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                          • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                          • String ID:
                          • API String ID: 2667972263-0
                          • Opcode ID: b07bb42a36a53ac2b652948ec131e563e6f6be8de0f89c4bf93d81cf64cebf1f
                          • Instruction ID: 66908bbe9354c3b59104e874c770ae4161d9466efedc1f742b63756e9967f80f
                          • Opcode Fuzzy Hash: b07bb42a36a53ac2b652948ec131e563e6f6be8de0f89c4bf93d81cf64cebf1f
                          • Instruction Fuzzy Hash: 54319E71900128ABCF21AFA5CE49D9E7E79AF44364F10423AF514762E1CB794C429FA8
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3732328148.00000000701C1000.00000020.00000001.01000000.00000004.sdmp, Offset: 701C0000, based on PE: true
                          • Associated: 00000000.00000002.3732308554.00000000701C0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732344875.00000000701C4000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732362879.00000000701C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_701c0000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: FreeGlobal
                          • String ID:
                          • API String ID: 2979337801-0
                          • Opcode ID: edbd402a6cab877b8b9b36fbec96f2a0b1393b283ebf15d4ae6b54635ce9890a
                          • Instruction ID: 44373922988d6d9882321a5b21476bcfd3360bf778bf8c96e670064f9f64ef32
                          • Opcode Fuzzy Hash: edbd402a6cab877b8b9b36fbec96f2a0b1393b283ebf15d4ae6b54635ce9890a
                          • Instruction Fuzzy Hash: AC51D432D80159AECB029FA4C8407AFBBBAEF77314F23815DE406A3714E671ED458B91
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00401D9F
                          • GetClientRect.USER32(?,?), ref: 00401DEA
                          • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                          • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                          • DeleteObject.GDI32(00000000), ref: 00401E3E
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: b4553b6f8f96a3615d4cb1d74016621c3cb3daa09826911c1e5c071ec9b0e61c
                          • Instruction ID: 002387d4b88dbb62f40c54eb0dee3f9a721ef30fc2dbb8ae50818b7fec09efb0
                          • Opcode Fuzzy Hash: b4553b6f8f96a3615d4cb1d74016621c3cb3daa09826911c1e5c071ec9b0e61c
                          • Instruction Fuzzy Hash: 0F21F872A00119AFCB15DF98DE45AEEBBB5EB08304F14003AF945F62A0D7789D41DB98
                          APIs
                          • GetDC.USER32(?), ref: 00401E56
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                          • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                          • ReleaseDC.USER32(?,00000000), ref: 00401E89
                          • CreateFontIndirectW.GDI32(0040CDC8), ref: 00401ED8
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectRelease
                          • String ID:
                          • API String ID: 3808545654-0
                          • Opcode ID: 12fc5c0feb0b51e7a773ba9164babbc76b3b82788c0ea370a0f868ab0e4caa48
                          • Instruction ID: 1c21784e8a12ec6bf8935da156a17e2c336e66cb5fe6e154f3a2125ab74843e9
                          • Opcode Fuzzy Hash: 12fc5c0feb0b51e7a773ba9164babbc76b3b82788c0ea370a0f868ab0e4caa48
                          • Instruction Fuzzy Hash: 5A018871954240EFE7015BB4AE9ABDD3FB5AF15301F10497AF141B61E2C6B90445DB3C
                          APIs
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,701C22D8,?,00000808), ref: 701C16D5
                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,701C22D8,?,00000808), ref: 701C16DC
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,701C22D8,?,00000808), ref: 701C16F0
                          • GetProcAddress.KERNEL32(701C22D8,00000000), ref: 701C16F7
                          • GlobalFree.KERNEL32(00000000), ref: 701C1700
                          Memory Dump Source
                          • Source File: 00000000.00000002.3732328148.00000000701C1000.00000020.00000001.01000000.00000004.sdmp, Offset: 701C0000, based on PE: true
                          • Associated: 00000000.00000002.3732308554.00000000701C0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732344875.00000000701C4000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732362879.00000000701C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_701c0000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                          • String ID:
                          • API String ID: 1148316912-0
                          • Opcode ID: fd7fe89706c68dc66746fa7f553d5a1396756c7146a5e464841c5ad73f91cfed
                          • Instruction ID: 254172a4c89638eae0595a2b8e6f22fac2914db54a6326e4ecfa53aaf1ddace4
                          • Opcode Fuzzy Hash: fd7fe89706c68dc66746fa7f553d5a1396756c7146a5e464841c5ad73f91cfed
                          • Instruction Fuzzy Hash: CAF0127314A1387BD62017A79C4CDDB7E9DEF8B2F5B110225F718911A085618C11D7F1
                          APIs
                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 0b60248b2d317c3fadb7ed9affa728e8142f9e62085aaabdbec9824b10747ad3
                          • Instruction ID: dc9a0f57bab323a5eda2152a626e9899419b02716f24503a8b80c8a4184e75e9
                          • Opcode Fuzzy Hash: 0b60248b2d317c3fadb7ed9affa728e8142f9e62085aaabdbec9824b10747ad3
                          • Instruction Fuzzy Hash: E921AD71D1421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98
                          APIs
                          • lstrlenW.KERNEL32(00422F08,00422F08,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404DEE
                          • wsprintfW.USER32 ref: 00404DF7
                          • SetDlgItemTextW.USER32(?,00422F08), ref: 00404E0A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s
                          • API String ID: 3540041739-3551169577
                          • Opcode ID: 808c56ceb77bc8fa6bb0a4fcfba6dc4e55d7e9e185af3d36fc5e6f51395c7837
                          • Instruction ID: 33e626053c854acaf0ea976fdeb40ece7b69d158cb37adfcb571004cb6629101
                          • Opcode Fuzzy Hash: 808c56ceb77bc8fa6bb0a4fcfba6dc4e55d7e9e185af3d36fc5e6f51395c7837
                          • Instruction Fuzzy Hash: 2C11EB7360412877DB00666DAC46EAE329DDF85334F250237FA66F31D5EA79C92242E8
                          APIs
                          • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00000023,00000011,00000002), ref: 004024DA
                          • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00000000,00000011,00000002), ref: 0040251A
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00000000,00000011,00000002), ref: 00402602
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CloseValuelstrlen
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp
                          • API String ID: 2655323295-4219337211
                          • Opcode ID: 8b31c99460fdf6c2949f4debf72b45d412ee72b0ef63aad6f5470ffe0bc1fffc
                          • Instruction ID: 9515a87f615354861ff9cc8d48f56862c3e7cd04d157db2ad705c0a1b7eb65e0
                          • Opcode Fuzzy Hash: 8b31c99460fdf6c2949f4debf72b45d412ee72b0ef63aad6f5470ffe0bc1fffc
                          • Instruction Fuzzy Hash: 45116D71900118BEEB11EFA5DE59AAEBAB4AF54318F10443FF504B61C1C7B98E419A58
                          APIs
                            • Part of subcall function 00406521: lstrcpynW.KERNEL32(?,?,00000400,0040366E,00428A20,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040652E
                            • Part of subcall function 00405E9B: CharNextW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,?,00405F0F,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"), ref: 00405EA9
                            • Part of subcall function 00405E9B: CharNextW.USER32(00000000), ref: 00405EAE
                            • Part of subcall function 00405E9B: CharNextW.USER32(00000000), ref: 00405EC6
                          • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"), ref: 00405F51
                          • GetFileAttributesW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,00000000,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\), ref: 00405F61
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user~1\AppData\Local\Temp\nss458C.tmp
                          • API String ID: 3248276644-944238664
                          • Opcode ID: db39f955a116f1e539d990513461dc7a207fa728de065fffbfa736c70f2b9a34
                          • Instruction ID: 4f97f4adca9055af25af7ef058e1e83d315c20be799ec2f088cafe79a8eb74c9
                          • Opcode Fuzzy Hash: db39f955a116f1e539d990513461dc7a207fa728de065fffbfa736c70f2b9a34
                          • Instruction Fuzzy Hash: DAF0F435115E5326D622323A2C49AAF1A05CEC2324B55453FF891B22C2DF3C89538DBE
                          APIs
                          • CharNextW.USER32(?,?,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,?,00405F0F,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,C:\Users\user~1\AppData\Local\Temp\nss458C.tmp,771B3420,?,C:\Users\user~1\AppData\Local\Temp\,00405C4D,?,771B3420,C:\Users\user~1\AppData\Local\Temp\,"C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe"), ref: 00405EA9
                          • CharNextW.USER32(00000000), ref: 00405EAE
                          • CharNextW.USER32(00000000), ref: 00405EC6
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\nss458C.tmp, xrefs: 00405E9C
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CharNext
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp
                          • API String ID: 3213498283-4219337211
                          • Opcode ID: a019630038ff328a8ec37a6ad8a5e0fa1ea3fa9b42c133706ff5938ffc5cdd25
                          • Instruction ID: c4cc3313bff2df52cb6c0caf4e8c88866a305d48728ab5da0ab5d468dade8cef
                          • Opcode Fuzzy Hash: a019630038ff328a8ec37a6ad8a5e0fa1ea3fa9b42c133706ff5938ffc5cdd25
                          • Instruction Fuzzy Hash: E4F0F631910F2595DA317764CC44E7766B8EB54351B00803BD282B36C1DBF88A819FEA
                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,004034E9,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00405DF6
                          • CharPrevW.USER32(?,00000000,?,C:\Users\user~1\AppData\Local\Temp\,004034E9,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,004037E6,?,00000008,0000000A,0000000C), ref: 00405E00
                          • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405E12
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405DF0
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user~1\AppData\Local\Temp\
                          • API String ID: 2659869361-2382934351
                          • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                          • Instruction ID: dcf52917e326d6ada13c2a72ecce68a7b96b6e8782615359caad44c872c99b85
                          • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                          • Instruction Fuzzy Hash: EBD05EB1101634AAC2116B48AC04CDF62AC9E86704381402AF141B20A6C7785D6296ED
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 701C1171
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 701C11E3
                          • GlobalFree.KERNEL32 ref: 701C124A
                          • GlobalFree.KERNEL32(?), ref: 701C129B
                          • GlobalFree.KERNEL32(00000000), ref: 701C12B1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3732328148.00000000701C1000.00000020.00000001.01000000.00000004.sdmp, Offset: 701C0000, based on PE: true
                          • Associated: 00000000.00000002.3732308554.00000000701C0000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732344875.00000000701C4000.00000002.00000001.01000000.00000004.sdmpDownload File
                          • Associated: 00000000.00000002.3732362879.00000000701C6000.00000002.00000001.01000000.00000004.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_701c0000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: a0b4d21306e992031b4c9411e066762e5f2d75c99c6aec7f0a11c5410cba7ee5
                          • Instruction ID: ee34be766da49b1eaeb505768981bd721aeb1dcb5202218d5e49cbba40145b37
                          • Opcode Fuzzy Hash: a0b4d21306e992031b4c9411e066762e5f2d75c99c6aec7f0a11c5410cba7ee5
                          • Instruction Fuzzy Hash: F4519FBA580201DFD700CF69C855B6B7BB8FB26315B264129FA06DBB20E774ED60CB50
                          APIs
                          • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll), ref: 0040269A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: lstrlen
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nss458C.tmp$C:\Users\user~1\AppData\Local\Temp\nss458C.tmp\System.dll
                          • API String ID: 1659193697-731789202
                          • Opcode ID: 34c7efb81093797c11027e5546ec3e843140785abad449b49019a9492c78efcd
                          • Instruction ID: 24c820640bf83c35ca015f911653a3ecbd9f7363fc1a8715c972f2d02b23d4ac
                          • Opcode Fuzzy Hash: 34c7efb81093797c11027e5546ec3e843140785abad449b49019a9492c78efcd
                          • Instruction Fuzzy Hash: 11113A72A40311BBCB00BBB19E46EAE36709F50748F60443FF402F61C0D6FD4991565E
                          APIs
                          • DestroyWindow.USER32(00000000,00000000,004031FC,00000001), ref: 00403031
                          • GetTickCount.KERNEL32 ref: 0040304F
                          • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 0040306C
                          • ShowWindow.USER32(00000000,00000005), ref: 0040307A
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Window$CountCreateDestroyDialogParamShowTick
                          • String ID:
                          • API String ID: 2102729457-0
                          • Opcode ID: 1f524868e2ec5e9a115d67c2f52ec07950574c6e8f58c79c8196e6c31eccfe04
                          • Instruction ID: fc94ebd698381dfc42c8ec832a7b78cf8da54aaf5e1058e2af7a384a9ccf94d3
                          • Opcode Fuzzy Hash: 1f524868e2ec5e9a115d67c2f52ec07950574c6e8f58c79c8196e6c31eccfe04
                          • Instruction Fuzzy Hash: 0FF05471602621ABC6306F50BD08A9B7E69FB44B53F41087AF045B11A9CB7548828B9C
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00405549
                          • CallWindowProcW.USER32(?,?,?,?), ref: 0040559A
                            • Part of subcall function 004044EC: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004044FE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: 8a6e7ab2b2ebc920f12c2d5b2b2096f2e9954bb0ec9a095f665350d4b71d8349
                          • Instruction ID: 85372f17a9103eb01fcdfd8a19690b8d052d76dd043ca16804f8a0d8951f02ed
                          • Opcode Fuzzy Hash: 8a6e7ab2b2ebc920f12c2d5b2b2096f2e9954bb0ec9a095f665350d4b71d8349
                          • Instruction Fuzzy Hash: 53017171200609BFDF309F51DD80AAB362AFB84750F540437FA047A1D5C7B98D52AE69
                          APIs
                          • FreeLibrary.KERNEL32(?,771B3420,00000000,C:\Users\user~1\AppData\Local\Temp\,00403B36,00403A4C,?,?,00000008,0000000A,0000000C), ref: 00403B78
                          • GlobalFree.KERNEL32(0064F920), ref: 00403B7F
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00403B5E
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: C:\Users\user~1\AppData\Local\Temp\
                          • API String ID: 1100898210-2382934351
                          • Opcode ID: 628ac1cb43285a1a84ac4c7f875ed8910a03c7a164280e3efa8a6a131abbe062
                          • Instruction ID: 6899552f53244e150386b1952d758f3f927a5bb415edc3c38dc9ad64461d36a3
                          • Opcode Fuzzy Hash: 628ac1cb43285a1a84ac4c7f875ed8910a03c7a164280e3efa8a6a131abbe062
                          • Instruction Fuzzy Hash: 59E08C3250102057CA211F05ED04B1AB7B8AF45B27F06452AE8407B26287B42C838FD8
                          APIs
                          • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,004030EE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,80000000,00000003), ref: 00405E42
                          • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,004030EE,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,C:\Users\user\Desktop\D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.bat.exe,80000000,00000003), ref: 00405E52
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-3976562730
                          • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                          • Instruction ID: eba18341e72c17137544591cfc51a7e4cac6184970473274e9d14fc4341c5a90
                          • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                          • Instruction Fuzzy Hash: 29D0A7F3400A30DAC3127708EC00D9F77ACEF16700746443AE580A7165D7785D818AEC
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,0040625B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405F86
                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405F9E
                          • CharNextA.USER32(00000000,?,00000000,0040625B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FAF
                          • lstrlenA.KERNEL32(00000000,?,00000000,0040625B,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405FB8
                          Memory Dump Source
                          • Source File: 00000000.00000002.3730327161.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3730308677.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730345197.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730364224.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3730459254.000000000044C000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_D#U00dcZELT#U0130LD#U0130 S#U00d6ZLE#U015eME-pdf.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                          • Instruction ID: baa81b9806bcf2d0018ef5e19b9a589e3df5f1c452cb3fab7a363fd504aebd5e
                          • Opcode Fuzzy Hash: 2e04212541fd7d2d0fc4f715182178ccf0de62a07a1c27cf83518a5c6c9cf375
                          • Instruction Fuzzy Hash: 87F0C231105914EFCB029BA5CE00D9EBFA8EF15254B2100BAE840F7250D638DE019BA8