Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PEDIDO-144797.exe

Overview

General Information

Sample name:PEDIDO-144797.exe
Analysis ID:1525501
MD5:2c5483106fe248cced82541b91cba20e
SHA1:41e69017b26287ee7814bb35a967672ba58cb714
SHA256:2702bb251c14965787b39f03a9c41000b9b0421528578e5a6a221ad8b27f182d
Tags:exeuser-lowmal3
Infos:

Detection

GuLoader
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
PE / OLE file has an invalid certificate
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • PEDIDO-144797.exe (PID: 7252 cmdline: "C:\Users\user\Desktop\PEDIDO-144797.exe" MD5: 2C5483106FE248CCED82541B91CBA20E)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.4137149835.000000000327F000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: PEDIDO-144797.exeAvira: detected
    Source: PEDIDO-144797.exeReversingLabs: Detection: 34%
    Source: PEDIDO-144797.exeVirustotal: Detection: 38%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 80.2% probability
    Source: PEDIDO-144797.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: PEDIDO-144797.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_004066F3 FindFirstFileW,FindClose,0_2_004066F3
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405ABE
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00402862 FindFirstFileW,0_2_00402862
    Source: PEDIDO-144797.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00405553 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405553
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403489
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeFile created: C:\Windows\resources\0809Jump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00404D900_2_00404D90
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00406ABA0_2_00406ABA
    Source: PEDIDO-144797.exeStatic PE information: invalid certificate
    Source: PEDIDO-144797.exe, 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameloyaliteters radierne.exeR vs PEDIDO-144797.exe
    Source: PEDIDO-144797.exeBinary or memory string: OriginalFilenameloyaliteters radierne.exeR vs PEDIDO-144797.exe
    Source: PEDIDO-144797.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
    Source: classification engineClassification label: mal72.troj.evad.winEXE@1/8@0/0
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403489
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00404814 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404814
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_004020FE CoCreateInstance,0_2_004020FE
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeFile created: C:\Users\user\AppData\Local\Temp\nsnA7A7.tmpJump to behavior
    Source: PEDIDO-144797.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: PEDIDO-144797.exeReversingLabs: Detection: 34%
    Source: PEDIDO-144797.exeVirustotal: Detection: 38%
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeFile read: C:\Users\user\Desktop\PEDIDO-144797.exeJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeFile written: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Gaulin.iniJump to behavior
    Source: PEDIDO-144797.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.4137149835.000000000327F000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_10002DE0 push eax; ret 0_2_10002E0E
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeFile created: C:\Users\user\AppData\Local\Temp\nskAD56.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeRDTSC instruction interceptor: First address: 39BD445 second address: 39BD445 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F5631033F48h 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 test cl, bl 0x0000000a rdtsc
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nskAD56.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_004066F3 FindFirstFileW,FindClose,0_2_004066F3
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00405ABE CloseHandle,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405ABE
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00402862 FindFirstFileW,0_2_00402862
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeAPI call chain: ExitProcess graph end nodegraph_0-4672
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeAPI call chain: ExitProcess graph end nodegraph_0-4514
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_10001B18 GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_10001B18
    Source: C:\Users\user\Desktop\PEDIDO-144797.exeCode function: 0_2_00403489 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,GetModuleHandleW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403489
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Access Token Manipulation
    LSASS Memory3
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    Obfuscated Files or Information
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    PEDIDO-144797.exe34%ReversingLabsWin32.Trojan.Guloader
    PEDIDO-144797.exe39%VirustotalBrowse
    PEDIDO-144797.exe100%AviraHEUR/AGEN.1331786
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nskAD56.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nskAD56.tmp\System.dll0%VirustotalBrowse
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    No contacted domains info
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorErrorPEDIDO-144797.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1525501
    Start date and time:2024-10-04 10:41:09 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 16s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:PEDIDO-144797.exe
    Detection:MAL
    Classification:mal72.troj.evad.winEXE@1/8@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 48
    • Number of non-executed functions: 33
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtSetInformationFile calls found.
    No simulations
    No context
    No context
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nskAD56.tmp\System.dllrpedido-002297.exeGet hashmaliciousFormBook, GuLoaderBrowse
      rpedido-002297.exeGet hashmaliciousGuLoaderBrowse
        FACTURA-002297.exeGet hashmaliciousFormBook, GuLoaderBrowse
          FACTURA-002297.exeGet hashmaliciousGuLoaderBrowse
            LisectAVT_2403002A_41.exeGet hashmaliciousGuLoaderBrowse
              LisectAVT_2403002A_41.exeGet hashmaliciousGuLoaderBrowse
                Inventory_list.img.exeGet hashmaliciousGuLoaderBrowse
                  Inventory_list.img.exeGet hashmaliciousGuLoaderBrowse
                    sF2s1EQU7T.exeGet hashmaliciousRemcos, GuLoaderBrowse
                      sF2s1EQU7T.exeGet hashmaliciousGuLoaderBrowse
                        Process:C:\Users\user\Desktop\PEDIDO-144797.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):11776
                        Entropy (8bit):5.659384359264642
                        Encrypted:false
                        SSDEEP:192:ex24sihno00Wfl97nH6BenXwWobpWBTtvShJ5omi7dJWjOlESlS:h8QIl972eXqlWBFSt273YOlEz
                        MD5:8B3830B9DBF87F84DDD3B26645FED3A0
                        SHA1:223BEF1F19E644A610A0877D01EADC9E28299509
                        SHA-256:F004C568D305CD95EDBD704166FCD2849D395B595DFF814BCC2012693527AC37
                        SHA-512:D13CFD98DB5CA8DC9C15723EEE0E7454975078A776BCE26247228BE4603A0217E166058EBADC68090AFE988862B7514CB8CB84DE13B3DE35737412A6F0A8AC03
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        • Antivirus: Virustotal, Detection: 0%, Browse
                        Joe Sandbox View:
                        • Filename: rpedido-002297.exe, Detection: malicious, Browse
                        • Filename: rpedido-002297.exe, Detection: malicious, Browse
                        • Filename: FACTURA-002297.exe, Detection: malicious, Browse
                        • Filename: FACTURA-002297.exe, Detection: malicious, Browse
                        • Filename: LisectAVT_2403002A_41.exe, Detection: malicious, Browse
                        • Filename: LisectAVT_2403002A_41.exe, Detection: malicious, Browse
                        • Filename: Inventory_list.img.exe, Detection: malicious, Browse
                        • Filename: Inventory_list.img.exe, Detection: malicious, Browse
                        • Filename: sF2s1EQU7T.exe, Detection: malicious, Browse
                        • Filename: sF2s1EQU7T.exe, Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1...u.u.u...s.u.a....r.!..q....t....t.Richu.........................PE..L.....uY...........!..... ...........'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text............ .................. ..`.rdata..S....0.......$..............@..@.data...x....@.......(..............@....reloc..`....P.......*..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\PEDIDO-144797.exe
                        File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 128.000000
                        Category:dropped
                        Size (bytes):1351482
                        Entropy (8bit):3.8030631093315117
                        Encrypted:false
                        SSDEEP:12288:XUR9g6MjY8GxRAdKo0osUCB2EEwHDU0A0K:me9iksZDUrR
                        MD5:8E04282016EA8D1111880479A030A8A6
                        SHA1:059CCFFC09B8E61970C6EBDBCE89149A062391AC
                        SHA-256:27872B886B7698DC8022D1C6778718078943618129B34243B01423CDAC666399
                        SHA-512:1644DE47AD5EEBAC529A27DF4A9913B76BF59DFFFDC3D171D236001F4E314E66937924D39C808F6D5D610E40F17E4C292676A1FA6D387C439D22BE16A403301E
                        Malicious:false
                        Reputation:low
                        Preview:.9......,.......................`).......8......j9..........................................................................................................................................................................................................................................G...J...............j...............................................................................................................................U...............*.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\PEDIDO-144797.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):195680
                        Entropy (8bit):7.540352859140884
                        Encrypted:false
                        SSDEEP:3072:IDjEODVJUk6F2MnnHRmmMrpz65eXlpKF0Zo5Mj0IOsC8G5f4X:G/DTsRHd5eXlpA5Mjfg8GG
                        MD5:9FD1449B3FE19BB534F0EB4492F90BCF
                        SHA1:543398F96D8E44F2E6D84767EA7B63AFFF762CF4
                        SHA-256:B4B4DD4D573FE0F78FADAD65AE104AEA7E7237414B0D7430691FE75D57243399
                        SHA-512:BF74461BD40E2276170903A3D352A98C79EDB7F3DE1E1B2C220FAFFDBABD5744D3EF1DD2BBBA8C394F61937D9B6C477022CC54835F19D6CD84A554C7AFF2982A
                        Malicious:false
                        Reputation:low
                        Preview:..T..DD................'.vvv..................=.P...??.......+....''''....a..d..%..........................ss........k...............BBB....B.....X........'.........K.!!.r..........b......................;;..................o......4...^^^.....J........EEE......''.vv.........pp........~.00...........AA......).........Y.....k...............``......nn.......{..ww._.........I.....XXXX......sss.....K...........nnn..........8........99999.......^...1.........O.......(...>....................cc..............I....G.....Z.-.........ii..................................*........CC..X.99.[..........x...........~~~.+++...%..LLL.............T...........+++............U...........v...........OOO..............DDDDDD......M.......t.u.22................J..S.6.....g...............zz...........E.......J..................*...M..-....0....j.eee.......................!!.<............c......:...........................................p...9................................................S....$$$.~~........4...
                        Process:C:\Users\user\Desktop\PEDIDO-144797.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):523
                        Entropy (8bit):4.30492942039079
                        Encrypted:false
                        SSDEEP:12:nGy3qcf5opzE6vCdgLMc/Uqv7FE7KRbqYUH6uN0u8vM:GEpxoy6adY/UqvZEwbql6uNh
                        MD5:B33890A43FB0F38B6DDF18C5BCEFE234
                        SHA1:80ED178A92C2B5CB530AEE4673FFC9011EBF86BB
                        SHA-256:3BF02F982A76A4C896FDA78C1C4B2B730D690DD86475213DC415269D4629407B
                        SHA-512:169E2D067337BF05BA08D615CE61B28CA4FD93D204966B3386FB4B373D9BACD689BEE3DDC5E04A4F19586E585263F62BC40B0944A10E5867C63C9C7236A5CC48
                        Malicious:false
                        Reputation:low
                        Preview:clisiocampa percussing acronyctous petitesses pilgrimsrejser zygosphene miasmology konkyljens..labelable kraftls veneries symbolically duncan sulemadens,logopdisk genuinenesses pseudoinspirational bekenderen.franciscanism krftcellers drylots toksikologiskes rottegiftes impecuniary slisken autokratiets hjertebaandet banegaardsbygningen choenix..adrenocorticotropic mangfoldigheders avisudvikling ekstremitetens skamsloges nrede unpersuasion trachling tvrformatets..negerbolle suppressionen lustful bagels flamenco selrets,
                        Process:C:\Users\user\Desktop\PEDIDO-144797.exe
                        File Type:ASCII text, with very long lines (65536), with no line terminators
                        Category:dropped
                        Size (bytes):454032
                        Entropy (8bit):2.653031104800933
                        Encrypted:false
                        SSDEEP:1536:zjFc1Ku+6ADOlig8DEq4a/LERvjSJCphiN5zCPS63cNg6KW0E5hF/vnYXW2ngfMl:i1vAd6BqP0oheUCH3uK4DEEEhH
                        MD5:0C22814BB5A9B974CE322212EF915A81
                        SHA1:5B0BB3F2F3BA28D3026A9C0528A91E533993A5AD
                        SHA-256:2C2E91A87B41D74F121D2EA5D92BFBA0C802028F297E32894C34A3DFB28FDC3A
                        SHA-512:8A6DB227CEDEB8862910DEFCC64378BD0DE5C6A7EA9479E6BFC02419FF4883F15DE4F5560232196041CF732A3EFFE5E8AE2E7BEF1E7E0FB2CA3209C7AB07C769
                        Malicious:false
                        Reputation:low
                        Preview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
                        Process:C:\Users\user\Desktop\PEDIDO-144797.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):276551
                        Entropy (8bit):1.2459972317120458
                        Encrypted:false
                        SSDEEP:768:q5eLWls2nEEvz9mAEPesDf7zRhfRKrtTgtOnumyYJBW+JAILJcqhOzwnasNP2r2J:q86nLDJnJuki2BaFsfRz
                        MD5:0071DC51C79F0655F0BB77074D56B1D7
                        SHA1:9617AE1434B07532BAAF39D69CF720C05B85E8F9
                        SHA-256:0628FA8F44795D79D5B855E8387985E04D134E8B57FE4D57E663FBAED278DF89
                        SHA-512:E2149E9F3B18DCB50E49EC51226D7A6BF3969E119B385410E80E431024B25A938C965C743D80C0C1D8A3820D0DDDA14464CAC75F73AE22F259B447264F8431BA
                        Malicious:false
                        Reputation:low
                        Preview:........................................................#..................................................................................E........R...............................]......................W...\......O.........................................$9......4.............................;..........X........................Z........"..............................................................................;..........U.....................^.....................l.......................3...................~............u.........................................e......P..................................H..............................................................................2.........2.................>....................................................................................................................+.......z....................A..$.........................................................................................]........?..............................
                        Process:C:\Users\user\Desktop\PEDIDO-144797.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):398154
                        Entropy (8bit):1.2543435533086644
                        Encrypted:false
                        SSDEEP:1536:8IfJmHKeJzuGrd0myk0Ek5rFnJd62xZ9WEmaslkcO:8omHKAJR0T8axr
                        MD5:7BA8E260D6477B4FD16DAE2D14EA4482
                        SHA1:16873CB5BFBA899D4ED937603AA9980F119695D6
                        SHA-256:C19F7B3F1A20E1529113EE69AA53DB6E124A51F03098E6FB6AF0E76037C85B8B
                        SHA-512:ECAA786515C73B08A44C22FD48B205166611750EC633849823A88BBF95A675CA29FB7F22E652EFCFC055FC92F8381FC6276F4B732F91612A2385BF670131FFF2
                        Malicious:false
                        Reputation:low
                        Preview:...................z...................................................1........................................T.......r...........................'......................O..................|......P.................................0.....................................).......................l.............S..^......Z.........E.................................{.....................................................................................................................................................................$...........*................................................D........y....................................0..........|........m............................G.............Q...........>...s.......C...................................................".....................................................................+.......................L...6.......................................................................`.................................k.....................
                        Process:C:\Users\user\Desktop\PEDIDO-144797.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):37
                        Entropy (8bit):4.046762824854522
                        Encrypted:false
                        SSDEEP:3:lgov8fOMy:XHB
                        MD5:CFDA8E6AADE7958F94A959BDB29CB209
                        SHA1:59C459E105A7AF33D13A365F735E3CB7B8E5DDB0
                        SHA-256:B4543E8AB4997934D2EDC7DE8A76A24B7C2CCB641212AE3B9B17FE05B71D3E87
                        SHA-512:EDFDCA00667ED3A5558F7E614373F0B8393763A979154666972C659CB44E75CCD51170E4E2189043046EB4DDB8A68642BBDB6F98A0E494E76E86FAAF14F993B2
                        Malicious:false
                        Preview:[xanthippe]..sikkerhedsgraden=preve..
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.21740383078352
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:PEDIDO-144797.exe
                        File size:567'544 bytes
                        MD5:2c5483106fe248cced82541b91cba20e
                        SHA1:41e69017b26287ee7814bb35a967672ba58cb714
                        SHA256:2702bb251c14965787b39f03a9c41000b9b0421528578e5a6a221ad8b27f182d
                        SHA512:4ca40026e8dc3da75c7e68334d268d5b08f568259e597af1fabbd1586f4aaf05c716e17d0bf4c88b68f765fab6ead6965afd73ecb0ead8b97d3ea1fd55d60130
                        SSDEEP:12288:4aqrw9z7Or5X16gS7U5XzJocC/Uisrk9qKyzpqK:5Kw9zar5lxYUtz2cC/lqVpqK
                        TLSH:10C4DFAB2DD2CDEEC40746708AA5B5B1A6F2ACF187039A0367733BF92D32D514F06615
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1...Pf..Pf..Pf.*_9..Pf..Pg.LPf.*_;..Pf..sV..Pf..V`..Pf.Rich.Pf.........................PE..L.....uY.................d...*.....
                        Icon Hash:5ce633391c1c0601
                        Entrypoint:0x403489
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x5975952E [Mon Jul 24 06:35:26 2017 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:1f23f452093b5c1ff091a2f9fb4fa3e9
                        Signature Valid:false
                        Signature Issuer:CN="binmen Aerophile ", E=Figurer@Midnoon.Fu, L=Whipsnade, S=England, C=GB
                        Signature Validation Error:A certificate chain processed, but terminated in a root certificate which is not trusted by the trust provider
                        Error Number:-2146762487
                        Not Before, Not After
                        • 08/05/2024 03:06:26 08/05/2027 03:06:26
                        Subject Chain
                        • CN="binmen Aerophile ", E=Figurer@Midnoon.Fu, L=Whipsnade, S=England, C=GB
                        Version:3
                        Thumbprint MD5:0B03CA7D5DFCDE8AC658D359B709A77C
                        Thumbprint SHA-1:CCFFE8D8D5AAF536F8CD668FDBB76A2488B69D94
                        Thumbprint SHA-256:4DE3D0A9755FF738FBB9D2F8683E6BCE15FB17DC42E63D71418B53798A25E6A4
                        Serial:5C78EE42FBFBCE805443558BFD04290950A90037
                        Instruction
                        sub esp, 000002D4h
                        push ebx
                        push esi
                        push edi
                        push 00000020h
                        pop edi
                        xor ebx, ebx
                        push 00008001h
                        mov dword ptr [esp+14h], ebx
                        mov dword ptr [esp+10h], 0040A230h
                        mov dword ptr [esp+1Ch], ebx
                        call dword ptr [004080ACh]
                        call dword ptr [004080A8h]
                        and eax, BFFFFFFFh
                        cmp ax, 00000006h
                        mov dword ptr [0042A24Ch], eax
                        je 00007F5630B7A0B3h
                        push ebx
                        call 00007F5630B7D361h
                        cmp eax, ebx
                        je 00007F5630B7A0A9h
                        push 00000C00h
                        call eax
                        mov esi, 004082B0h
                        push esi
                        call 00007F5630B7D2DBh
                        push esi
                        call dword ptr [00408150h]
                        lea esi, dword ptr [esi+eax+01h]
                        cmp byte ptr [esi], 00000000h
                        jne 00007F5630B7A08Ch
                        push 0000000Ah
                        call 00007F5630B7D334h
                        push 00000008h
                        call 00007F5630B7D32Dh
                        push 00000006h
                        mov dword ptr [0042A244h], eax
                        call 00007F5630B7D321h
                        cmp eax, ebx
                        je 00007F5630B7A0B1h
                        push 0000001Eh
                        call eax
                        test eax, eax
                        je 00007F5630B7A0A9h
                        or byte ptr [0042A24Fh], 00000040h
                        push ebp
                        call dword ptr [00408044h]
                        push ebx
                        call dword ptr [004082A0h]
                        mov dword ptr [0042A318h], eax
                        push ebx
                        lea eax, dword ptr [esp+34h]
                        push 000002B4h
                        push eax
                        push ebx
                        push 004216E8h
                        call dword ptr [00408188h]
                        push 0040A384h
                        Programming Language:
                        • [EXP] VC++ 6.0 SP5 build 8804
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x570000x220b8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x896080x12f0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x63d10x6400139645791b76bd6f7b8c4472edbbdfe5False0.66515625data6.479451209065IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x138e0x1400007eff248f0493620a3fd3f7cadc755bFalse0.45data5.143831732151552IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x203580x600ec5bcec782f43a3fb7e8dfbe0d0db4dbFalse0.501953125data4.000739070159718IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x2b0000x2c0000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x570000x220b80x2220030cc4d5ad2d805f600d8d9358a38829aFalse0.1827066163003663data2.9689436080399076IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x572c80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536EnglishUnited States0.14975452502070272
                        RT_ICON0x67af00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864EnglishUnited States0.18344019339920117
                        RT_ICON0x70f980x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.21953235710911667
                        RT_ICON0x751c00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.2731327800829875
                        RT_ICON0x777680x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.3428705440900563
                        RT_DIALOG0x788100x120dataEnglishUnited States0.5138888888888888
                        RT_DIALOG0x789300x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0x78a500xc4dataEnglishUnited States0.5918367346938775
                        RT_DIALOG0x78b180x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0x78b780x4cdataEnglishUnited States0.8026315789473685
                        RT_VERSION0x78bc80x1b0dataEnglishUnited States0.5601851851851852
                        RT_MANIFEST0x78d780x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                        DLLImport
                        KERNEL32.dllExitProcess, SetFileAttributesW, Sleep, GetTickCount, CreateFileW, GetFileSize, GetModuleFileNameW, GetCurrentProcess, SetCurrentDirectoryW, GetFileAttributesW, SetEnvironmentVariableW, GetWindowsDirectoryW, GetTempPathW, GetCommandLineW, GetVersion, SetErrorMode, lstrlenW, lstrcpynW, CopyFileW, GetShortPathNameW, GlobalLock, CreateThread, GetLastError, CreateDirectoryW, CreateProcessW, RemoveDirectoryW, lstrcmpiA, GetTempFileNameW, WriteFile, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, lstrcmpiW, MoveFileW, GetFullPathNameW, SetFileTime, SearchPathW, CompareFileTime, lstrcmpW, CloseHandle, ExpandEnvironmentStringsW, GlobalFree, GlobalUnlock, GetDiskFreeSpaceW, GlobalAlloc, FindFirstFileW, FindNextFileW, DeleteFileW, SetFilePointer, ReadFile, FindClose, lstrlenA, MulDiv, MultiByteToWideChar, WideCharToMultiByte, GetPrivateProfileStringW, WritePrivateProfileStringW, FreeLibrary, LoadLibraryExW, GetModuleHandleW
                        USER32.dllGetSystemMenu, SetClassLongW, EnableMenuItem, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongW, SetCursor, LoadCursorW, CheckDlgButton, GetMessagePos, LoadBitmapW, CallWindowProcW, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, OpenClipboard, ScreenToClient, GetWindowRect, GetDlgItem, GetSystemMetrics, SetDlgItemTextW, GetDlgItemTextW, MessageBoxIndirectW, CharPrevW, CharNextA, wsprintfA, DispatchMessageW, PeekMessageW, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndDialog, RegisterClassW, SystemParametersInfoW, CreateWindowExW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, GetDC, SetTimer, SetWindowTextW, LoadImageW, SetForegroundWindow, ShowWindow, IsWindow, SetWindowLongW, FindWindowExW, TrackPopupMenu, AppendMenuW, CreatePopupMenu, EndPaint, CreateDialogParamW, SendMessageTimeoutW, wsprintfW, PostQuitMessage
                        GDI32.dllSelectObject, SetBkMode, CreateFontIndirectW, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                        SHELL32.dllSHGetSpecialFolderLocation, ShellExecuteExW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW
                        ADVAPI32.dllAdjustTokenPrivileges, RegCreateKeyExW, RegOpenKeyExW, SetFileSecurityW, OpenProcessToken, LookupPrivilegeValueW, RegEnumValueW, RegDeleteKeyW, RegDeleteValueW, RegCloseKey, RegSetValueExW, RegQueryValueExW, RegEnumKeyW
                        COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                        ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:04:42:01
                        Start date:04/10/2024
                        Path:C:\Users\user\Desktop\PEDIDO-144797.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\PEDIDO-144797.exe"
                        Imagebase:0x400000
                        File size:567'544 bytes
                        MD5 hash:2C5483106FE248CCED82541B91CBA20E
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.4137149835.000000000327F000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:17.1%
                          Dynamic/Decrypted Code Coverage:13.2%
                          Signature Coverage:19.2%
                          Total number of Nodes:1590
                          Total number of Limit Nodes:36
                          execution_graph 5064 10001000 5067 1000101b 5064->5067 5074 10001516 5067->5074 5069 10001020 5070 10001024 5069->5070 5071 10001027 GlobalAlloc 5069->5071 5072 1000153d 3 API calls 5070->5072 5071->5070 5073 10001019 5072->5073 5076 1000151c 5074->5076 5075 10001522 5075->5069 5076->5075 5077 1000152e GlobalFree 5076->5077 5077->5069 4199 401941 4200 401943 4199->4200 4201 402c37 17 API calls 4200->4201 4202 401948 4201->4202 4205 405abe 4202->4205 4244 405d89 4205->4244 4208 405ae6 DeleteFileW 4210 401951 4208->4210 4209 405afd 4215 405c28 4209->4215 4258 4063b0 lstrcpynW 4209->4258 4212 405b23 4213 405b36 4212->4213 4214 405b29 lstrcatW 4212->4214 4259 405ccd lstrlenW 4213->4259 4216 405b3c 4214->4216 4215->4210 4276 4066f3 FindFirstFileW 4215->4276 4219 405b4c lstrcatW 4216->4219 4221 405b57 lstrlenW FindFirstFileW 4216->4221 4219->4221 4223 405c1d 4221->4223 4242 405b79 4221->4242 4222 405c46 4279 405c81 lstrlenW CharPrevW 4222->4279 4223->4215 4227 405c00 FindNextFileW 4230 405c16 FindClose 4227->4230 4227->4242 4228 405a76 5 API calls 4229 405c58 4228->4229 4231 405c72 4229->4231 4232 405c5c 4229->4232 4230->4223 4234 405414 24 API calls 4231->4234 4232->4210 4235 405414 24 API calls 4232->4235 4234->4210 4237 405c69 4235->4237 4236 405abe 60 API calls 4236->4242 4239 406176 36 API calls 4237->4239 4238 405414 24 API calls 4238->4227 4240 405c70 4239->4240 4240->4210 4241 405414 24 API calls 4241->4242 4242->4227 4242->4236 4242->4238 4242->4241 4263 4063b0 lstrcpynW 4242->4263 4264 405a76 4242->4264 4272 406176 MoveFileExW 4242->4272 4282 4063b0 lstrcpynW 4244->4282 4246 405d9a 4283 405d2c CharNextW CharNextW 4246->4283 4249 405ade 4249->4208 4249->4209 4250 406644 5 API calls 4255 405db0 4250->4255 4251 405de1 lstrlenW 4252 405dec 4251->4252 4251->4255 4254 405c81 3 API calls 4252->4254 4253 4066f3 2 API calls 4253->4255 4256 405df1 GetFileAttributesW 4254->4256 4255->4249 4255->4251 4255->4253 4257 405ccd 2 API calls 4255->4257 4256->4249 4257->4251 4258->4212 4260 405cdb 4259->4260 4261 405ce1 CharPrevW 4260->4261 4262 405ced 4260->4262 4261->4260 4261->4262 4262->4216 4263->4242 4289 405e7d GetFileAttributesW 4264->4289 4267 405aa3 4267->4242 4268 405a91 RemoveDirectoryW 4270 405a9f 4268->4270 4269 405a99 DeleteFileW 4269->4270 4270->4267 4271 405aaf SetFileAttributesW 4270->4271 4271->4267 4273 406197 4272->4273 4274 40618a 4272->4274 4273->4242 4292 405ffc 4274->4292 4277 405c42 4276->4277 4278 406709 FindClose 4276->4278 4277->4210 4277->4222 4278->4277 4280 405c4c 4279->4280 4281 405c9d lstrcatW 4279->4281 4280->4228 4281->4280 4282->4246 4284 405d49 4283->4284 4287 405d5b 4283->4287 4286 405d56 CharNextW 4284->4286 4284->4287 4285 405d7f 4285->4249 4285->4250 4286->4285 4287->4285 4288 405cae CharNextW 4287->4288 4288->4287 4290 405a82 4289->4290 4291 405e8f SetFileAttributesW 4289->4291 4290->4267 4290->4268 4290->4269 4291->4290 4293 406052 GetShortPathNameW 4292->4293 4294 40602c 4292->4294 4295 406171 4293->4295 4296 406067 4293->4296 4319 405ea2 GetFileAttributesW CreateFileW 4294->4319 4295->4273 4296->4295 4299 40606f wsprintfA 4296->4299 4298 406036 CloseHandle GetShortPathNameW 4298->4295 4300 40604a 4298->4300 4301 4063d2 17 API calls 4299->4301 4300->4293 4300->4295 4302 406097 4301->4302 4320 405ea2 GetFileAttributesW CreateFileW 4302->4320 4304 4060a4 4304->4295 4305 4060b3 GetFileSize GlobalAlloc 4304->4305 4306 4060d5 4305->4306 4307 40616a CloseHandle 4305->4307 4321 405f25 ReadFile 4306->4321 4307->4295 4312 4060f4 lstrcpyA 4314 406116 4312->4314 4313 406108 4315 405e07 4 API calls 4313->4315 4316 40614d SetFilePointer 4314->4316 4315->4314 4328 405f54 WriteFile 4316->4328 4319->4298 4320->4304 4322 405f43 4321->4322 4322->4307 4323 405e07 lstrlenA 4322->4323 4324 405e48 lstrlenA 4323->4324 4325 405e50 4324->4325 4326 405e21 lstrcmpiA 4324->4326 4325->4312 4325->4313 4326->4325 4327 405e3f CharNextA 4326->4327 4327->4324 4329 405f72 GlobalFree 4328->4329 4329->4307 4330 4015c1 4331 402c37 17 API calls 4330->4331 4332 4015c8 4331->4332 4333 405d2c 4 API calls 4332->4333 4345 4015d1 4333->4345 4334 401631 4336 401663 4334->4336 4337 401636 4334->4337 4335 405cae CharNextW 4335->4345 4340 401423 24 API calls 4336->4340 4357 401423 4337->4357 4347 40165b 4340->4347 4344 40164a SetCurrentDirectoryW 4344->4347 4345->4334 4345->4335 4346 401617 GetFileAttributesW 4345->4346 4349 40597d 4345->4349 4352 4058e3 CreateDirectoryW 4345->4352 4361 405960 CreateDirectoryW 4345->4361 4346->4345 4364 40678a GetModuleHandleA 4349->4364 4353 405930 4352->4353 4354 405934 GetLastError 4352->4354 4353->4345 4354->4353 4355 405943 SetFileSecurityW 4354->4355 4355->4353 4356 405959 GetLastError 4355->4356 4356->4353 4358 405414 24 API calls 4357->4358 4359 401431 4358->4359 4360 4063b0 lstrcpynW 4359->4360 4360->4344 4362 405970 4361->4362 4363 405974 GetLastError 4361->4363 4362->4345 4363->4362 4365 4067b0 GetProcAddress 4364->4365 4366 4067a6 4364->4366 4367 405984 4365->4367 4370 40671a GetSystemDirectoryW 4366->4370 4367->4345 4369 4067ac 4369->4365 4369->4367 4371 40673c wsprintfW LoadLibraryExW 4370->4371 4371->4369 4376 401e43 4384 402c15 4376->4384 4378 401e49 4379 402c15 17 API calls 4378->4379 4380 401e55 4379->4380 4381 401e61 ShowWindow 4380->4381 4382 401e6c EnableWindow 4380->4382 4383 402abf 4381->4383 4382->4383 4385 4063d2 17 API calls 4384->4385 4386 402c2a 4385->4386 4386->4378 4391 402644 4392 402c15 17 API calls 4391->4392 4401 402653 4392->4401 4393 402790 4394 40269d ReadFile 4394->4393 4394->4401 4395 402736 4395->4393 4395->4401 4405 405f83 SetFilePointer 4395->4405 4396 405f25 ReadFile 4396->4401 4398 402792 4414 4062f7 wsprintfW 4398->4414 4399 4026dd MultiByteToWideChar 4399->4401 4401->4393 4401->4394 4401->4395 4401->4396 4401->4398 4401->4399 4402 402703 SetFilePointer MultiByteToWideChar 4401->4402 4403 4027a3 4401->4403 4402->4401 4403->4393 4404 4027c4 SetFilePointer 4403->4404 4404->4393 4406 405f9f 4405->4406 4413 405fbb 4405->4413 4407 405f25 ReadFile 4406->4407 4408 405fab 4407->4408 4409 405fc4 SetFilePointer 4408->4409 4410 405fec SetFilePointer 4408->4410 4408->4413 4409->4410 4411 405fcf 4409->4411 4410->4413 4412 405f54 WriteFile 4411->4412 4412->4413 4413->4395 4414->4393 5085 402348 5086 402c37 17 API calls 5085->5086 5087 402357 5086->5087 5088 402c37 17 API calls 5087->5088 5089 402360 5088->5089 5090 402c37 17 API calls 5089->5090 5091 40236a GetPrivateProfileStringW 5090->5091 5095 4016cc 5096 402c37 17 API calls 5095->5096 5097 4016d2 GetFullPathNameW 5096->5097 5098 4016ec 5097->5098 5104 40170e 5097->5104 5100 4066f3 2 API calls 5098->5100 5098->5104 5099 401723 GetShortPathNameW 5101 402abf 5099->5101 5102 4016fe 5100->5102 5102->5104 5105 4063b0 lstrcpynW 5102->5105 5104->5099 5104->5101 5105->5104 5106 401b4d 5107 402c37 17 API calls 5106->5107 5108 401b54 5107->5108 5109 402c15 17 API calls 5108->5109 5110 401b5d wsprintfW 5109->5110 5111 402abf 5110->5111 5112 4047cd 5113 404803 5112->5113 5114 4047dd 5112->5114 5122 4043ac 5113->5122 5119 404345 5114->5119 5117 4047ea SetDlgItemTextW 5117->5113 5120 4063d2 17 API calls 5119->5120 5121 404350 SetDlgItemTextW 5120->5121 5121->5117 5123 4043c4 GetWindowLongW 5122->5123 5133 40444d 5122->5133 5124 4043d5 5123->5124 5123->5133 5125 4043e4 GetSysColor 5124->5125 5126 4043e7 5124->5126 5125->5126 5127 4043f7 SetBkMode 5126->5127 5128 4043ed SetTextColor 5126->5128 5129 404415 5127->5129 5130 40440f GetSysColor 5127->5130 5128->5127 5131 404426 5129->5131 5132 40441c SetBkColor 5129->5132 5130->5129 5131->5133 5134 404440 CreateBrushIndirect 5131->5134 5135 404439 DeleteObject 5131->5135 5132->5131 5134->5133 5135->5134 5136 401f52 5137 402c37 17 API calls 5136->5137 5138 401f59 5137->5138 5139 4066f3 2 API calls 5138->5139 5140 401f5f 5139->5140 5142 401f70 5140->5142 5143 4062f7 wsprintfW 5140->5143 5143->5142 5144 402253 5145 402c37 17 API calls 5144->5145 5146 402259 5145->5146 5147 402c37 17 API calls 5146->5147 5148 402262 5147->5148 5149 402c37 17 API calls 5148->5149 5150 40226b 5149->5150 5151 4066f3 2 API calls 5150->5151 5152 402274 5151->5152 5153 402285 lstrlenW lstrlenW 5152->5153 5154 402278 5152->5154 5156 405414 24 API calls 5153->5156 5155 405414 24 API calls 5154->5155 5158 402280 5155->5158 5157 4022c3 SHFileOperationW 5156->5157 5157->5154 5157->5158 5159 405553 5160 405574 GetDlgItem GetDlgItem GetDlgItem 5159->5160 5161 4056fd 5159->5161 5204 40437a SendMessageW 5160->5204 5163 405706 GetDlgItem CreateThread CloseHandle 5161->5163 5164 40572e 5161->5164 5163->5164 5166 405759 5164->5166 5167 405745 ShowWindow ShowWindow 5164->5167 5168 40577e 5164->5168 5165 4055e4 5170 4055eb GetClientRect GetSystemMetrics SendMessageW SendMessageW 5165->5170 5169 4057b9 5166->5169 5172 405793 ShowWindow 5166->5172 5173 40576d 5166->5173 5206 40437a SendMessageW 5167->5206 5174 4043ac 8 API calls 5168->5174 5169->5168 5180 4057c7 SendMessageW 5169->5180 5178 405659 5170->5178 5179 40563d SendMessageW SendMessageW 5170->5179 5176 4057b3 5172->5176 5177 4057a5 5172->5177 5207 40431e 5173->5207 5175 40578c 5174->5175 5183 40431e SendMessageW 5176->5183 5182 405414 24 API calls 5177->5182 5184 40566c 5178->5184 5185 40565e SendMessageW 5178->5185 5179->5178 5180->5175 5186 4057e0 CreatePopupMenu 5180->5186 5182->5176 5183->5169 5188 404345 18 API calls 5184->5188 5185->5184 5187 4063d2 17 API calls 5186->5187 5189 4057f0 AppendMenuW 5187->5189 5190 40567c 5188->5190 5191 405820 TrackPopupMenu 5189->5191 5192 40580d GetWindowRect 5189->5192 5193 405685 ShowWindow 5190->5193 5194 4056b9 GetDlgItem SendMessageW 5190->5194 5191->5175 5196 40583b 5191->5196 5192->5191 5197 4056a8 5193->5197 5198 40569b ShowWindow 5193->5198 5194->5175 5195 4056e0 SendMessageW SendMessageW 5194->5195 5195->5175 5199 405857 SendMessageW 5196->5199 5205 40437a SendMessageW 5197->5205 5198->5197 5199->5199 5200 405874 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5199->5200 5202 405899 SendMessageW 5200->5202 5202->5202 5203 4058c2 GlobalUnlock SetClipboardData CloseClipboard 5202->5203 5203->5175 5204->5165 5205->5194 5206->5166 5208 404325 5207->5208 5209 40432b SendMessageW 5207->5209 5208->5209 5209->5168 5210 401956 5211 402c37 17 API calls 5210->5211 5212 40195d lstrlenW 5211->5212 5213 40258c 5212->5213 5016 4014d7 5017 402c15 17 API calls 5016->5017 5018 4014dd Sleep 5017->5018 5020 402abf 5018->5020 5214 401d57 GetDlgItem GetClientRect 5215 402c37 17 API calls 5214->5215 5216 401d89 LoadImageW SendMessageW 5215->5216 5217 401da7 DeleteObject 5216->5217 5218 402abf 5216->5218 5217->5218 5219 4022d7 5220 4022f1 5219->5220 5221 4022de 5219->5221 5222 4063d2 17 API calls 5221->5222 5223 4022eb 5222->5223 5224 405a12 MessageBoxIndirectW 5223->5224 5224->5220 5225 402dd7 5226 402e02 5225->5226 5227 402de9 SetTimer 5225->5227 5228 402e50 5226->5228 5229 402e56 MulDiv 5226->5229 5227->5226 5230 402e10 wsprintfW SetWindowTextW SetDlgItemTextW 5229->5230 5230->5228 5232 404459 lstrcpynW lstrlenW 5021 40175c 5022 402c37 17 API calls 5021->5022 5023 401763 5022->5023 5024 405ed1 2 API calls 5023->5024 5025 40176a 5024->5025 5026 405ed1 2 API calls 5025->5026 5026->5025 5039 4023de 5040 402c37 17 API calls 5039->5040 5041 4023f0 5040->5041 5042 402c37 17 API calls 5041->5042 5043 4023fa 5042->5043 5056 402cc7 5043->5056 5046 402432 5050 402c15 17 API calls 5046->5050 5052 40243e 5046->5052 5047 402c37 17 API calls 5049 402428 lstrlenW 5047->5049 5048 402885 5049->5046 5050->5052 5051 40245d RegSetValueExW 5054 402473 RegCloseKey 5051->5054 5052->5051 5053 4031ba 44 API calls 5052->5053 5053->5051 5054->5048 5057 402ce2 5056->5057 5060 40624b 5057->5060 5061 40625a 5060->5061 5062 40240a 5061->5062 5063 406265 RegCreateKeyExW 5061->5063 5062->5046 5062->5047 5062->5048 5063->5062 5240 402862 5241 402c37 17 API calls 5240->5241 5242 402869 FindFirstFileW 5241->5242 5243 402891 5242->5243 5247 40287c 5242->5247 5248 4062f7 wsprintfW 5243->5248 5245 40289a 5249 4063b0 lstrcpynW 5245->5249 5248->5245 5249->5247 5250 4044e2 5251 4044fa 5250->5251 5258 404614 5250->5258 5255 404345 18 API calls 5251->5255 5252 40467e 5253 404748 5252->5253 5254 404688 GetDlgItem 5252->5254 5260 4043ac 8 API calls 5253->5260 5256 4046a2 5254->5256 5257 404709 5254->5257 5259 404561 5255->5259 5256->5257 5264 4046c8 SendMessageW LoadCursorW SetCursor 5256->5264 5257->5253 5265 40471b 5257->5265 5258->5252 5258->5253 5261 40464f GetDlgItem SendMessageW 5258->5261 5263 404345 18 API calls 5259->5263 5274 404743 5260->5274 5283 404367 EnableWindow 5261->5283 5267 40456e CheckDlgButton 5263->5267 5287 404791 5264->5287 5269 404731 5265->5269 5270 404721 SendMessageW 5265->5270 5266 404679 5284 40476d 5266->5284 5281 404367 EnableWindow 5267->5281 5269->5274 5275 404737 SendMessageW 5269->5275 5270->5269 5275->5274 5276 40458c GetDlgItem 5282 40437a SendMessageW 5276->5282 5278 4045a2 SendMessageW 5279 4045c8 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5278->5279 5280 4045bf GetSysColor 5278->5280 5279->5274 5280->5279 5281->5276 5282->5278 5283->5266 5285 404780 SendMessageW 5284->5285 5286 40477b 5284->5286 5285->5252 5286->5285 5290 4059d8 ShellExecuteExW 5287->5290 5289 4046f7 LoadCursorW SetCursor 5289->5257 5290->5289 5291 401563 5292 402a65 5291->5292 5295 4062f7 wsprintfW 5292->5295 5294 402a6a 5295->5294 5296 401968 5297 402c15 17 API calls 5296->5297 5298 40196f 5297->5298 5299 402c15 17 API calls 5298->5299 5300 40197c 5299->5300 5301 402c37 17 API calls 5300->5301 5302 401993 lstrlenW 5301->5302 5303 4019a4 5302->5303 5306 4019e5 5303->5306 5308 4063b0 lstrcpynW 5303->5308 5305 4019d5 5305->5306 5307 4019da lstrlenW 5305->5307 5307->5306 5308->5305 4459 4027e9 4460 4027f0 4459->4460 4462 402a6a 4459->4462 4461 402c15 17 API calls 4460->4461 4463 4027f7 4461->4463 4464 402806 SetFilePointer 4463->4464 4464->4462 4465 402816 4464->4465 4467 4062f7 wsprintfW 4465->4467 4467->4462 5309 100018a9 5311 100018cc 5309->5311 5310 10001911 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5313 10001272 2 API calls 5310->5313 5311->5310 5312 100018ff GlobalFree 5311->5312 5312->5310 5314 10001a87 GlobalFree GlobalFree 5313->5314 5315 40166a 5316 402c37 17 API calls 5315->5316 5317 401670 5316->5317 5318 4066f3 2 API calls 5317->5318 5319 401676 5318->5319 5320 404b6a 5321 404b96 5320->5321 5322 404b7a 5320->5322 5324 404bc9 5321->5324 5325 404b9c SHGetPathFromIDListW 5321->5325 5331 4059f6 GetDlgItemTextW 5322->5331 5327 404bb3 SendMessageW 5325->5327 5328 404bac 5325->5328 5326 404b87 SendMessageW 5326->5321 5327->5324 5330 40140b 2 API calls 5328->5330 5330->5327 5331->5326 5332 403e6c 5333 403e84 5332->5333 5334 403fbf 5332->5334 5333->5334 5335 403e90 5333->5335 5336 403fd0 GetDlgItem GetDlgItem 5334->5336 5337 404010 5334->5337 5340 403e9b SetWindowPos 5335->5340 5341 403eae 5335->5341 5338 404345 18 API calls 5336->5338 5339 40406a 5337->5339 5349 401389 2 API calls 5337->5349 5344 403ffa SetClassLongW 5338->5344 5345 404391 SendMessageW 5339->5345 5363 403fba 5339->5363 5340->5341 5342 403eb3 ShowWindow 5341->5342 5343 403ecb 5341->5343 5342->5343 5346 403ed3 DestroyWindow 5343->5346 5347 403eed 5343->5347 5348 40140b 2 API calls 5344->5348 5373 40407c 5345->5373 5400 4042ce 5346->5400 5350 403ef2 SetWindowLongW 5347->5350 5351 403f03 5347->5351 5348->5337 5352 404042 5349->5352 5350->5363 5354 403f7a 5351->5354 5355 403f0f GetDlgItem 5351->5355 5352->5339 5356 404046 SendMessageW 5352->5356 5353 4042d0 DestroyWindow EndDialog 5353->5400 5361 4043ac 8 API calls 5354->5361 5359 403f22 SendMessageW IsWindowEnabled 5355->5359 5360 403f3f 5355->5360 5356->5363 5357 40140b 2 API calls 5357->5373 5358 4042ff ShowWindow 5358->5363 5359->5360 5359->5363 5364 403f4c 5360->5364 5366 403f93 SendMessageW 5360->5366 5367 403f5f 5360->5367 5374 403f44 5360->5374 5361->5363 5362 4063d2 17 API calls 5362->5373 5364->5366 5364->5374 5365 40431e SendMessageW 5365->5354 5366->5354 5368 403f67 5367->5368 5369 403f7c 5367->5369 5370 40140b 2 API calls 5368->5370 5372 40140b 2 API calls 5369->5372 5370->5374 5371 404345 18 API calls 5371->5373 5372->5374 5373->5353 5373->5357 5373->5362 5373->5363 5373->5371 5375 404345 18 API calls 5373->5375 5391 404210 DestroyWindow 5373->5391 5374->5354 5374->5365 5376 4040f7 GetDlgItem 5375->5376 5377 404114 ShowWindow EnableWindow 5376->5377 5378 40410c 5376->5378 5401 404367 EnableWindow 5377->5401 5378->5377 5380 40413e EnableWindow 5385 404152 5380->5385 5381 404157 GetSystemMenu EnableMenuItem SendMessageW 5382 404187 SendMessageW 5381->5382 5381->5385 5382->5385 5384 403e4d 18 API calls 5384->5385 5385->5381 5385->5384 5402 40437a SendMessageW 5385->5402 5403 4063b0 lstrcpynW 5385->5403 5387 4041b6 lstrlenW 5388 4063d2 17 API calls 5387->5388 5389 4041cc SetWindowTextW 5388->5389 5390 401389 2 API calls 5389->5390 5390->5373 5392 40422a CreateDialogParamW 5391->5392 5391->5400 5393 40425d 5392->5393 5392->5400 5394 404345 18 API calls 5393->5394 5395 404268 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5394->5395 5396 401389 2 API calls 5395->5396 5397 4042ae 5396->5397 5397->5363 5398 4042b6 ShowWindow 5397->5398 5399 404391 SendMessageW 5398->5399 5399->5400 5400->5358 5400->5363 5401->5380 5402->5385 5403->5387 5404 401ced 5405 402c15 17 API calls 5404->5405 5406 401cf3 IsWindow 5405->5406 5407 401a20 5406->5407 4963 40176f 4964 402c37 17 API calls 4963->4964 4965 401776 4964->4965 4966 401796 4965->4966 4967 40179e 4965->4967 5003 4063b0 lstrcpynW 4966->5003 5004 4063b0 lstrcpynW 4967->5004 4970 40179c 4974 406644 5 API calls 4970->4974 4971 4017a9 4972 405c81 3 API calls 4971->4972 4973 4017af lstrcatW 4972->4973 4973->4970 4979 4017bb 4974->4979 4975 4017f7 4977 405e7d 2 API calls 4975->4977 4976 4066f3 2 API calls 4976->4979 4977->4979 4979->4975 4979->4976 4980 4017cd CompareFileTime 4979->4980 4981 40188d 4979->4981 4989 4063d2 17 API calls 4979->4989 4993 4063b0 lstrcpynW 4979->4993 4996 405a12 MessageBoxIndirectW 4979->4996 4999 401864 4979->4999 5002 405ea2 GetFileAttributesW CreateFileW 4979->5002 4980->4979 4982 405414 24 API calls 4981->4982 4984 401897 4982->4984 4983 405414 24 API calls 5001 401879 4983->5001 4985 4031ba 44 API calls 4984->4985 4986 4018aa 4985->4986 4987 4018be SetFileTime 4986->4987 4988 4018d0 CloseHandle 4986->4988 4987->4988 4990 4018e1 4988->4990 4988->5001 4989->4979 4991 4018e6 4990->4991 4992 4018f9 4990->4992 4994 4063d2 17 API calls 4991->4994 4995 4063d2 17 API calls 4992->4995 4993->4979 4997 4018ee lstrcatW 4994->4997 4998 401901 4995->4998 4996->4979 4997->4998 5000 405a12 MessageBoxIndirectW 4998->5000 4999->4983 4999->5001 5000->5001 5002->4979 5003->4970 5004->4971 5415 402570 5416 402c37 17 API calls 5415->5416 5417 402577 5416->5417 5420 405ea2 GetFileAttributesW CreateFileW 5417->5420 5419 402583 5420->5419 5428 401b71 5429 401bc2 5428->5429 5430 401b7e 5428->5430 5432 401bc7 5429->5432 5433 401bec GlobalAlloc 5429->5433 5431 401c07 5430->5431 5436 401b95 5430->5436 5434 4063d2 17 API calls 5431->5434 5446 4022f1 5431->5446 5432->5446 5449 4063b0 lstrcpynW 5432->5449 5435 4063d2 17 API calls 5433->5435 5437 4022eb 5434->5437 5435->5431 5447 4063b0 lstrcpynW 5436->5447 5442 405a12 MessageBoxIndirectW 5437->5442 5440 401bd9 GlobalFree 5440->5446 5441 401ba4 5448 4063b0 lstrcpynW 5441->5448 5442->5446 5444 401bb3 5450 4063b0 lstrcpynW 5444->5450 5447->5441 5448->5444 5449->5440 5450->5446 5005 4024f2 5006 402c77 17 API calls 5005->5006 5007 4024fc 5006->5007 5008 402c15 17 API calls 5007->5008 5009 402505 5008->5009 5010 402521 RegEnumKeyW 5009->5010 5011 40252d RegEnumValueW 5009->5011 5014 402885 5009->5014 5012 402549 RegCloseKey 5010->5012 5011->5012 5013 402542 5011->5013 5012->5014 5013->5012 5451 401a72 5452 402c15 17 API calls 5451->5452 5453 401a78 5452->5453 5454 402c15 17 API calls 5453->5454 5455 401a20 5454->5455 5456 401573 5457 401583 ShowWindow 5456->5457 5458 40158c 5456->5458 5457->5458 5459 40159a ShowWindow 5458->5459 5460 402abf 5458->5460 5459->5460 5461 4014f5 SetForegroundWindow 5462 402abf 5461->5462 5463 100016b6 5464 100016e5 5463->5464 5465 10001b18 22 API calls 5464->5465 5466 100016ec 5465->5466 5467 100016f3 5466->5467 5468 100016ff 5466->5468 5469 10001272 2 API calls 5467->5469 5470 10001726 5468->5470 5471 10001709 5468->5471 5479 100016fd 5469->5479 5473 10001750 5470->5473 5474 1000172c 5470->5474 5472 1000153d 3 API calls 5471->5472 5476 1000170e 5472->5476 5475 1000153d 3 API calls 5473->5475 5477 100015b4 3 API calls 5474->5477 5475->5479 5480 100015b4 3 API calls 5476->5480 5478 10001731 5477->5478 5481 10001272 2 API calls 5478->5481 5482 10001714 5480->5482 5483 10001737 GlobalFree 5481->5483 5484 10001272 2 API calls 5482->5484 5483->5479 5485 1000174b GlobalFree 5483->5485 5486 1000171a GlobalFree 5484->5486 5485->5479 5486->5479 5487 401e77 5488 402c37 17 API calls 5487->5488 5489 401e7d 5488->5489 5490 402c37 17 API calls 5489->5490 5491 401e86 5490->5491 5492 402c37 17 API calls 5491->5492 5493 401e8f 5492->5493 5494 402c37 17 API calls 5493->5494 5495 401e98 5494->5495 5496 401423 24 API calls 5495->5496 5497 401e9f 5496->5497 5504 4059d8 ShellExecuteExW 5497->5504 5499 401ee1 5500 40683b 5 API calls 5499->5500 5502 402885 5499->5502 5501 401efb CloseHandle 5500->5501 5501->5502 5504->5499 5505 406e77 5509 40693e 5505->5509 5506 4072a9 5507 4069c8 GlobalAlloc 5507->5506 5507->5509 5508 4069bf GlobalFree 5508->5507 5509->5506 5509->5507 5509->5508 5509->5509 5510 406a36 GlobalFree 5509->5510 5511 406a3f GlobalAlloc 5509->5511 5510->5511 5511->5506 5511->5509 5512 10002238 5513 10002296 5512->5513 5514 100022cc 5512->5514 5513->5514 5515 100022a8 GlobalAlloc 5513->5515 5515->5513 5516 40167b 5517 402c37 17 API calls 5516->5517 5518 401682 5517->5518 5519 402c37 17 API calls 5518->5519 5520 40168b 5519->5520 5521 402c37 17 API calls 5520->5521 5522 401694 MoveFileW 5521->5522 5523 4016a7 5522->5523 5529 4016a0 5522->5529 5524 40224a 5523->5524 5525 4066f3 2 API calls 5523->5525 5527 4016b6 5525->5527 5526 401423 24 API calls 5526->5524 5527->5524 5528 406176 36 API calls 5527->5528 5528->5529 5529->5526 5530 403a7c 5531 403a87 5530->5531 5532 403a8b 5531->5532 5533 403a8e GlobalAlloc 5531->5533 5533->5532 5534 1000103d 5535 1000101b 5 API calls 5534->5535 5536 10001056 5535->5536 5027 40247e 5028 402c77 17 API calls 5027->5028 5029 402488 5028->5029 5030 402c37 17 API calls 5029->5030 5031 402491 5030->5031 5032 40249c RegQueryValueExW 5031->5032 5036 402885 5031->5036 5033 4024c2 RegCloseKey 5032->5033 5034 4024bc 5032->5034 5033->5036 5034->5033 5038 4062f7 wsprintfW 5034->5038 5038->5033 5537 4020fe 5538 402c37 17 API calls 5537->5538 5539 402105 5538->5539 5540 402c37 17 API calls 5539->5540 5541 40210f 5540->5541 5542 402c37 17 API calls 5541->5542 5543 402119 5542->5543 5544 402c37 17 API calls 5543->5544 5545 402123 5544->5545 5546 402c37 17 API calls 5545->5546 5547 40212d 5546->5547 5548 40216c CoCreateInstance 5547->5548 5549 402c37 17 API calls 5547->5549 5552 40218b 5548->5552 5549->5548 5550 401423 24 API calls 5551 40224a 5550->5551 5552->5550 5552->5551 5553 4019ff 5554 402c37 17 API calls 5553->5554 5555 401a06 5554->5555 5556 402c37 17 API calls 5555->5556 5557 401a0f 5556->5557 5558 401a16 lstrcmpiW 5557->5558 5559 401a28 lstrcmpW 5557->5559 5560 401a1c 5558->5560 5559->5560 4112 401f00 4127 402c37 4112->4127 4121 402885 4122 401f2b 4123 401f30 4122->4123 4124 401f3b 4122->4124 4152 4062f7 wsprintfW 4123->4152 4126 401f39 CloseHandle 4124->4126 4126->4121 4128 402c43 4127->4128 4153 4063d2 4128->4153 4131 401f06 4133 405414 4131->4133 4134 40542f 4133->4134 4142 401f10 4133->4142 4135 40544b lstrlenW 4134->4135 4136 4063d2 17 API calls 4134->4136 4137 405474 4135->4137 4138 405459 lstrlenW 4135->4138 4136->4135 4140 405487 4137->4140 4141 40547a SetWindowTextW 4137->4141 4139 40546b lstrcatW 4138->4139 4138->4142 4139->4137 4140->4142 4143 40548d SendMessageW SendMessageW SendMessageW 4140->4143 4141->4140 4144 405995 CreateProcessW 4142->4144 4143->4142 4145 401f16 4144->4145 4146 4059c8 CloseHandle 4144->4146 4145->4121 4145->4126 4147 40683b WaitForSingleObject 4145->4147 4146->4145 4148 406855 4147->4148 4149 406867 GetExitCodeProcess 4148->4149 4195 4067c6 4148->4195 4149->4122 4152->4126 4154 4063df 4153->4154 4155 40662a 4154->4155 4158 4065f8 lstrlenW 4154->4158 4159 4063d2 10 API calls 4154->4159 4162 40650d GetSystemDirectoryW 4154->4162 4164 406520 GetWindowsDirectoryW 4154->4164 4165 406644 5 API calls 4154->4165 4166 4063d2 10 API calls 4154->4166 4167 40659b lstrcatW 4154->4167 4168 406554 SHGetSpecialFolderLocation 4154->4168 4179 40627e 4154->4179 4184 4062f7 wsprintfW 4154->4184 4185 4063b0 lstrcpynW 4154->4185 4156 402c64 4155->4156 4186 4063b0 lstrcpynW 4155->4186 4156->4131 4170 406644 4156->4170 4158->4154 4159->4158 4162->4154 4164->4154 4165->4154 4166->4154 4167->4154 4168->4154 4169 40656c SHGetPathFromIDListW CoTaskMemFree 4168->4169 4169->4154 4176 406651 4170->4176 4171 4066c7 4172 4066cc CharPrevW 4171->4172 4174 4066ed 4171->4174 4172->4171 4173 4066ba CharNextW 4173->4171 4173->4176 4174->4131 4176->4171 4176->4173 4177 4066a6 CharNextW 4176->4177 4178 4066b5 CharNextW 4176->4178 4191 405cae 4176->4191 4177->4176 4178->4173 4187 40621d 4179->4187 4182 4062b2 RegQueryValueExW RegCloseKey 4183 4062e2 4182->4183 4183->4154 4184->4154 4185->4154 4186->4156 4188 40622c 4187->4188 4189 406230 4188->4189 4190 406235 RegOpenKeyExW 4188->4190 4189->4182 4189->4183 4190->4189 4192 405cb4 4191->4192 4193 405cca 4192->4193 4194 405cbb CharNextW 4192->4194 4193->4176 4194->4192 4196 4067e3 PeekMessageW 4195->4196 4197 4067f3 WaitForSingleObject 4196->4197 4198 4067d9 DispatchMessageW 4196->4198 4197->4148 4198->4196 5561 401000 5562 401037 BeginPaint GetClientRect 5561->5562 5563 40100c DefWindowProcW 5561->5563 5564 4010f3 5562->5564 5566 401179 5563->5566 5567 401073 CreateBrushIndirect FillRect DeleteObject 5564->5567 5568 4010fc 5564->5568 5567->5564 5569 401102 CreateFontIndirectW 5568->5569 5570 401167 EndPaint 5568->5570 5569->5570 5571 401112 6 API calls 5569->5571 5570->5566 5571->5570 4373 100027c2 4374 10002812 4373->4374 4375 100027d2 VirtualProtect 4373->4375 4375->4374 5572 401503 5573 40150b 5572->5573 5575 40151e 5572->5575 5574 402c15 17 API calls 5573->5574 5574->5575 4415 402306 4416 40230e 4415->4416 4421 402314 4415->4421 4417 402c37 17 API calls 4416->4417 4417->4421 4418 402c37 17 API calls 4420 402322 4418->4420 4419 402330 4423 402c37 17 API calls 4419->4423 4420->4419 4422 402c37 17 API calls 4420->4422 4421->4418 4421->4420 4422->4419 4424 402339 WritePrivateProfileStringW 4423->4424 5583 401f86 5584 402c37 17 API calls 5583->5584 5585 401f8d 5584->5585 5586 40678a 5 API calls 5585->5586 5587 401f9c 5586->5587 5588 401fb8 GlobalAlloc 5587->5588 5589 402020 5587->5589 5588->5589 5590 401fcc 5588->5590 5591 40678a 5 API calls 5590->5591 5592 401fd3 5591->5592 5593 40678a 5 API calls 5592->5593 5594 401fdd 5593->5594 5594->5589 5598 4062f7 wsprintfW 5594->5598 5596 402012 5599 4062f7 wsprintfW 5596->5599 5598->5596 5599->5589 4425 402388 4426 402390 4425->4426 4427 4023bb 4425->4427 4441 402c77 4426->4441 4429 402c37 17 API calls 4427->4429 4431 4023c2 4429->4431 4437 402cf5 4431->4437 4432 4023a1 4434 402c37 17 API calls 4432->4434 4436 4023a8 RegDeleteValueW RegCloseKey 4434->4436 4435 4023cf 4436->4435 4438 402d0b 4437->4438 4439 402d21 4438->4439 4446 402d2a 4438->4446 4439->4435 4442 402c37 17 API calls 4441->4442 4443 402c8e 4442->4443 4444 40621d RegOpenKeyExW 4443->4444 4445 402397 4444->4445 4445->4432 4445->4435 4447 40621d RegOpenKeyExW 4446->4447 4448 402d58 4447->4448 4449 402dd0 4448->4449 4453 402d5c 4448->4453 4449->4439 4450 402d7e RegEnumKeyW 4451 402d95 RegCloseKey 4450->4451 4450->4453 4454 40678a 5 API calls 4451->4454 4452 402db6 RegCloseKey 4452->4449 4453->4450 4453->4451 4453->4452 4455 402d2a 6 API calls 4453->4455 4456 402da5 4454->4456 4455->4453 4457 402dc4 RegDeleteKeyW 4456->4457 4458 402da9 4456->4458 4457->4449 4458->4449 5600 405388 5601 405398 5600->5601 5602 4053ac 5600->5602 5603 4053f5 5601->5603 5604 40539e 5601->5604 5605 4053b4 IsWindowVisible 5602->5605 5611 4053cb 5602->5611 5606 4053fa CallWindowProcW 5603->5606 5607 404391 SendMessageW 5604->5607 5605->5603 5608 4053c1 5605->5608 5609 4053a8 5606->5609 5607->5609 5613 404cde SendMessageW 5608->5613 5611->5606 5618 404d5e 5611->5618 5614 404d01 GetMessagePos ScreenToClient SendMessageW 5613->5614 5615 404d3d SendMessageW 5613->5615 5616 404d35 5614->5616 5617 404d3a 5614->5617 5615->5616 5616->5611 5617->5615 5627 4063b0 lstrcpynW 5618->5627 5620 404d71 5628 4062f7 wsprintfW 5620->5628 5622 404d7b 5623 40140b 2 API calls 5622->5623 5624 404d84 5623->5624 5629 4063b0 lstrcpynW 5624->5629 5626 404d8b 5626->5603 5627->5620 5628->5622 5629->5626 4468 403489 SetErrorMode GetVersion 4469 4034c8 4468->4469 4470 4034ce 4468->4470 4471 40678a 5 API calls 4469->4471 4472 40671a 3 API calls 4470->4472 4471->4470 4473 4034e4 lstrlenA 4472->4473 4473->4470 4474 4034f4 4473->4474 4475 40678a 5 API calls 4474->4475 4476 4034fb 4475->4476 4477 40678a 5 API calls 4476->4477 4478 403502 4477->4478 4479 40678a 5 API calls 4478->4479 4480 40350e #17 OleInitialize SHGetFileInfoW 4479->4480 4559 4063b0 lstrcpynW 4480->4559 4483 40355a GetCommandLineW 4560 4063b0 lstrcpynW 4483->4560 4485 40356c GetModuleHandleW 4486 403584 4485->4486 4487 405cae CharNextW 4486->4487 4488 403593 CharNextW 4487->4488 4489 4036bd GetTempPathW 4488->4489 4499 4035ac 4488->4499 4561 403458 4489->4561 4491 4036d5 4492 4036d9 GetWindowsDirectoryW lstrcatW 4491->4492 4493 40372f DeleteFileW 4491->4493 4494 403458 12 API calls 4492->4494 4571 402f14 GetTickCount GetModuleFileNameW 4493->4571 4497 4036f5 4494->4497 4495 405cae CharNextW 4495->4499 4497->4493 4500 4036f9 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4497->4500 4498 403743 4505 4037e6 4498->4505 4509 405cae CharNextW 4498->4509 4554 4037f6 4498->4554 4499->4495 4502 4036a8 4499->4502 4504 4036a6 4499->4504 4503 403458 12 API calls 4500->4503 4658 4063b0 lstrcpynW 4502->4658 4507 403727 4503->4507 4504->4489 4601 403abe 4505->4601 4507->4493 4507->4554 4522 403762 4509->4522 4511 403930 4514 4039b4 ExitProcess 4511->4514 4515 403938 GetCurrentProcess OpenProcessToken 4511->4515 4512 403810 4670 405a12 4512->4670 4520 403950 LookupPrivilegeValueW AdjustTokenPrivileges 4515->4520 4521 403984 4515->4521 4517 4037c0 4523 405d89 18 API calls 4517->4523 4518 403826 4524 40597d 5 API calls 4518->4524 4520->4521 4525 40678a 5 API calls 4521->4525 4522->4517 4522->4518 4526 4037cc 4523->4526 4527 40382b lstrcatW 4524->4527 4528 40398b 4525->4528 4526->4554 4659 4063b0 lstrcpynW 4526->4659 4529 403847 lstrcatW lstrcmpiW 4527->4529 4530 40383c lstrcatW 4527->4530 4531 4039a0 ExitWindowsEx 4528->4531 4532 4039ad 4528->4532 4534 403863 4529->4534 4529->4554 4530->4529 4531->4514 4531->4532 4676 40140b 4532->4676 4537 403868 4534->4537 4538 40386f 4534->4538 4536 4037db 4660 4063b0 lstrcpynW 4536->4660 4541 4058e3 4 API calls 4537->4541 4539 405960 2 API calls 4538->4539 4542 403874 SetCurrentDirectoryW 4539->4542 4543 40386d 4541->4543 4544 403884 4542->4544 4545 40388f 4542->4545 4543->4542 4674 4063b0 lstrcpynW 4544->4674 4675 4063b0 lstrcpynW 4545->4675 4548 4063d2 17 API calls 4549 4038ce DeleteFileW 4548->4549 4550 4038db CopyFileW 4549->4550 4555 40389d 4549->4555 4550->4555 4551 403924 4552 406176 36 API calls 4551->4552 4552->4554 4553 406176 36 API calls 4553->4555 4661 4039cc 4554->4661 4555->4548 4555->4551 4555->4553 4556 4063d2 17 API calls 4555->4556 4557 405995 2 API calls 4555->4557 4558 40390f CloseHandle 4555->4558 4556->4555 4557->4555 4558->4555 4559->4483 4560->4485 4562 406644 5 API calls 4561->4562 4563 403464 4562->4563 4564 40346e 4563->4564 4565 405c81 3 API calls 4563->4565 4564->4491 4566 403476 4565->4566 4567 405960 2 API calls 4566->4567 4568 40347c 4567->4568 4679 405ed1 4568->4679 4683 405ea2 GetFileAttributesW CreateFileW 4571->4683 4573 402f57 4600 402f64 4573->4600 4684 4063b0 lstrcpynW 4573->4684 4575 402f7a 4576 405ccd 2 API calls 4575->4576 4577 402f80 4576->4577 4685 4063b0 lstrcpynW 4577->4685 4579 402f8b GetFileSize 4580 40308c 4579->4580 4599 402fa2 4579->4599 4686 402e72 4580->4686 4584 403127 4587 402e72 32 API calls 4584->4587 4585 4030cf GlobalAlloc 4586 4030e6 4585->4586 4592 405ed1 2 API calls 4586->4592 4587->4600 4589 4030b0 4590 40342b ReadFile 4589->4590 4593 4030bb 4590->4593 4591 402e72 32 API calls 4591->4599 4594 4030f7 CreateFileW 4592->4594 4593->4585 4593->4600 4595 403131 4594->4595 4594->4600 4701 403441 SetFilePointer 4595->4701 4597 40313f 4702 4031ba 4597->4702 4599->4580 4599->4584 4599->4591 4599->4600 4717 40342b 4599->4717 4600->4498 4602 40678a 5 API calls 4601->4602 4603 403ad2 4602->4603 4604 403ad8 4603->4604 4605 403aea 4603->4605 4753 4062f7 wsprintfW 4604->4753 4606 40627e 3 API calls 4605->4606 4607 403b1a 4606->4607 4609 403b39 lstrcatW 4607->4609 4611 40627e 3 API calls 4607->4611 4610 403ae8 4609->4610 4745 403d94 4610->4745 4611->4609 4614 405d89 18 API calls 4615 403b6b 4614->4615 4616 403bff 4615->4616 4619 40627e 3 API calls 4615->4619 4617 405d89 18 API calls 4616->4617 4618 403c05 4617->4618 4621 403c15 LoadImageW 4618->4621 4622 4063d2 17 API calls 4618->4622 4620 403b9d 4619->4620 4620->4616 4625 403bbe lstrlenW 4620->4625 4628 405cae CharNextW 4620->4628 4623 403cbb 4621->4623 4624 403c3c RegisterClassW 4621->4624 4622->4621 4627 40140b 2 API calls 4623->4627 4626 403c72 SystemParametersInfoW CreateWindowExW 4624->4626 4656 403cc5 4624->4656 4629 403bf2 4625->4629 4630 403bcc lstrcmpiW 4625->4630 4626->4623 4631 403cc1 4627->4631 4632 403bbb 4628->4632 4634 405c81 3 API calls 4629->4634 4630->4629 4633 403bdc GetFileAttributesW 4630->4633 4636 403d94 18 API calls 4631->4636 4631->4656 4632->4625 4635 403be8 4633->4635 4637 403bf8 4634->4637 4635->4629 4638 405ccd 2 API calls 4635->4638 4639 403cd2 4636->4639 4754 4063b0 lstrcpynW 4637->4754 4638->4629 4641 403d61 4639->4641 4642 403cde ShowWindow 4639->4642 4755 4054e7 OleInitialize 4641->4755 4644 40671a 3 API calls 4642->4644 4645 403cf6 4644->4645 4647 403d04 GetClassInfoW 4645->4647 4650 40671a 3 API calls 4645->4650 4646 403d67 4648 403d83 4646->4648 4649 403d6b 4646->4649 4652 403d18 GetClassInfoW RegisterClassW 4647->4652 4653 403d2e DialogBoxParamW 4647->4653 4651 40140b 2 API calls 4648->4651 4655 40140b 2 API calls 4649->4655 4649->4656 4650->4647 4651->4656 4652->4653 4654 40140b 2 API calls 4653->4654 4657 403d56 4654->4657 4655->4656 4656->4554 4657->4656 4658->4504 4659->4536 4660->4505 4662 4039e7 4661->4662 4663 4039dd CloseHandle 4661->4663 4664 4039f1 CloseHandle 4662->4664 4665 4039fb 4662->4665 4663->4662 4664->4665 4773 403a29 4665->4773 4668 405abe 67 API calls 4669 4037ff OleUninitialize 4668->4669 4669->4511 4669->4512 4671 405a27 4670->4671 4672 40381e ExitProcess 4671->4672 4673 405a3b MessageBoxIndirectW 4671->4673 4673->4672 4674->4545 4675->4555 4677 401389 2 API calls 4676->4677 4678 401420 4677->4678 4678->4514 4680 405ede GetTickCount GetTempFileNameW 4679->4680 4681 405f14 4680->4681 4682 403487 4680->4682 4681->4680 4681->4682 4682->4491 4683->4573 4684->4575 4685->4579 4687 402e83 4686->4687 4688 402e9b 4686->4688 4689 402e93 4687->4689 4690 402e8c DestroyWindow 4687->4690 4691 402ea3 4688->4691 4692 402eab GetTickCount 4688->4692 4689->4585 4689->4600 4720 403441 SetFilePointer 4689->4720 4690->4689 4694 4067c6 2 API calls 4691->4694 4692->4689 4693 402eb9 4692->4693 4695 402ec1 4693->4695 4696 402eee CreateDialogParamW ShowWindow 4693->4696 4694->4689 4695->4689 4721 402e56 4695->4721 4696->4689 4698 402ecf wsprintfW 4699 405414 24 API calls 4698->4699 4700 402eec 4699->4700 4700->4689 4701->4597 4703 4031e5 4702->4703 4704 4031c9 SetFilePointer 4702->4704 4724 4032c2 GetTickCount 4703->4724 4704->4703 4707 405f25 ReadFile 4708 403205 4707->4708 4709 4032c2 42 API calls 4708->4709 4716 403282 4708->4716 4710 40321c 4709->4710 4711 403288 ReadFile 4710->4711 4715 40322b 4710->4715 4710->4716 4711->4716 4713 405f25 ReadFile 4713->4715 4714 405f54 WriteFile 4714->4715 4715->4713 4715->4714 4715->4716 4716->4600 4718 405f25 ReadFile 4717->4718 4719 40343e 4718->4719 4719->4599 4720->4589 4722 402e65 4721->4722 4723 402e67 MulDiv 4721->4723 4722->4723 4723->4698 4725 4032f0 4724->4725 4726 40341a 4724->4726 4737 403441 SetFilePointer 4725->4737 4727 402e72 32 API calls 4726->4727 4733 4031ec 4727->4733 4729 4032fb SetFilePointer 4735 403320 4729->4735 4730 40342b ReadFile 4730->4735 4732 402e72 32 API calls 4732->4735 4733->4707 4733->4716 4734 405f54 WriteFile 4734->4735 4735->4730 4735->4732 4735->4733 4735->4734 4736 4033fb SetFilePointer 4735->4736 4738 40690b 4735->4738 4736->4726 4737->4729 4739 406930 4738->4739 4740 406938 4738->4740 4739->4735 4740->4739 4741 4069c8 GlobalAlloc 4740->4741 4742 4069bf GlobalFree 4740->4742 4743 406a36 GlobalFree 4740->4743 4744 406a3f GlobalAlloc 4740->4744 4741->4739 4741->4740 4742->4741 4743->4744 4744->4739 4744->4740 4746 403da8 4745->4746 4762 4062f7 wsprintfW 4746->4762 4748 403e19 4763 403e4d 4748->4763 4750 403b49 4750->4614 4751 403e1e 4751->4750 4752 4063d2 17 API calls 4751->4752 4752->4751 4753->4610 4754->4616 4766 404391 4755->4766 4757 40550a 4761 405531 4757->4761 4769 401389 4757->4769 4758 404391 SendMessageW 4759 405543 OleUninitialize 4758->4759 4759->4646 4761->4758 4762->4748 4764 4063d2 17 API calls 4763->4764 4765 403e5b SetWindowTextW 4764->4765 4765->4751 4767 4043a9 4766->4767 4768 40439a SendMessageW 4766->4768 4767->4757 4768->4767 4771 401390 4769->4771 4770 4013fe 4770->4757 4771->4770 4772 4013cb MulDiv SendMessageW 4771->4772 4772->4771 4774 403a37 4773->4774 4775 403a00 4774->4775 4776 403a3c FreeLibrary GlobalFree 4774->4776 4775->4668 4776->4775 4776->4776 4777 401389 4779 401390 4777->4779 4778 4013fe 4779->4778 4780 4013cb MulDiv SendMessageW 4779->4780 4780->4779 5630 40190c 5631 401943 5630->5631 5632 402c37 17 API calls 5631->5632 5633 401948 5632->5633 5634 405abe 67 API calls 5633->5634 5635 401951 5634->5635 5636 401d0e 5637 402c15 17 API calls 5636->5637 5638 401d15 5637->5638 5639 402c15 17 API calls 5638->5639 5640 401d21 GetDlgItem 5639->5640 5641 40258c 5640->5641 5642 1000164f 5643 10001516 GlobalFree 5642->5643 5645 10001667 5643->5645 5644 100016ad GlobalFree 5645->5644 5646 10001682 5645->5646 5647 10001699 VirtualFree 5645->5647 5646->5644 5647->5644 5648 40190f 5649 402c37 17 API calls 5648->5649 5650 401916 5649->5650 5651 405a12 MessageBoxIndirectW 5650->5651 5652 40191f 5651->5652 5653 404d90 GetDlgItem GetDlgItem 5654 404de2 7 API calls 5653->5654 5663 404ffb 5653->5663 5655 404e85 DeleteObject 5654->5655 5656 404e78 SendMessageW 5654->5656 5657 404e8e 5655->5657 5656->5655 5659 404ec5 5657->5659 5661 4063d2 17 API calls 5657->5661 5658 4050df 5660 40518b 5658->5660 5670 405138 SendMessageW 5658->5670 5696 404fee 5658->5696 5664 404345 18 API calls 5659->5664 5666 405195 SendMessageW 5660->5666 5667 40519d 5660->5667 5668 404ea7 SendMessageW SendMessageW 5661->5668 5662 40506c 5662->5658 5672 4050d1 SendMessageW 5662->5672 5663->5658 5663->5662 5673 404cde 5 API calls 5663->5673 5665 404ed9 5664->5665 5669 404345 18 API calls 5665->5669 5666->5667 5677 4051b6 5667->5677 5678 4051af ImageList_Destroy 5667->5678 5689 4051c6 5667->5689 5668->5657 5684 404ee7 5669->5684 5675 40514d SendMessageW 5670->5675 5670->5696 5671 4043ac 8 API calls 5676 405381 5671->5676 5672->5658 5673->5662 5674 405335 5682 405347 ShowWindow GetDlgItem ShowWindow 5674->5682 5674->5696 5681 405160 5675->5681 5679 4051bf GlobalFree 5677->5679 5677->5689 5678->5677 5679->5689 5680 404fbc GetWindowLongW SetWindowLongW 5683 404fd5 5680->5683 5690 405171 SendMessageW 5681->5690 5682->5696 5685 404ff3 5683->5685 5686 404fdb ShowWindow 5683->5686 5684->5680 5688 404f37 SendMessageW 5684->5688 5691 404fb6 5684->5691 5693 404f73 SendMessageW 5684->5693 5694 404f84 SendMessageW 5684->5694 5705 40437a SendMessageW 5685->5705 5704 40437a SendMessageW 5686->5704 5688->5684 5689->5674 5695 404d5e 4 API calls 5689->5695 5700 405201 5689->5700 5690->5660 5691->5680 5691->5683 5693->5684 5694->5684 5695->5700 5696->5671 5697 40530b InvalidateRect 5697->5674 5698 405321 5697->5698 5706 404c99 5698->5706 5699 40522f SendMessageW 5703 405245 5699->5703 5700->5699 5700->5703 5702 4052b9 SendMessageW SendMessageW 5702->5703 5703->5697 5703->5702 5704->5696 5705->5663 5709 404bd0 5706->5709 5708 404cae 5708->5674 5710 404be9 5709->5710 5711 4063d2 17 API calls 5710->5711 5712 404c4d 5711->5712 5713 4063d2 17 API calls 5712->5713 5714 404c58 5713->5714 5715 4063d2 17 API calls 5714->5715 5716 404c6e lstrlenW wsprintfW SetDlgItemTextW 5715->5716 5716->5708 5717 401491 5718 405414 24 API calls 5717->5718 5719 401498 5718->5719 5720 402592 5721 4025c1 5720->5721 5722 4025a6 5720->5722 5724 4025f5 5721->5724 5725 4025c6 5721->5725 5723 402c15 17 API calls 5722->5723 5731 4025ad 5723->5731 5727 402c37 17 API calls 5724->5727 5726 402c37 17 API calls 5725->5726 5728 4025cd WideCharToMultiByte lstrlenA 5726->5728 5729 4025fc lstrlenW 5727->5729 5728->5731 5729->5731 5730 402629 5732 405f54 WriteFile 5730->5732 5734 40263f 5730->5734 5731->5730 5733 405f83 5 API calls 5731->5733 5731->5734 5732->5734 5733->5730 5735 404493 lstrlenW 5736 4044b2 5735->5736 5737 4044b4 WideCharToMultiByte 5735->5737 5736->5737 5738 404814 5739 404840 5738->5739 5740 404851 5738->5740 5799 4059f6 GetDlgItemTextW 5739->5799 5742 40485d GetDlgItem 5740->5742 5748 4048bc 5740->5748 5744 404871 5742->5744 5743 40484b 5746 406644 5 API calls 5743->5746 5750 404885 SetWindowTextW 5744->5750 5755 405d2c 4 API calls 5744->5755 5745 4049a0 5747 404b4f 5745->5747 5801 4059f6 GetDlgItemTextW 5745->5801 5746->5740 5754 4043ac 8 API calls 5747->5754 5748->5745 5748->5747 5751 4063d2 17 API calls 5748->5751 5753 404345 18 API calls 5750->5753 5756 404930 SHBrowseForFolderW 5751->5756 5752 4049d0 5757 405d89 18 API calls 5752->5757 5758 4048a1 5753->5758 5759 404b63 5754->5759 5760 40487b 5755->5760 5756->5745 5761 404948 CoTaskMemFree 5756->5761 5762 4049d6 5757->5762 5763 404345 18 API calls 5758->5763 5760->5750 5764 405c81 3 API calls 5760->5764 5765 405c81 3 API calls 5761->5765 5802 4063b0 lstrcpynW 5762->5802 5766 4048af 5763->5766 5764->5750 5767 404955 5765->5767 5800 40437a SendMessageW 5766->5800 5770 40498c SetDlgItemTextW 5767->5770 5775 4063d2 17 API calls 5767->5775 5770->5745 5771 4048b5 5773 40678a 5 API calls 5771->5773 5772 4049ed 5774 40678a 5 API calls 5772->5774 5773->5748 5782 4049f4 5774->5782 5776 404974 lstrcmpiW 5775->5776 5776->5770 5779 404985 lstrcatW 5776->5779 5777 404a35 5803 4063b0 lstrcpynW 5777->5803 5779->5770 5780 404a3c 5781 405d2c 4 API calls 5780->5781 5783 404a42 GetDiskFreeSpaceW 5781->5783 5782->5777 5785 405ccd 2 API calls 5782->5785 5787 404a8d 5782->5787 5786 404a66 MulDiv 5783->5786 5783->5787 5785->5782 5786->5787 5788 404afe 5787->5788 5789 404c99 20 API calls 5787->5789 5790 404b21 5788->5790 5792 40140b 2 API calls 5788->5792 5791 404aeb 5789->5791 5804 404367 EnableWindow 5790->5804 5794 404b00 SetDlgItemTextW 5791->5794 5795 404af0 5791->5795 5792->5790 5794->5788 5797 404bd0 20 API calls 5795->5797 5796 404b3d 5796->5747 5798 40476d SendMessageW 5796->5798 5797->5788 5798->5747 5799->5743 5800->5771 5801->5752 5802->5772 5803->5780 5804->5796 5805 10001058 5807 10001074 5805->5807 5806 100010dd 5807->5806 5808 10001516 GlobalFree 5807->5808 5809 10001092 5807->5809 5808->5809 5810 10001516 GlobalFree 5809->5810 5811 100010a2 5810->5811 5812 100010b2 5811->5812 5813 100010a9 GlobalSize 5811->5813 5814 100010b6 GlobalAlloc 5812->5814 5815 100010c7 5812->5815 5813->5812 5816 1000153d 3 API calls 5814->5816 5817 100010d2 GlobalFree 5815->5817 5816->5815 5817->5806 5818 401c19 5819 402c15 17 API calls 5818->5819 5820 401c20 5819->5820 5821 402c15 17 API calls 5820->5821 5822 401c2d 5821->5822 5823 402c37 17 API calls 5822->5823 5825 401c42 5822->5825 5823->5825 5824 401c52 5827 401ca9 5824->5827 5828 401c5d 5824->5828 5825->5824 5826 402c37 17 API calls 5825->5826 5826->5824 5829 402c37 17 API calls 5827->5829 5830 402c15 17 API calls 5828->5830 5831 401cae 5829->5831 5832 401c62 5830->5832 5833 402c37 17 API calls 5831->5833 5834 402c15 17 API calls 5832->5834 5835 401cb7 FindWindowExW 5833->5835 5836 401c6e 5834->5836 5839 401cd9 5835->5839 5837 401c99 SendMessageW 5836->5837 5838 401c7b SendMessageTimeoutW 5836->5838 5837->5839 5838->5839 5840 402a9a SendMessageW 5841 402ab4 InvalidateRect 5840->5841 5842 402abf 5840->5842 5841->5842 5843 40281b 5844 402821 5843->5844 5845 402829 FindClose 5844->5845 5846 402abf 5844->5846 5845->5846 5847 40149e 5848 4014ac PostQuitMessage 5847->5848 5849 4022f1 5847->5849 5848->5849 5857 100010e1 5859 10001111 5857->5859 5858 100011d8 GlobalFree 5859->5858 5860 100012ba 2 API calls 5859->5860 5861 100011d3 5859->5861 5862 10001272 2 API calls 5859->5862 5863 10001164 GlobalAlloc 5859->5863 5864 100011f8 GlobalFree 5859->5864 5865 100012e1 lstrcpyW 5859->5865 5866 100011c4 GlobalFree 5859->5866 5860->5859 5861->5858 5862->5866 5863->5859 5864->5859 5865->5859 5866->5859 5867 4029a2 5868 402c15 17 API calls 5867->5868 5869 4029a8 5868->5869 5870 4029e8 5869->5870 5871 4029cf 5869->5871 5879 402885 5869->5879 5872 402a02 5870->5872 5873 4029f2 5870->5873 5875 4029d4 5871->5875 5876 4029e5 5871->5876 5874 4063d2 17 API calls 5872->5874 5877 402c15 17 API calls 5873->5877 5874->5876 5881 4063b0 lstrcpynW 5875->5881 5876->5879 5882 4062f7 wsprintfW 5876->5882 5877->5876 5881->5879 5882->5879 4387 4015a3 4388 402c37 17 API calls 4387->4388 4389 4015aa SetFileAttributesW 4388->4389 4390 4015bc 4389->4390 5883 4028a7 5884 402c37 17 API calls 5883->5884 5885 4028b5 5884->5885 5886 4028cb 5885->5886 5887 402c37 17 API calls 5885->5887 5888 405e7d 2 API calls 5886->5888 5887->5886 5889 4028d1 5888->5889 5911 405ea2 GetFileAttributesW CreateFileW 5889->5911 5891 4028de 5892 402981 5891->5892 5893 4028ea GlobalAlloc 5891->5893 5896 402989 DeleteFileW 5892->5896 5897 40299c 5892->5897 5894 402903 5893->5894 5895 402978 CloseHandle 5893->5895 5912 403441 SetFilePointer 5894->5912 5895->5892 5896->5897 5899 402909 5900 40342b ReadFile 5899->5900 5901 402912 GlobalAlloc 5900->5901 5902 402922 5901->5902 5903 402956 5901->5903 5905 4031ba 44 API calls 5902->5905 5904 405f54 WriteFile 5903->5904 5906 402962 GlobalFree 5904->5906 5910 40292f 5905->5910 5907 4031ba 44 API calls 5906->5907 5909 402975 5907->5909 5908 40294d GlobalFree 5908->5903 5909->5895 5910->5908 5911->5891 5912->5899 4781 40202c 4782 4020f0 4781->4782 4783 40203e 4781->4783 4785 401423 24 API calls 4782->4785 4784 402c37 17 API calls 4783->4784 4786 402045 4784->4786 4792 40224a 4785->4792 4787 402c37 17 API calls 4786->4787 4788 40204e 4787->4788 4789 402064 LoadLibraryExW 4788->4789 4790 402056 GetModuleHandleW 4788->4790 4789->4782 4791 402075 4789->4791 4790->4789 4790->4791 4804 4067f9 WideCharToMultiByte 4791->4804 4795 402086 4798 4020a5 4795->4798 4799 40208e 4795->4799 4796 4020bf 4797 405414 24 API calls 4796->4797 4800 402096 4797->4800 4807 10001759 4798->4807 4801 401423 24 API calls 4799->4801 4800->4792 4802 4020e2 FreeLibrary 4800->4802 4801->4800 4802->4792 4805 406823 GetProcAddress 4804->4805 4806 402080 4804->4806 4805->4806 4806->4795 4806->4796 4808 10001789 4807->4808 4849 10001b18 4808->4849 4810 10001790 4811 100018a6 4810->4811 4812 100017a1 4810->4812 4813 100017a8 4810->4813 4811->4800 4897 10002286 4812->4897 4881 100022d0 4813->4881 4818 1000180c 4824 10001812 4818->4824 4825 1000184e 4818->4825 4819 100017ee 4910 100024a4 4819->4910 4820 100017d7 4835 100017cd 4820->4835 4907 10002b57 4820->4907 4821 100017be 4823 100017c4 4821->4823 4829 100017cf 4821->4829 4823->4835 4891 1000289c 4823->4891 4831 100015b4 3 API calls 4824->4831 4827 100024a4 10 API calls 4825->4827 4833 10001840 4827->4833 4828 100017f4 4921 100015b4 4828->4921 4901 10002640 4829->4901 4832 10001828 4831->4832 4837 100024a4 10 API calls 4832->4837 4848 10001895 4833->4848 4932 10002467 4833->4932 4835->4818 4835->4819 4837->4833 4839 100017d5 4839->4835 4841 1000189f GlobalFree 4841->4811 4845 10001881 4845->4848 4936 1000153d wsprintfW 4845->4936 4846 1000187a FreeLibrary 4846->4845 4848->4811 4848->4841 4939 1000121b GlobalAlloc 4849->4939 4851 10001b3c 4940 1000121b GlobalAlloc 4851->4940 4853 10001d7a GlobalFree GlobalFree GlobalFree 4855 10001d97 4853->4855 4860 10001de1 4853->4860 4854 10001b47 4854->4853 4858 10001c1d GlobalAlloc 4854->4858 4854->4860 4863 10001c68 lstrcpyW 4854->4863 4864 10001c86 GlobalFree 4854->4864 4866 10001c72 lstrcpyW 4854->4866 4871 10002048 4854->4871 4875 10001cc4 4854->4875 4876 10001f37 GlobalFree 4854->4876 4879 1000122c 2 API calls 4854->4879 4946 1000121b GlobalAlloc 4854->4946 4856 10001dac 4855->4856 4857 100020ee 4855->4857 4855->4860 4856->4860 4943 1000122c 4856->4943 4859 10002110 GetModuleHandleW 4857->4859 4857->4860 4858->4854 4861 10002121 LoadLibraryW 4859->4861 4862 10002136 4859->4862 4860->4810 4861->4860 4861->4862 4947 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4862->4947 4863->4866 4864->4854 4866->4854 4867 10002148 4868 10002188 4867->4868 4880 10002172 GetProcAddress 4867->4880 4868->4860 4869 10002195 lstrlenW 4868->4869 4948 100015ff WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4869->4948 4871->4860 4874 10002090 lstrcpyW 4871->4874 4874->4860 4875->4854 4941 1000158f GlobalSize GlobalAlloc 4875->4941 4876->4854 4877 100021af 4877->4860 4879->4854 4880->4868 4889 100022e8 4881->4889 4883 10002410 GlobalFree 4884 100017ae 4883->4884 4883->4889 4884->4820 4884->4821 4884->4835 4885 100023ba GlobalAlloc 4888 100023d1 4885->4888 4886 1000238f GlobalAlloc WideCharToMultiByte 4886->4883 4887 1000122c GlobalAlloc lstrcpynW 4887->4889 4888->4883 4954 100025d4 4888->4954 4889->4883 4889->4885 4889->4886 4889->4887 4889->4888 4950 100012ba 4889->4950 4893 100028ae 4891->4893 4892 10002953 VirtualAllocEx 4894 10002971 4892->4894 4893->4892 4895 10002a62 GetLastError 4894->4895 4896 10002a6d 4894->4896 4895->4896 4896->4835 4898 10002296 4897->4898 4899 100017a7 4897->4899 4898->4899 4900 100022a8 GlobalAlloc 4898->4900 4899->4813 4900->4898 4905 1000265c 4901->4905 4902 100026c0 4904 100026c5 GlobalSize 4902->4904 4906 100026cf 4902->4906 4903 100026ad GlobalAlloc 4903->4906 4904->4906 4905->4902 4905->4903 4906->4839 4908 10002b62 4907->4908 4909 10002ba2 GlobalFree 4908->4909 4957 1000121b GlobalAlloc 4910->4957 4912 10002506 MultiByteToWideChar 4917 100024ae 4912->4917 4913 1000252b StringFromGUID2 4913->4917 4914 1000253c lstrcpynW 4914->4917 4915 1000256c GlobalFree 4915->4917 4916 1000254f wsprintfW 4916->4917 4917->4912 4917->4913 4917->4914 4917->4915 4917->4916 4918 100025a7 GlobalFree 4917->4918 4919 10001272 2 API calls 4917->4919 4958 100012e1 4917->4958 4918->4828 4919->4917 4962 1000121b GlobalAlloc 4921->4962 4923 100015ba 4924 100015c7 lstrcpyW 4923->4924 4926 100015e1 4923->4926 4927 100015fb 4924->4927 4926->4927 4928 100015e6 wsprintfW 4926->4928 4929 10001272 4927->4929 4928->4927 4930 100012b5 GlobalFree 4929->4930 4931 1000127b GlobalAlloc lstrcpynW 4929->4931 4930->4833 4931->4930 4933 10002475 4932->4933 4935 10001861 4932->4935 4934 10002491 GlobalFree 4933->4934 4933->4935 4934->4933 4935->4845 4935->4846 4937 10001272 2 API calls 4936->4937 4938 1000155e 4937->4938 4938->4848 4939->4851 4940->4854 4942 100015ad 4941->4942 4942->4875 4949 1000121b GlobalAlloc 4943->4949 4945 1000123b lstrcpynW 4945->4860 4946->4854 4947->4867 4948->4877 4949->4945 4951 100012c1 4950->4951 4952 1000122c 2 API calls 4951->4952 4953 100012df 4952->4953 4953->4889 4955 100025e2 VirtualAlloc 4954->4955 4956 10002638 4954->4956 4955->4956 4956->4888 4957->4917 4959 100012ea 4958->4959 4960 1000130c 4958->4960 4959->4960 4961 100012f0 lstrcpyW 4959->4961 4960->4917 4961->4960 4962->4923 5920 402a2f 5921 402c15 17 API calls 5920->5921 5922 402a35 5921->5922 5923 402a6c 5922->5923 5925 402885 5922->5925 5926 402a47 5922->5926 5924 4063d2 17 API calls 5923->5924 5923->5925 5924->5925 5926->5925 5928 4062f7 wsprintfW 5926->5928 5928->5925 5929 401a30 5930 402c37 17 API calls 5929->5930 5931 401a39 ExpandEnvironmentStringsW 5930->5931 5932 401a4d 5931->5932 5934 401a60 5931->5934 5933 401a52 lstrcmpW 5932->5933 5932->5934 5933->5934 5940 401db3 GetDC 5941 402c15 17 API calls 5940->5941 5942 401dc5 GetDeviceCaps MulDiv ReleaseDC 5941->5942 5943 402c15 17 API calls 5942->5943 5944 401df6 5943->5944 5945 4063d2 17 API calls 5944->5945 5946 401e33 CreateFontIndirectW 5945->5946 5947 40258c 5946->5947 5948 402835 5949 40283d 5948->5949 5950 402841 FindNextFileW 5949->5950 5951 402853 5949->5951 5950->5951 5952 4029e0 5951->5952 5954 4063b0 lstrcpynW 5951->5954 5954->5952 5955 401735 5956 402c37 17 API calls 5955->5956 5957 40173c SearchPathW 5956->5957 5958 4029e0 5957->5958 5959 401757 5957->5959 5959->5958 5961 4063b0 lstrcpynW 5959->5961 5961->5958 5962 10002a77 5963 10002a8f 5962->5963 5964 1000158f 2 API calls 5963->5964 5965 10002aaa 5964->5965 5966 4014b8 5967 4014be 5966->5967 5968 401389 2 API calls 5967->5968 5969 4014c6 5968->5969 5970 406aba 5974 40693e 5970->5974 5971 4072a9 5972 4069c8 GlobalAlloc 5972->5971 5972->5974 5973 4069bf GlobalFree 5973->5972 5974->5971 5974->5972 5974->5973 5975 406a36 GlobalFree 5974->5975 5976 406a3f GlobalAlloc 5974->5976 5975->5976 5976->5971 5976->5974

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 403489-4034c6 SetErrorMode GetVersion 1 4034c8-4034d0 call 40678a 0->1 2 4034d9 0->2 1->2 8 4034d2 1->8 3 4034de-4034f2 call 40671a lstrlenA 2->3 9 4034f4-403510 call 40678a * 3 3->9 8->2 16 403521-403582 #17 OleInitialize SHGetFileInfoW call 4063b0 GetCommandLineW call 4063b0 GetModuleHandleW 9->16 17 403512-403518 9->17 24 403584-40358b 16->24 25 40358c-4035a6 call 405cae CharNextW 16->25 17->16 22 40351a 17->22 22->16 24->25 28 4035ac-4035b2 25->28 29 4036bd-4036d7 GetTempPathW call 403458 25->29 31 4035b4-4035b9 28->31 32 4035bb-4035bf 28->32 36 4036d9-4036f7 GetWindowsDirectoryW lstrcatW call 403458 29->36 37 40372f-403749 DeleteFileW call 402f14 29->37 31->31 31->32 34 4035c1-4035c5 32->34 35 4035c6-4035ca 32->35 34->35 38 4035d0-4035d6 35->38 39 403689-403696 call 405cae 35->39 36->37 54 4036f9-403729 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403458 36->54 57 4037fa-40380a call 4039cc OleUninitialize 37->57 58 40374f-403755 37->58 43 4035f1-40362a 38->43 44 4035d8-4035e0 38->44 55 403698-403699 39->55 56 40369a-4036a0 39->56 45 403647-403681 43->45 46 40362c-403631 43->46 50 4035e2-4035e5 44->50 51 4035e7 44->51 45->39 53 403683-403687 45->53 46->45 52 403633-40363b 46->52 50->43 50->51 51->43 60 403642 52->60 61 40363d-403640 52->61 53->39 62 4036a8-4036b6 call 4063b0 53->62 54->37 54->57 55->56 56->28 64 4036a6 56->64 74 403930-403936 57->74 75 403810-403820 call 405a12 ExitProcess 57->75 65 4037ea-4037f1 call 403abe 58->65 66 40375b-403766 call 405cae 58->66 60->45 61->45 61->60 69 4036bb 62->69 64->69 73 4037f6 65->73 77 4037b4-4037be 66->77 78 403768-40379d 66->78 69->29 73->57 80 4039b4-4039bc 74->80 81 403938-40394e GetCurrentProcess OpenProcessToken 74->81 85 4037c0-4037ce call 405d89 77->85 86 403826-40383a call 40597d lstrcatW 77->86 82 40379f-4037a3 78->82 83 4039c2-4039c6 ExitProcess 80->83 84 4039be 80->84 88 403950-40397e LookupPrivilegeValueW AdjustTokenPrivileges 81->88 89 403984-403992 call 40678a 81->89 90 4037a5-4037aa 82->90 91 4037ac-4037b0 82->91 84->83 85->57 99 4037d0-4037e6 call 4063b0 * 2 85->99 100 403847-403861 lstrcatW lstrcmpiW 86->100 101 40383c-403842 lstrcatW 86->101 88->89 102 4039a0-4039ab ExitWindowsEx 89->102 103 403994-40399e 89->103 90->91 95 4037b2 90->95 91->82 91->95 95->77 99->65 100->57 106 403863-403866 100->106 101->100 102->80 104 4039ad-4039af call 40140b 102->104 103->102 103->104 104->80 110 403868-40386d call 4058e3 106->110 111 40386f call 405960 106->111 115 403874-403882 SetCurrentDirectoryW 110->115 111->115 118 403884-40388a call 4063b0 115->118 119 40388f-4038b8 call 4063b0 115->119 118->119 123 4038bd-4038d9 call 4063d2 DeleteFileW 119->123 126 40391a-403922 123->126 127 4038db-4038eb CopyFileW 123->127 126->123 128 403924-40392b call 406176 126->128 127->126 129 4038ed-40390d call 406176 call 4063d2 call 405995 127->129 128->57 129->126 138 40390f-403916 CloseHandle 129->138 138->126
                          APIs
                          • SetErrorMode.KERNELBASE ref: 004034AC
                          • GetVersion.KERNEL32 ref: 004034B2
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 004034E5
                          • #17.COMCTL32(?,00000006,00000008,0000000A), ref: 00403522
                          • OleInitialize.OLE32(00000000), ref: 00403529
                          • SHGetFileInfoW.SHELL32(004216E8,00000000,?,000002B4,00000000), ref: 00403545
                          • GetCommandLineW.KERNEL32(00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 0040355A
                          • GetModuleHandleW.KERNEL32(00000000,"C:\Users\user\Desktop\PEDIDO-144797.exe",00000000,?,00000006,00000008,0000000A), ref: 0040356D
                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\PEDIDO-144797.exe",00000020,?,00000006,00000008,0000000A), ref: 00403594
                            • Part of subcall function 0040678A: GetModuleHandleA.KERNEL32(?,00000020,?,004034FB,0000000A), ref: 0040679C
                            • Part of subcall function 0040678A: GetProcAddress.KERNEL32(00000000,?), ref: 004067B7
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 004036CE
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000006,00000008,0000000A), ref: 004036DF
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004036EB
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000006,00000008,0000000A), ref: 004036FF
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403707
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000006,00000008,0000000A), ref: 00403718
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403720
                          • DeleteFileW.KERNELBASE(1033,?,00000006,00000008,0000000A), ref: 00403734
                            • Part of subcall function 004063B0: lstrcpynW.KERNEL32(?,?,00000400,0040355A,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063BD
                          • OleUninitialize.OLE32(00000006,?,00000006,00000008,0000000A), ref: 004037FF
                          • ExitProcess.KERNEL32 ref: 00403820
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PEDIDO-144797.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403833
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,0040A328,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PEDIDO-144797.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403842
                          • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PEDIDO-144797.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 0040384D
                          • lstrcmpiW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user\AppData\Local\Temp\,.tmp,C:\Users\user\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\PEDIDO-144797.exe",00000000,00000006,?,00000006,00000008,0000000A), ref: 00403859
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,?,00000006,00000008,0000000A), ref: 00403875
                          • DeleteFileW.KERNEL32(00420EE8,00420EE8,?,0042B000,00000008,?,00000006,00000008,0000000A), ref: 004038CF
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\PEDIDO-144797.exe,00420EE8,00000001,?,00000006,00000008,0000000A), ref: 004038E3
                          • CloseHandle.KERNEL32(00000000,00420EE8,00420EE8,?,00420EE8,00000000,?,00000006,00000008,0000000A), ref: 00403910
                          • GetCurrentProcess.KERNEL32(00000028,0000000A,00000006,00000008,0000000A), ref: 0040393F
                          • OpenProcessToken.ADVAPI32(00000000), ref: 00403946
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 0040395B
                          • AdjustTokenPrivileges.ADVAPI32 ref: 0040397E
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 004039A3
                          • ExitProcess.KERNEL32 ref: 004039C6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: lstrcat$FileProcess$ExitHandle$CurrentDeleteDirectoryEnvironmentModulePathTempTokenVariableWindows$AddressAdjustCharCloseCommandCopyErrorInfoInitializeLineLookupModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrcmpilstrcpynlstrlen
                          • String ID: "C:\Users\user\Desktop\PEDIDO-144797.exe"$.tmp$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet\sludrehovedet\mississippi$C:\Users\user\Desktop$C:\Users\user\Desktop\PEDIDO-144797.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                          • API String ID: 2488574733-2309197969
                          • Opcode ID: 0c5ed391fea6fa0d6bec001cb8bac7c1b86e8aed39806b07c52da4fce73069a4
                          • Instruction ID: aa49a9b5ba718b736b7abce3970f6df4d0a927ceef10040f9259c4205047f8e0
                          • Opcode Fuzzy Hash: 0c5ed391fea6fa0d6bec001cb8bac7c1b86e8aed39806b07c52da4fce73069a4
                          • Instruction Fuzzy Hash: 3DD103B1600311ABD3206F759D45B3B3AACEB4070AF10443FF981B62D2DBBD8D558A6E
                          APIs
                            • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                          • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 10001C24
                          • lstrcpyW.KERNEL32(00000008,?), ref: 10001C6C
                          • lstrcpyW.KERNEL32(00000808,?), ref: 10001C76
                          • GlobalFree.KERNEL32(00000000), ref: 10001C89
                          • GlobalFree.KERNEL32(?), ref: 10001D83
                          • GlobalFree.KERNEL32(?), ref: 10001D88
                          • GlobalFree.KERNEL32(?), ref: 10001D8D
                          • GlobalFree.KERNEL32(00000000), ref: 10001F38
                          • lstrcpyW.KERNEL32(?,?), ref: 1000209C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4137820666.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4137808632.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137830674.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137859867.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Global$Free$lstrcpy$Alloc
                          • String ID:
                          • API String ID: 4227406936-0
                          • Opcode ID: 5a24c136153c29b9d98a91a4f463aeb2504b823c6cdae7135cdbbdb8769d9cc1
                          • Instruction ID: 952ca616c20dc2fa21031af5d26a5f3ec91fa4f9dea92b18a1e2b318678e368b
                          • Opcode Fuzzy Hash: 5a24c136153c29b9d98a91a4f463aeb2504b823c6cdae7135cdbbdb8769d9cc1
                          • Instruction Fuzzy Hash: 10129C75D0064AEFEB20CFA4C8806EEB7F4FB083D4F61452AE565E7198D774AA80DB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 484 405abe-405ae4 call 405d89 487 405ae6-405af8 DeleteFileW 484->487 488 405afd-405b04 484->488 489 405c7a-405c7e 487->489 490 405b06-405b08 488->490 491 405b17-405b27 call 4063b0 488->491 492 405c28-405c2d 490->492 493 405b0e-405b11 490->493 497 405b36-405b37 call 405ccd 491->497 498 405b29-405b34 lstrcatW 491->498 492->489 496 405c2f-405c32 492->496 493->491 493->492 499 405c34-405c3a 496->499 500 405c3c-405c44 call 4066f3 496->500 501 405b3c-405b40 497->501 498->501 499->489 500->489 508 405c46-405c5a call 405c81 call 405a76 500->508 504 405b42-405b4a 501->504 505 405b4c-405b52 lstrcatW 501->505 504->505 507 405b57-405b73 lstrlenW FindFirstFileW 504->507 505->507 509 405b79-405b81 507->509 510 405c1d-405c21 507->510 524 405c72-405c75 call 405414 508->524 525 405c5c-405c5f 508->525 513 405ba1-405bb5 call 4063b0 509->513 514 405b83-405b8b 509->514 510->492 512 405c23 510->512 512->492 526 405bb7-405bbf 513->526 527 405bcc-405bd7 call 405a76 513->527 517 405c00-405c10 FindNextFileW 514->517 518 405b8d-405b95 514->518 517->509 522 405c16-405c17 FindClose 517->522 518->513 523 405b97-405b9f 518->523 522->510 523->513 523->517 524->489 525->499 528 405c61-405c70 call 405414 call 406176 525->528 526->517 529 405bc1-405bca call 405abe 526->529 537 405bf8-405bfb call 405414 527->537 538 405bd9-405bdc 527->538 528->489 529->517 537->517 541 405bf0-405bf6 538->541 542 405bde-405bee call 405414 call 406176 538->542 541->517 542->517
                          APIs
                          • DeleteFileW.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405AE7
                          • lstrcatW.KERNEL32(00425730,\*.*,00425730,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405B2F
                          • lstrcatW.KERNEL32(?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405B52
                          • lstrlenW.KERNEL32(?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405B58
                          • FindFirstFileW.KERNEL32(00425730,?,?,?,0040A014,?,00425730,?,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405B68
                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405C08
                          • FindClose.KERNEL32(00000000), ref: 00405C17
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                          • String ID: "C:\Users\user\Desktop\PEDIDO-144797.exe"$0WB$C:\Users\user\AppData\Local\Temp\$\*.*
                          • API String ID: 2035342205-3041239434
                          • Opcode ID: 6a659da8d5721ce07b89c17eb76fa4599111a2d920b673130fc03b7c63125bad
                          • Instruction ID: 07f17dd178ac6d8b62b8dc139a3c49ba2dacd8a3a96bf447fe2624e5f5ce8b98
                          • Opcode Fuzzy Hash: 6a659da8d5721ce07b89c17eb76fa4599111a2d920b673130fc03b7c63125bad
                          • Instruction Fuzzy Hash: 1741D030904A18A6DB21AB618D89FBF7678EF42719F50813BF801B11D1D77C5982DEAE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 842 406aba-406abf 843 406b30-406b4e 842->843 844 406ac1-406af0 842->844 845 407126-40713b 843->845 846 406af2-406af5 844->846 847 406af7-406afb 844->847 851 407155-40716b 845->851 852 40713d-407153 845->852 848 406b07-406b0a 846->848 849 406b03 847->849 850 406afd-406b01 847->850 853 406b28-406b2b 848->853 854 406b0c-406b15 848->854 849->848 850->848 855 40716e-407175 851->855 852->855 858 406cfd-406d1b 853->858 856 406b17 854->856 857 406b1a-406b26 854->857 859 407177-40717b 855->859 860 40719c-4071a8 855->860 856->857 864 406b90-406bbe 857->864 862 406d33-406d45 858->862 863 406d1d-406d31 858->863 865 407181-407199 859->865 866 40732a-407334 859->866 867 40693e-406947 860->867 868 406d48-406d52 862->868 863->868 870 406bc0-406bd8 864->870 871 406bda-406bf4 864->871 865->860 869 407340-407353 866->869 875 407355 867->875 876 40694d 867->876 873 406d54 868->873 874 406cf5-406cfb 868->874 877 407358-40735c 869->877 872 406bf7-406c01 870->872 871->872 879 406c07 872->879 880 406b78-406b7e 872->880 881 406cd0-406cd4 873->881 882 406e65-406e72 873->882 874->858 878 406c99-406ca3 874->878 875->877 883 406954-406958 876->883 884 406a94-406ab5 876->884 885 4069f9-4069fd 876->885 886 406a69-406a6d 876->886 893 4072e8-4072f2 878->893 894 406ca9-406ccb 878->894 901 4072c4-4072ce 879->901 902 406b5d-406b75 879->902 895 406c31-406c37 880->895 896 406b84-406b8a 880->896 897 406cda-406cf2 881->897 898 4072dc-4072e6 881->898 882->867 890 406ec1-406ed0 882->890 883->869 899 40695e-40696b 883->899 884->845 891 406a03-406a1c 885->891 892 4072a9-4072b3 885->892 887 406a73-406a87 886->887 888 4072b8-4072c2 886->888 900 406a8a-406a92 887->900 888->869 890->845 906 406a1f-406a23 891->906 892->869 893->869 894->882 903 406c95 895->903 905 406c39-406c57 895->905 896->864 896->903 897->874 898->869 899->875 904 406971-4069b7 899->904 900->884 900->886 901->869 902->880 903->878 907 4069b9-4069bd 904->907 908 4069df-4069e1 904->908 909 406c59-406c6d 905->909 910 406c6f-406c81 905->910 906->885 911 406a25-406a2b 906->911 912 4069c8-4069d6 GlobalAlloc 907->912 913 4069bf-4069c2 GlobalFree 907->913 914 4069e3-4069ed 908->914 915 4069ef-4069f7 908->915 916 406c84-406c8e 909->916 910->916 917 406a55-406a67 911->917 918 406a2d-406a34 911->918 912->875 919 4069dc 912->919 913->912 914->914 914->915 915->906 916->895 920 406c90 916->920 917->900 921 406a36-406a39 GlobalFree 918->921 922 406a3f-406a4f GlobalAlloc 918->922 919->908 924 4072d0-4072da 920->924 925 406c16-406c2e 920->925 921->922 922->875 922->917 924->869 925->895
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 3c070ca994c387dc491d90c6da3338e95d076c4c889754936ff9c01511acbaf1
                          • Instruction ID: 906bff5cfe4bf8fc25f5c52b70697fc94252e662920e9b50785524ea690ef068
                          • Opcode Fuzzy Hash: 3c070ca994c387dc491d90c6da3338e95d076c4c889754936ff9c01511acbaf1
                          • Instruction Fuzzy Hash: EBF17870D04229CBDF18CFA8C8946ADBBB1FF44305F15816ED856BB281D7386A86DF45
                          APIs
                          • FindFirstFileW.KERNELBASE(?,00426778,00425F30,00405DD2,00425F30,00425F30,00000000,00425F30,00425F30,?,?,74DF2EE0,00405ADE,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0), ref: 004066FE
                          • FindClose.KERNELBASE(00000000), ref: 0040670A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: xgB
                          • API String ID: 2295610775-399326502
                          • Opcode ID: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                          • Instruction ID: 551d457f2096baf6d1028c2489454c6ec1272a262abf728b5c7319079dd029a3
                          • Opcode Fuzzy Hash: 8f8798618dbeb96281b7e152f222c6bef4cfc1fb78c0b92afc6d3f182eb863fd
                          • Instruction Fuzzy Hash: DBD012315090209BC201173CBE4C85B7A989F953397128B37B466F71E0C7348C638AE8

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 139 403abe-403ad6 call 40678a 142 403ad8-403ae8 call 4062f7 139->142 143 403aea-403b21 call 40627e 139->143 152 403b44-403b6d call 403d94 call 405d89 142->152 148 403b23-403b34 call 40627e 143->148 149 403b39-403b3f lstrcatW 143->149 148->149 149->152 157 403b73-403b78 152->157 158 403bff-403c07 call 405d89 152->158 157->158 160 403b7e-403ba6 call 40627e 157->160 164 403c15-403c3a LoadImageW 158->164 165 403c09-403c10 call 4063d2 158->165 160->158 166 403ba8-403bac 160->166 168 403cbb-403cc3 call 40140b 164->168 169 403c3c-403c6c RegisterClassW 164->169 165->164 170 403bbe-403bca lstrlenW 166->170 171 403bae-403bbb call 405cae 166->171 182 403cc5-403cc8 168->182 183 403ccd-403cd8 call 403d94 168->183 172 403c72-403cb6 SystemParametersInfoW CreateWindowExW 169->172 173 403d8a 169->173 177 403bf2-403bfa call 405c81 call 4063b0 170->177 178 403bcc-403bda lstrcmpiW 170->178 171->170 172->168 176 403d8c-403d93 173->176 177->158 178->177 181 403bdc-403be6 GetFileAttributesW 178->181 185 403be8-403bea 181->185 186 403bec-403bed call 405ccd 181->186 182->176 192 403d61-403d69 call 4054e7 183->192 193 403cde-403cf8 ShowWindow call 40671a 183->193 185->177 185->186 186->177 200 403d83-403d85 call 40140b 192->200 201 403d6b-403d71 192->201 198 403d04-403d16 GetClassInfoW 193->198 199 403cfa-403cff call 40671a 193->199 204 403d18-403d28 GetClassInfoW RegisterClassW 198->204 205 403d2e-403d5f DialogBoxParamW call 40140b call 403a0e 198->205 199->198 200->173 201->182 206 403d77-403d7e call 40140b 201->206 204->205 205->176 206->182
                          APIs
                            • Part of subcall function 0040678A: GetModuleHandleA.KERNEL32(?,00000020,?,004034FB,0000000A), ref: 0040679C
                            • Part of subcall function 0040678A: GetProcAddress.KERNEL32(00000000,?), ref: 004067B7
                          • lstrcatW.KERNEL32(1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\,74DF3420,"C:\Users\user\Desktop\PEDIDO-144797.exe",00000000), ref: 00403B3F
                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000,00000002,C:\Users\user\AppData\Local\Temp\), ref: 00403BBF
                          • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet,1033,00423728,80000001,Control Panel\Desktop\ResourceLocale,00000000,00423728,00000000), ref: 00403BD2
                          • GetFileAttributesW.KERNEL32(Call), ref: 00403BDD
                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet), ref: 00403C26
                            • Part of subcall function 004062F7: wsprintfW.USER32 ref: 00406304
                          • RegisterClassW.USER32(004291E0), ref: 00403C63
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403C7B
                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403CB0
                          • ShowWindow.USER32(00000005,00000000), ref: 00403CE6
                          • GetClassInfoW.USER32(00000000,RichEdit20W,004291E0), ref: 00403D12
                          • GetClassInfoW.USER32(00000000,RichEdit,004291E0), ref: 00403D1F
                          • RegisterClassW.USER32(004291E0), ref: 00403D28
                          • DialogBoxParamW.USER32(?,00000000,00403E6C,00000000), ref: 00403D47
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: "C:\Users\user\Desktop\PEDIDO-144797.exe"$(7B$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                          • API String ID: 1975747703-2951875440
                          • Opcode ID: ee5fd85ec343bc094daa65e3c13ef1cff60d12f5a08356af1ceed260609d9923
                          • Instruction ID: afe91a4761cf59ebc4b7da6c1f2e4a45d87dcf75ce704844472433b73fc63153
                          • Opcode Fuzzy Hash: ee5fd85ec343bc094daa65e3c13ef1cff60d12f5a08356af1ceed260609d9923
                          • Instruction Fuzzy Hash: 81619370200601BED720AF669D46E2B3A7CEB84B49F40447FFD45B62E2DB7D9912862D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 213 402f14-402f62 GetTickCount GetModuleFileNameW call 405ea2 216 402f64-402f69 213->216 217 402f6e-402f9c call 4063b0 call 405ccd call 4063b0 GetFileSize 213->217 218 4031b3-4031b7 216->218 225 402fa2-402fb9 217->225 226 40308c-40309a call 402e72 217->226 227 402fbb 225->227 228 402fbd-402fca call 40342b 225->228 233 4030a0-4030a3 226->233 234 40316b-403170 226->234 227->228 235 402fd0-402fd6 228->235 236 403127-40312f call 402e72 228->236 237 4030a5-4030bd call 403441 call 40342b 233->237 238 4030cf-40311b GlobalAlloc call 4068eb call 405ed1 CreateFileW 233->238 234->218 239 403056-40305a 235->239 240 402fd8-402ff0 call 405e5d 235->240 236->234 237->234 261 4030c3-4030c9 237->261 264 403131-403161 call 403441 call 4031ba 238->264 265 40311d-403122 238->265 245 403063-403069 239->245 246 40305c-403062 call 402e72 239->246 240->245 259 402ff2-402ff9 240->259 252 40306b-403079 call 40687d 245->252 253 40307c-403086 245->253 246->245 252->253 253->225 253->226 259->245 263 402ffb-403002 259->263 261->234 261->238 263->245 266 403004-40300b 263->266 272 403166-403169 264->272 265->218 266->245 268 40300d-403014 266->268 268->245 271 403016-403036 268->271 271->234 273 40303c-403040 271->273 272->234 274 403172-403183 272->274 275 403042-403046 273->275 276 403048-403050 273->276 278 403185 274->278 279 40318b-403190 274->279 275->226 275->276 276->245 277 403052-403054 276->277 277->245 278->279 280 403191-403197 279->280 280->280 281 403199-4031b1 call 405e5d 280->281 281->218
                          APIs
                          • GetTickCount.KERNEL32 ref: 00402F28
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\PEDIDO-144797.exe,00000400), ref: 00402F44
                            • Part of subcall function 00405EA2: GetFileAttributesW.KERNELBASE(00000003,00402F57,C:\Users\user\Desktop\PEDIDO-144797.exe,80000000,00000003), ref: 00405EA6
                            • Part of subcall function 00405EA2: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405EC8
                          • GetFileSize.KERNEL32(00000000,00000000,00439000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PEDIDO-144797.exe,C:\Users\user\Desktop\PEDIDO-144797.exe,80000000,00000003), ref: 00402F8D
                          • GlobalAlloc.KERNELBASE(00000040,0040A230), ref: 004030D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: "C:\Users\user\Desktop\PEDIDO-144797.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\PEDIDO-144797.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                          • API String ID: 2803837635-2535041674
                          • Opcode ID: 4aa3185e2732ea1d92bd2938039fdcb50ab67e449d873de13479ee0b69e06266
                          • Instruction ID: 409c8f22eebac3ceeba7cf51205c68f93d68dba00e9ec32c8e3ebc1c19b8881b
                          • Opcode Fuzzy Hash: 4aa3185e2732ea1d92bd2938039fdcb50ab67e449d873de13479ee0b69e06266
                          • Instruction Fuzzy Hash: 8D61E031A00204ABDB20EF65DD85A9A7BA8EB04355F20817FF901F72D0C77C9A418BAD

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 548 4063d2-4063dd 549 4063f0-406406 548->549 550 4063df-4063ee 548->550 551 40640c-406419 549->551 552 40661e-406624 549->552 550->549 551->552 553 40641f-406426 551->553 554 40662a-406635 552->554 555 40642b-406438 552->555 553->552 557 406640-406641 554->557 558 406637-40663b call 4063b0 554->558 555->554 556 40643e-40644a 555->556 559 406450-40648e 556->559 560 40660b 556->560 558->557 562 406494-40649f 559->562 563 4065ae-4065b2 559->563 564 406619-40661c 560->564 565 40660d-406617 560->565 566 4064a1-4064a6 562->566 567 4064b8 562->567 568 4065b4-4065ba 563->568 569 4065e5-4065e9 563->569 564->552 565->552 566->567 572 4064a8-4064ab 566->572 575 4064bf-4064c6 567->575 573 4065ca-4065d6 call 4063b0 568->573 574 4065bc-4065c8 call 4062f7 568->574 570 4065f8-406609 lstrlenW 569->570 571 4065eb-4065f3 call 4063d2 569->571 570->552 571->570 572->567 577 4064ad-4064b0 572->577 586 4065db-4065e1 573->586 574->586 579 4064c8-4064ca 575->579 580 4064cb-4064cd 575->580 577->567 582 4064b2-4064b6 577->582 579->580 584 406508-40650b 580->584 585 4064cf-4064f6 call 40627e 580->585 582->575 588 40651b-40651e 584->588 589 40650d-406519 GetSystemDirectoryW 584->589 596 406596-406599 585->596 597 4064fc-406503 call 4063d2 585->597 586->570 587 4065e3 586->587 592 4065a6-4065ac call 406644 587->592 594 406520-40652e GetWindowsDirectoryW 588->594 595 406589-40658b 588->595 593 40658d-406591 589->593 592->570 593->592 599 406593 593->599 594->595 595->593 598 406530-40653a 595->598 596->592 602 40659b-4065a1 lstrcatW 596->602 597->593 604 406554-40656a SHGetSpecialFolderLocation 598->604 605 40653c-40653f 598->605 599->596 602->592 608 406585 604->608 609 40656c-406583 SHGetPathFromIDListW CoTaskMemFree 604->609 605->604 607 406541-406548 605->607 610 406550-406552 607->610 608->595 609->593 609->608 610->593 610->604
                          APIs
                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406513
                          • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00422708,?,0040544B,00422708,00000000), ref: 00406526
                          • SHGetSpecialFolderLocation.SHELL32(0040544B,00000000,00000000,00422708,?,0040544B,00422708,00000000), ref: 00406562
                          • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406570
                          • CoTaskMemFree.OLE32(00000000), ref: 0040657B
                          • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004065A1
                          • lstrlenW.KERNEL32(Call,00000000,00422708,?,0040544B,00422708,00000000), ref: 004065F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskWindowslstrcatlstrlen
                          • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 717251189-1230650788
                          • Opcode ID: 15e8cba43a00d1251787e7505a7f0100c69544ffb4eb695e889bacc90eff1716
                          • Instruction ID: 781aa6555cb08bc9a39a1310e2b7c8a7a94b670d8f790df7948cd7d686d0a9f3
                          • Opcode Fuzzy Hash: 15e8cba43a00d1251787e7505a7f0100c69544ffb4eb695e889bacc90eff1716
                          • Instruction Fuzzy Hash: 52611771600101ABDF209F54ED40ABE37A5AF40314F56453FE947B62D4D73D8AA2CB5D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 611 40176f-401794 call 402c37 call 405cf8 616 401796-40179c call 4063b0 611->616 617 40179e-4017b0 call 4063b0 call 405c81 lstrcatW 611->617 622 4017b5-4017b6 call 406644 616->622 617->622 626 4017bb-4017bf 622->626 627 4017c1-4017cb call 4066f3 626->627 628 4017f2-4017f5 626->628 636 4017dd-4017ef 627->636 637 4017cd-4017db CompareFileTime 627->637 629 4017f7-4017f8 call 405e7d 628->629 630 4017fd-401819 call 405ea2 628->630 629->630 638 40181b-40181e 630->638 639 40188d-4018b6 call 405414 call 4031ba 630->639 636->628 637->636 640 401820-40185e call 4063b0 * 2 call 4063d2 call 4063b0 call 405a12 638->640 641 40186f-401879 call 405414 638->641 653 4018b8-4018bc 639->653 654 4018be-4018ca SetFileTime 639->654 640->626 673 401864-401865 640->673 651 401882-401888 641->651 656 402ac8 651->656 653->654 655 4018d0-4018db CloseHandle 653->655 654->655 658 4018e1-4018e4 655->658 659 402abf-402ac2 655->659 660 402aca-402ace 656->660 662 4018e6-4018f7 call 4063d2 lstrcatW 658->662 663 4018f9-4018fc call 4063d2 658->663 659->656 670 401901-4022f6 call 405a12 662->670 663->670 670->660 673->651 675 401867-401868 673->675 675->641
                          APIs
                          • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet\sludrehovedet\mississippi,?,?,00000031), ref: 004017B0
                          • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet\sludrehovedet\mississippi,?,?,00000031), ref: 004017D5
                            • Part of subcall function 004063B0: lstrcpynW.KERNEL32(?,?,00000400,0040355A,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063BD
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000,?), ref: 0040544C
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00402EEC,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000), ref: 0040545C
                            • Part of subcall function 00405414: lstrcatW.KERNEL32(00422708,00402EEC,00402EEC,00422708,00000000,00000000,00000000), ref: 0040546F
                            • Part of subcall function 00405414: SetWindowTextW.USER32(00422708,00422708), ref: 00405481
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054A7
                            • Part of subcall function 00405414: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054C1
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                          • String ID: C:\Users\user\AppData\Local\Temp\nskAD56.tmp$C:\Users\user\AppData\Local\Temp\nskAD56.tmp\System.dll$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet\sludrehovedet\mississippi$Call
                          • API String ID: 1941528284-2153024736
                          • Opcode ID: c80200c29ca938d3f9be0bc76a293d962ee4304018d07197e4f76f8e1ca0c2de
                          • Instruction ID: 6d789f9af123ab0f865e5502c846d56d3cd3544f1fa5f1ae7e054fd30d3333f6
                          • Opcode Fuzzy Hash: c80200c29ca938d3f9be0bc76a293d962ee4304018d07197e4f76f8e1ca0c2de
                          • Instruction Fuzzy Hash: E741D871510115BACF117BA5CD45EAF3679EF01328B20423FF922F10E1DB3C8A519AAE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 677 402644-40265d call 402c15 680 402663-40266a 677->680 681 402abf-402ac2 677->681 682 40266c 680->682 683 40266f-402672 680->683 684 402ac8-402ace 681->684 682->683 685 4027d6-4027de 683->685 686 402678-402687 call 406310 683->686 685->681 686->685 690 40268d 686->690 691 402693-402697 690->691 692 40272c-40272f 691->692 693 40269d-4026b8 ReadFile 691->693 694 402731-402734 692->694 695 402747-402757 call 405f25 692->695 693->685 696 4026be-4026c3 693->696 694->695 697 402736-402741 call 405f83 694->697 695->685 706 402759 695->706 696->685 699 4026c9-4026d7 696->699 697->685 697->695 702 402792-40279e call 4062f7 699->702 703 4026dd-4026ef MultiByteToWideChar 699->703 702->684 703->706 707 4026f1-4026f4 703->707 709 40275c-40275f 706->709 710 4026f6-402701 707->710 709->702 711 402761-402766 709->711 710->709 712 402703-402728 SetFilePointer MultiByteToWideChar 710->712 713 4027a3-4027a7 711->713 714 402768-40276d 711->714 712->710 715 40272a 712->715 716 4027c4-4027d0 SetFilePointer 713->716 717 4027a9-4027ad 713->717 714->713 718 40276f-402782 714->718 715->706 716->685 719 4027b5-4027c2 717->719 720 4027af-4027b3 717->720 718->685 721 402784-40278a 718->721 719->685 720->716 720->719 721->691 722 402790 721->722 722->685
                          APIs
                          • ReadFile.KERNELBASE(?,?,?,?), ref: 004026B0
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004026EB
                          • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 0040270E
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 00402724
                            • Part of subcall function 00405F83: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00405F99
                          • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 004027D0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: File$Pointer$ByteCharMultiWide$Read
                          • String ID: 9
                          • API String ID: 163830602-2366072709
                          • Opcode ID: 87cfad3e31df379bf1329a0d53b4cb21fa96f1686d8734dbec1fa7beea93af1a
                          • Instruction ID: c360ee4afea2d2749c5a2d2d3cba589ababf6fe072d155cbc4f623872b1d9462
                          • Opcode Fuzzy Hash: 87cfad3e31df379bf1329a0d53b4cb21fa96f1686d8734dbec1fa7beea93af1a
                          • Instruction Fuzzy Hash: 2E51F874D0021AAADF20DFA5DA88AAEB779FF04304F50443BE511B72D0D7B899828B58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 723 40671a-40673a GetSystemDirectoryW 724 40673c 723->724 725 40673e-406740 723->725 724->725 726 406751-406753 725->726 727 406742-40674b 725->727 729 406754-406787 wsprintfW LoadLibraryExW 726->729 727->726 728 40674d-40674f 727->728 728->729
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406731
                          • wsprintfW.USER32 ref: 0040676C
                          • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406780
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll$UXTHEME$\
                          • API String ID: 2200240437-1946221925
                          • Opcode ID: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                          • Instruction ID: 212fe184e71725d5a8014c1118872f5233ada1a9ecb6260670121aae60094f83
                          • Opcode Fuzzy Hash: 40aa1e09304642b089aa1993992f232c43871fa513f82abce0c0f0efb2bd037b
                          • Instruction Fuzzy Hash: BBF02170510119ABCF10BB64DD0DF9B375CAB00305F50447AA546F20D1EBBCDA78C798

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 730 4058e3-40592e CreateDirectoryW 731 405930-405932 730->731 732 405934-405941 GetLastError 730->732 733 40595b-40595d 731->733 732->733 734 405943-405957 SetFileSecurityW 732->734 734->731 735 405959 GetLastError 734->735 735->733
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405926
                          • GetLastError.KERNEL32 ref: 0040593A
                          • SetFileSecurityW.ADVAPI32(?,80000007,00000001), ref: 0040594F
                          • GetLastError.KERNEL32 ref: 00405959
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 3449924974-224404859
                          • Opcode ID: 4e538d1c76d2fdfb7cd0fd00a6572ed9e7029d57e55293966324597acc96cb40
                          • Instruction ID: c49c088e9ba2396d105a9c54abfe353073567d613583196498a7e7de041cdc41
                          • Opcode Fuzzy Hash: 4e538d1c76d2fdfb7cd0fd00a6572ed9e7029d57e55293966324597acc96cb40
                          • Instruction Fuzzy Hash: C8011AB1C10619DADF009FA1C9487EFBFB4EF14354F00403AD545B6291D7789618CFA9

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 736 405ed1-405edd 737 405ede-405f12 GetTickCount GetTempFileNameW 736->737 738 405f21-405f23 737->738 739 405f14-405f16 737->739 741 405f1b-405f1e 738->741 739->737 740 405f18 739->740 740->741
                          APIs
                          • GetTickCount.KERNEL32 ref: 00405EEF
                          • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,"C:\Users\user\Desktop\PEDIDO-144797.exe",00403487,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004036D5), ref: 00405F0A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: "C:\Users\user\Desktop\PEDIDO-144797.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                          • API String ID: 1716503409-1302855649
                          • Opcode ID: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                          • Instruction ID: 6418149b7de8853f47a359c443b4445f7a51012143164c36937b703eba88611a
                          • Opcode Fuzzy Hash: 0c62091ad8b50aef506abc269e58e4a43f33256201187c1c154fac6de66d8f01
                          • Instruction Fuzzy Hash: 51F03076A00204FBEB009F59ED05E9BB7ACEB95750F10803AED41F7250E6B49A54CB69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 742 10001759-10001795 call 10001b18 746 100018a6-100018a8 742->746 747 1000179b-1000179f 742->747 748 100017a1-100017a7 call 10002286 747->748 749 100017a8-100017b5 call 100022d0 747->749 748->749 754 100017e5-100017ec 749->754 755 100017b7-100017bc 749->755 756 1000180c-10001810 754->756 757 100017ee-1000180a call 100024a4 call 100015b4 call 10001272 GlobalFree 754->757 758 100017d7-100017da 755->758 759 100017be-100017bf 755->759 764 10001812-1000184c call 100015b4 call 100024a4 756->764 765 1000184e-10001854 call 100024a4 756->765 781 10001855-10001859 757->781 758->754 760 100017dc-100017dd call 10002b57 758->760 762 100017c1-100017c2 759->762 763 100017c7-100017c8 call 1000289c 759->763 774 100017e2 760->774 769 100017c4-100017c5 762->769 770 100017cf-100017d5 call 10002640 762->770 777 100017cd 763->777 764->781 765->781 769->754 769->763 780 100017e4 770->780 774->780 777->774 780->754 785 10001896-1000189d 781->785 786 1000185b-10001869 call 10002467 781->786 785->746 788 1000189f-100018a0 GlobalFree 785->788 792 10001881-10001888 786->792 793 1000186b-1000186e 786->793 788->746 792->785 795 1000188a-10001895 call 1000153d 792->795 793->792 794 10001870-10001878 793->794 794->792 796 1000187a-1000187b FreeLibrary 794->796 795->785 796->792
                          APIs
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D83
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D88
                            • Part of subcall function 10001B18: GlobalFree.KERNEL32(?), ref: 10001D8D
                          • GlobalFree.KERNEL32(00000000), ref: 10001804
                          • FreeLibrary.KERNEL32(?), ref: 1000187B
                          • GlobalFree.KERNEL32(00000000), ref: 100018A0
                            • Part of subcall function 10002286: GlobalAlloc.KERNEL32(00000040,8BC3C95B), ref: 100022B8
                            • Part of subcall function 10002640: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,100017D5,00000000), ref: 100026B2
                            • Part of subcall function 100015B4: lstrcpyW.KERNEL32(00000000,10004020,00000000,10001731,00000000), ref: 100015CD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4137820666.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4137808632.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137830674.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137859867.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarylstrcpy
                          • String ID:
                          • API String ID: 1791698881-3916222277
                          • Opcode ID: 80a71440bbdc6676df6433b68331a89e098fd0a61e7fd3645cfd834030fcbe9d
                          • Instruction ID: 65685ba44f5e0dd4e22f20931bb662b0f8110762eb821eef9687284fed8b6370
                          • Opcode Fuzzy Hash: 80a71440bbdc6676df6433b68331a89e098fd0a61e7fd3645cfd834030fcbe9d
                          • Instruction Fuzzy Hash: 4A31AC75804241AAFB14DF649CC9BDA37E8FF043D4F158065FA0AAA08FDFB4A984C761

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 799 4023de-40240f call 402c37 * 2 call 402cc7 806 402415-40241f 799->806 807 402abf-402ace 799->807 809 402421-40242e call 402c37 lstrlenW 806->809 810 402432-402435 806->810 809->810 812 402437-402448 call 402c15 810->812 813 402449-40244c 810->813 812->813 817 40245d-402471 RegSetValueExW 813->817 818 40244e-402458 call 4031ba 813->818 821 402473 817->821 822 402476-402557 RegCloseKey 817->822 818->817 821->822 822->807 824 402885-40288c 822->824 824->807
                          APIs
                          • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nskAD56.tmp,00000023,00000011,00000002), ref: 00402429
                          • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nskAD56.tmp,00000000,00000011,00000002), ref: 00402469
                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nskAD56.tmp,00000000,00000011,00000002), ref: 00402551
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CloseValuelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nskAD56.tmp
                          • API String ID: 2655323295-2848317606
                          • Opcode ID: e48b1e85c28757713ab227aa479e2b9ceb42c74d784ae5642fab68139845f862
                          • Instruction ID: 1eab41df84c6b24c6b923ea001d17cdc0cfdc7d4c8a499a75fdfc4da8179f3fa
                          • Opcode Fuzzy Hash: e48b1e85c28757713ab227aa479e2b9ceb42c74d784ae5642fab68139845f862
                          • Instruction Fuzzy Hash: A1118171E00108AFEB10AFA5DE49EAEBAB4EB54354F11803AF504F71D1DBB84D459B58

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 825 402d2a-402d53 call 40621d 827 402d58-402d5a 825->827 828 402dd0-402dd4 827->828 829 402d5c-402d62 827->829 830 402d7e-402d93 RegEnumKeyW 829->830 831 402d64-402d66 830->831 832 402d95-402da7 RegCloseKey call 40678a 830->832 833 402db6-402dc2 RegCloseKey 831->833 834 402d68-402d7c call 402d2a 831->834 839 402dc4-402dca RegDeleteKeyW 832->839 840 402da9-402db4 832->840 833->828 834->830 834->832 839->828 840->828
                          APIs
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402D8F
                          • RegCloseKey.ADVAPI32(?), ref: 00402D98
                          • RegCloseKey.ADVAPI32(?), ref: 00402DB9
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Close$Enum
                          • String ID:
                          • API String ID: 464197530-0
                          • Opcode ID: df4bd2222173038e22a6f7143f63260fc380016edffd80d7804df4238b5218be
                          • Instruction ID: 0f4b1bf7762f76a333ccd5711aab570045f86c75fcf3a50f9e11fcc9d843940a
                          • Opcode Fuzzy Hash: df4bd2222173038e22a6f7143f63260fc380016edffd80d7804df4238b5218be
                          • Instruction Fuzzy Hash: 21116A32540509FBDF129F90CE09BEE7B69EF58344F110076B905B50E0E7B5DE21AB68

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 926 4015c1-4015d5 call 402c37 call 405d2c 931 401631-401634 926->931 932 4015d7-4015ea call 405cae 926->932 934 401663-40224a call 401423 931->934 935 401636-401655 call 401423 call 4063b0 SetCurrentDirectoryW 931->935 939 401604-401607 call 405960 932->939 940 4015ec-4015ef 932->940 950 402885-40288c 934->950 951 402abf-402ace 934->951 935->951 956 40165b-40165e 935->956 947 40160c-40160e 939->947 940->939 944 4015f1-4015f8 call 40597d 940->944 944->939 959 4015fa-4015fd call 4058e3 944->959 952 401610-401615 947->952 953 401627-40162f 947->953 950->951 957 401624 952->957 958 401617-401622 GetFileAttributesW 952->958 953->931 953->932 956->951 957->953 958->953 958->957 962 401602 959->962 962->947
                          APIs
                            • Part of subcall function 00405D2C: CharNextW.USER32(?,?,00425F30,?,00405DA0,00425F30,00425F30,?,?,74DF2EE0,00405ADE,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405D3A
                            • Part of subcall function 00405D2C: CharNextW.USER32(00000000), ref: 00405D3F
                            • Part of subcall function 00405D2C: CharNextW.USER32(00000000), ref: 00405D57
                          • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161A
                            • Part of subcall function 004058E3: CreateDirectoryW.KERNELBASE(?,?,00000000), ref: 00405926
                          • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet\sludrehovedet\mississippi,?,00000000,000000F0), ref: 0040164D
                          Strings
                          • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet\sludrehovedet\mississippi, xrefs: 00401640
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CharNext$Directory$AttributesCreateCurrentFile
                          • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet\sludrehovedet\mississippi
                          • API String ID: 1892508949-1577978938
                          • Opcode ID: 63e3afcb8f518b8f961fa91b0460bec2abaa85340c93af8d37e8798651ac2648
                          • Instruction ID: a4cb8c34a70438e14e420fb04ab38ad532f12a03bdfc5322accc4ce246dd33dc
                          • Opcode Fuzzy Hash: 63e3afcb8f518b8f961fa91b0460bec2abaa85340c93af8d37e8798651ac2648
                          • Instruction Fuzzy Hash: 9011BE31504104EBCF31AFA0CD0199F36A0EF14368B28493BEA45B22F1DB3E4D51DA4E
                          APIs
                          • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059BE
                          • CloseHandle.KERNEL32(?), ref: 004059CB
                          Strings
                          • Error launching installer, xrefs: 004059A8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CloseCreateHandleProcess
                          • String ID: Error launching installer
                          • API String ID: 3712363035-66219284
                          • Opcode ID: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                          • Instruction ID: 7702c274cdf70951028335e9b96fa9876c0cc9a795fc840707e03dbfe60e7272
                          • Opcode Fuzzy Hash: 6d78ed6c6b667bfe634139d4e18f22187190c1a967eebebbcf2d401a0833c7e8
                          • Instruction Fuzzy Hash: B4E046F0A00209BFEB009BA4ED09F7BBAACFB04208F418431BD00F6190D774A8208A78
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 86ce5b7836e8efc76d9880a3b815598044ae852516a7a266a4593ffa0bd4c046
                          • Instruction ID: 1a1db7b112f5c349f32c040b215ce8adb2231ea54f988815808aa67dfaaa6b76
                          • Opcode Fuzzy Hash: 86ce5b7836e8efc76d9880a3b815598044ae852516a7a266a4593ffa0bd4c046
                          • Instruction Fuzzy Hash: 6AA15271E04228CBDF28CFA8C8446ADBBB1FF44305F14816ED856BB281D7786A86DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f289ec4eae441b973c5cf469eb2209b78d92787f90c2f70d8ea77383fdb072af
                          • Instruction ID: 81ced8d75bd8cd674d530aa485ef516b0f39a629971cfce93107e9c84bdcedbb
                          • Opcode Fuzzy Hash: f289ec4eae441b973c5cf469eb2209b78d92787f90c2f70d8ea77383fdb072af
                          • Instruction Fuzzy Hash: 4E912170E04228CBDF28CFA8C8547ADBBB1FB44305F14816ED856BB281D778A986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 36b8550c79165f3bd8438b4b7b77fc639822643401bcc62ffa2a7152ccecd571
                          • Instruction ID: 6e186065c07e551db02da0b657444ed8a40fac9cbefa0218a87430385e41b7b0
                          • Opcode Fuzzy Hash: 36b8550c79165f3bd8438b4b7b77fc639822643401bcc62ffa2a7152ccecd571
                          • Instruction Fuzzy Hash: F7814571E04228CFDF24CFA8C8447ADBBB1FB45305F24816AD856BB281C778A996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fd90919654d861d793b9259fd4ddd35531221e69384e43b7f209bc021a7cca94
                          • Instruction ID: 1a645af2666a8cd9619cdf871bd9e2c738fb6a6c353dc56c4864b2e7a25bf22b
                          • Opcode Fuzzy Hash: fd90919654d861d793b9259fd4ddd35531221e69384e43b7f209bc021a7cca94
                          • Instruction Fuzzy Hash: 71816771E04228DBEF28CFA8C8447ADBBB1FB44301F14816AD956BB2C1C7786986DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7afd307a57d874939e6d1f07c4a81c11abd2b71d61e18d684fba0f23c35f734a
                          • Instruction ID: b0583babc1dad824d13d86abae56a1a356e3ceb45be48e511182641c275db258
                          • Opcode Fuzzy Hash: 7afd307a57d874939e6d1f07c4a81c11abd2b71d61e18d684fba0f23c35f734a
                          • Instruction Fuzzy Hash: 8C712471E04228CFDF28CFA8C9447ADBBB1FB44305F15806AD856BB281D7386996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c52b64c4cba7ecf1fb5e1bb59396999cb3f4df188a1ab73f316032be63138ba7
                          • Instruction ID: 968097f9e37e498ed83c4652799cdf8e1ebeb5c7fee57b8dc09d96684c556b9e
                          • Opcode Fuzzy Hash: c52b64c4cba7ecf1fb5e1bb59396999cb3f4df188a1ab73f316032be63138ba7
                          • Instruction Fuzzy Hash: 27712471E04228CFDF28CFA8C854BADBBB1FB44305F15806AD856BB281C7786996DF45
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: c741c7bc90f3712fe41ea972859e43f39dd565e03f7b0e7aa23f6ef9dcbd7f18
                          • Instruction ID: 737cb098acab11621bc79b115fd6dc57f162d32c21417d2b0fd17844244e9397
                          • Opcode Fuzzy Hash: c741c7bc90f3712fe41ea972859e43f39dd565e03f7b0e7aa23f6ef9dcbd7f18
                          • Instruction Fuzzy Hash: 5A714571E04228CFEF28CF98C8447ADBBB1FB44305F14806AD956BB281C778A996DF45
                          APIs
                          • GetTickCount.KERNEL32 ref: 004032D6
                            • Part of subcall function 00403441: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040313F,?), ref: 0040344F
                          • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004031EC,00000004,00000000,00000000,?,?,00403166,000000FF,00000000,00000000,0040A230,?), ref: 00403309
                          • SetFilePointer.KERNELBASE(00149F32,00000000,00000000,00414ED0,00004000,?,00000000,004031EC,00000004,00000000,00000000,?,?,00403166,000000FF,00000000), ref: 00403404
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: FilePointer$CountTick
                          • String ID:
                          • API String ID: 1092082344-0
                          • Opcode ID: 63f894617870b8b9b6b4d0f35ad55c68ae2789ba15d09fbc75adc17a06edb544
                          • Instruction ID: 8a5bf560653b24f1bd3cd60389d49066fb51751ebaffca469d7b7cf87711dc5f
                          • Opcode Fuzzy Hash: 63f894617870b8b9b6b4d0f35ad55c68ae2789ba15d09fbc75adc17a06edb544
                          • Instruction Fuzzy Hash: 10316C72610211DBD711DF29EEC49A63BA9F78439A714823FE900B62E0CBB95D058B9D
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402057
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000,?), ref: 0040544C
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00402EEC,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000), ref: 0040545C
                            • Part of subcall function 00405414: lstrcatW.KERNEL32(00422708,00402EEC,00402EEC,00422708,00000000,00000000,00000000), ref: 0040546F
                            • Part of subcall function 00405414: SetWindowTextW.USER32(00422708,00422708), ref: 00405481
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054A7
                            • Part of subcall function 00405414: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054C1
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054CF
                          • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402068
                          • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004020E5
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                          • String ID:
                          • API String ID: 334405425-0
                          • Opcode ID: 44d570d4ef42a6af9798bac81a48d6e43403590213f26621d83d999ce1ed40c7
                          • Instruction ID: efb744b1bbbaa1f1e58e2693dd3ff93cd36a27706c6aad24c330354b17a2434d
                          • Opcode Fuzzy Hash: 44d570d4ef42a6af9798bac81a48d6e43403590213f26621d83d999ce1ed40c7
                          • Instruction Fuzzy Hash: 6F21C531900218EBCF20AFA5CE4CA9E7A70AF04354F60413BF610B61E1DBBD4991DA6E
                          APIs
                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402525
                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402538
                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nskAD56.tmp,00000000,00000011,00000002), ref: 00402551
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Enum$CloseValue
                          • String ID:
                          • API String ID: 397863658-0
                          • Opcode ID: 297b237e24fbbf63aa7ca08728d7b3950c3333922afcc1c5b6d3d1192ed08725
                          • Instruction ID: 4fa2f3c06f6248971957712acf2942ced6ba336c37b2851dfbda8b2cd28c17b0
                          • Opcode Fuzzy Hash: 297b237e24fbbf63aa7ca08728d7b3950c3333922afcc1c5b6d3d1192ed08725
                          • Instruction Fuzzy Hash: 6D017171904104EFE7159FA5DE89ABFB6B8EF44348F10403EF105A62D0DAB84E459B69
                          APIs
                          • VirtualAllocEx.KERNELBASE(00000000), ref: 1000295B
                          • GetLastError.KERNEL32 ref: 10002A62
                          Memory Dump Source
                          • Source File: 00000000.00000002.4137820666.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4137808632.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137830674.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137859867.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: AllocErrorLastVirtual
                          • String ID:
                          • API String ID: 497505419-0
                          • Opcode ID: 34874d5dbfeecf70d049f007544d8fe97316615c6b6b2225bbceacac8e3d04ae
                          • Instruction ID: 6dfa44c8e371a7ac1a486a55eff0af4ad814c9ea0d06d7514663fdd8c294557a
                          • Opcode Fuzzy Hash: 34874d5dbfeecf70d049f007544d8fe97316615c6b6b2225bbceacac8e3d04ae
                          • Instruction Fuzzy Hash: 4E51B4B9905211DFFB20DFA4DCC675937A8EB443D4F22C42AEA04E726DCE34A990CB55
                          APIs
                          • SetFilePointer.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,?,?,00403166,000000FF,00000000,00000000,0040A230,?), ref: 004031DF
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: af526002166308cc95fa76d49654f36d838bd7a13899b6376ccfe278c881acad
                          • Instruction ID: 4c6ae7a0626839fce45d877b24888c0af913333af22313e68c4d1644c71cb298
                          • Opcode Fuzzy Hash: af526002166308cc95fa76d49654f36d838bd7a13899b6376ccfe278c881acad
                          • Instruction Fuzzy Hash: 3B319C3020021AFFDB109F95ED84ADB3F68EB04359B1085BEF904E6190D778CE509BA9
                          APIs
                          • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024AF
                          • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nskAD56.tmp,00000000,00000011,00000002), ref: 00402551
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID:
                          • API String ID: 3356406503-0
                          • Opcode ID: a3b88ef37a04c447d509aafcd647c8bb55f7a85eb83bcf9e8b78a58130226466
                          • Instruction ID: 2d27e3624369fee7c217219a4e344138e42523264533ea489648bddc6477d6d2
                          • Opcode Fuzzy Hash: a3b88ef37a04c447d509aafcd647c8bb55f7a85eb83bcf9e8b78a58130226466
                          • Instruction Fuzzy Hash: 53119171900209EBEB24DFA4CA585AEB6B4EF04344F20843FE046A62C0D7B84A45DB5A
                          APIs
                          • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                          • SendMessageW.USER32(00000402,00000402,00000000), ref: 004013F4
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                          • Instruction ID: 4945fb4554c9d48a14a82d28c5fc4c127f2c3d85d8aa5c2a63fae023cf5e702c
                          • Opcode Fuzzy Hash: 23ed1533968369fb0e08a97211bc38e5ec6adcca8744e4a1682e6817b2d67833
                          • Instruction Fuzzy Hash: AB01F431724210EBEB199B789D04B2A3698E710714F104A7FF855F62F1DA78CC529B5D
                          APIs
                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 004023AA
                          • RegCloseKey.ADVAPI32(00000000), ref: 004023B3
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CloseDeleteValue
                          • String ID:
                          • API String ID: 2831762973-0
                          • Opcode ID: 3500e27f67e3657d3f13e648c5a4e4955d4a6b8459d35a1d73aadda57e6becb1
                          • Instruction ID: eeebe11236d86b478005370e27fb04b66889edd8f93d7ff1d49de92df4b57ee5
                          • Opcode Fuzzy Hash: 3500e27f67e3657d3f13e648c5a4e4955d4a6b8459d35a1d73aadda57e6becb1
                          • Instruction Fuzzy Hash: 58F09632A04114DBE711BBA49B4EABEB2A59B44354F16053FFA02F71C1DEFC4D41866D
                          APIs
                          • ShowWindow.USER32(00000000,00000000), ref: 00401E61
                          • EnableWindow.USER32(00000000,00000000), ref: 00401E6C
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Window$EnableShow
                          • String ID:
                          • API String ID: 1136574915-0
                          • Opcode ID: 611feb8e2eb8574bcf65ce6e82aff3c902186df27cfe016bcc5f4eefe149f0e3
                          • Instruction ID: 353457a250eeab47012712e359045a90ae935b3a48e85cb5936bf3a8ff6902a1
                          • Opcode Fuzzy Hash: 611feb8e2eb8574bcf65ce6e82aff3c902186df27cfe016bcc5f4eefe149f0e3
                          • Instruction Fuzzy Hash: 40E09232E08200CFD724DBA5AA4946D77B0EB84354720407FE112F11D1DA784881CF6D
                          APIs
                          • GetModuleHandleA.KERNEL32(?,00000020,?,004034FB,0000000A), ref: 0040679C
                          • GetProcAddress.KERNEL32(00000000,?), ref: 004067B7
                            • Part of subcall function 0040671A: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406731
                            • Part of subcall function 0040671A: wsprintfW.USER32 ref: 0040676C
                            • Part of subcall function 0040671A: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406780
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID:
                          • API String ID: 2547128583-0
                          • Opcode ID: 1fd694bbbc018e5f81eae6ff46d5e7dd0c39e86c0a2cf65890550c3579ed631a
                          • Instruction ID: 6fedc38abd16d04710e8a636fd16f84820eabe090bba127bd882252d3fb3e83b
                          • Opcode Fuzzy Hash: 1fd694bbbc018e5f81eae6ff46d5e7dd0c39e86c0a2cf65890550c3579ed631a
                          • Instruction Fuzzy Hash: 21E0863250421156D21096745E4893772AC9AC4718307843EF956F3041DB389C35A76D
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,00402F57,C:\Users\user\Desktop\PEDIDO-144797.exe,80000000,00000003), ref: 00405EA6
                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405EC8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                          • Instruction ID: 5201df1ff3c0a0bd0294a98706b79309786c42e99614e685d4e3591f63f4d9e2
                          • Opcode Fuzzy Hash: 133c91a1dbaf88dbfd801214b1c0a7aa23d67a900b7421546c440c33baf3910c
                          • Instruction Fuzzy Hash: D5D09E31254601AFEF098F20DE16F2E7AA2EB84B04F11552CB7C2940E0DA7158199B15
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00000000,0040347C,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004036D5,?,00000006,00000008,0000000A), ref: 00405966
                          • GetLastError.KERNEL32(?,00000006,00000008,0000000A), ref: 00405974
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID:
                          • API String ID: 1375471231-0
                          • Opcode ID: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                          • Instruction ID: a0b70af09676f49ae35af12b400ff138e6ea5c47fed9fef2c083bef2843b0e9d
                          • Opcode Fuzzy Hash: 2a128b8619e21daab1f352946d406dfe7ea7319ba132ee6f2f415100985951e7
                          • Instruction Fuzzy Hash: 97C04C71255506DADB105F31DE08F1B7A50AB60751F11843AA18AE51B0DA348455DD2D
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402807
                            • Part of subcall function 004062F7: wsprintfW.USER32 ref: 00406304
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: FilePointerwsprintf
                          • String ID:
                          • API String ID: 327478801-0
                          • Opcode ID: df39207a0041021f90c9c5904dee6126a22bdfdf8dd6c18872903947b59110e0
                          • Instruction ID: 55fb61e46e544c01c8f838511187bb9fe83791c0a23b57862087ec8cac53259a
                          • Opcode Fuzzy Hash: df39207a0041021f90c9c5904dee6126a22bdfdf8dd6c18872903947b59110e0
                          • Instruction Fuzzy Hash: EDE09271A00104AFDB11EBA5AF499AE7779DB80304B14407FF501F11D2CB790D52DE2E
                          APIs
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040233D
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: PrivateProfileStringWrite
                          • String ID:
                          • API String ID: 390214022-0
                          • Opcode ID: 611604a497d22fd9b22a7666efc1e18301a5eb9844a24c96cea5756000cc0278
                          • Instruction ID: f718b570c03cd879152723008abd35f840e0595a9afadee28286a7759bd10add
                          • Opcode Fuzzy Hash: 611604a497d22fd9b22a7666efc1e18301a5eb9844a24c96cea5756000cc0278
                          • Instruction Fuzzy Hash: A1E086719042686EE7303AF10F8EDBF50989B44348B55093FBA01B61C2D9FC0D46826D
                          APIs
                          • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402CE8,00000000,?,?), ref: 00406274
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                          • Instruction ID: 479e159ceda2cb7b50184963f42fe168e38793edbf0b306f3e9e40cefa011f94
                          • Opcode Fuzzy Hash: e8292e86e66d8bfc399a73dea3ede4946860b06fd3b50e0b30bb299c90100862
                          • Instruction Fuzzy Hash: F5E0E672010109BEEF195F50DD0AD7B371DE704314F01452EFA07E4051E6B5A9305734
                          APIs
                          • WriteFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,0040F853,0040CED0,004033C2,0040CED0,0040F853,00414ED0,00004000,?,00000000,004031EC,00000004), ref: 00405F68
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                          • Instruction ID: 6078229a914e39b74a0c5ece066be2a5834b756046c3aff4b734283800ecbe33
                          • Opcode Fuzzy Hash: 02dc4867d73beddbae7b6aa94ca18310df5187db1130d79069d379e72bcbc858
                          • Instruction Fuzzy Hash: 2DE0EC3221065EABDF109EA59C00EEB7B6CFB053A0F004437FD25E3150D775E9219BA8
                          APIs
                          • ReadFile.KERNELBASE(0040A230,00000000,00000000,00000000,00000000,00414ED0,0040CED0,0040343E,0040A230,0040A230,00403342,00414ED0,00004000,?,00000000,004031EC), ref: 00405F39
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                          • Instruction ID: 9b2ea83f702eb3fffeb4c264c614e4c5cb206e28bf88f3110778221d7db1fef5
                          • Opcode Fuzzy Hash: 7739e01b11ed9e02f3c754170f73e593db9a2046c62570b976e55369a775b70d
                          • Instruction Fuzzy Hash: D7E08C3220021AEBCF109F508C00EEB3B6CEB04360F004472F925E2180E234E8219FA8
                          APIs
                          • VirtualProtect.KERNELBASE(1000405C,00000004,00000040,1000404C), ref: 100027E0
                          Memory Dump Source
                          • Source File: 00000000.00000002.4137820666.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4137808632.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137830674.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137859867.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                          • Instruction ID: 43a77b614ff4017466e57d7f63f0e44ab05d53355a3bca00642047650885b550
                          • Opcode Fuzzy Hash: 872da592a6d7a810a82f92163ecc1a118f8c9402d7722bf40bb7f7edf15a1654
                          • Instruction Fuzzy Hash: C5F0A5F15057A0DEF350DF688C847063BE4E3583C4B03852AE368F6269EB344454DF19
                          APIs
                          • RegOpenKeyExW.KERNELBASE(00000000,00000000,00000000,?,?,00422708,?,?,004062AB,00422708,00000000,?,?,Call,?), ref: 00406241
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                          • Instruction ID: 3024dc78f91217c8ac754af2bee00b96045fdb9f0f4599777b3fb0e88d8c22ab
                          • Opcode Fuzzy Hash: a8e94fdf895113144ef30ac0413fc9f69bed743b5e5124c6f76e238eb3875bc5
                          • Instruction Fuzzy Hash: 8AD0123200020DBBDF116E919D05FAB371DEB04310F014426FE16A4091D775D530AB15
                          APIs
                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0), ref: 004015AE
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 29d25e4036f002882842ff2abbc33b1b61682e4b1f0e1c41cb6674e83b655918
                          • Instruction ID: 608ef69ca2b13f27eda1cfcd16162797e0d7c1effb02ba883df1ee114d760796
                          • Opcode Fuzzy Hash: 29d25e4036f002882842ff2abbc33b1b61682e4b1f0e1c41cb6674e83b655918
                          • Instruction Fuzzy Hash: 44D01272B04104DBDB21DBA4AF0859D73A59B10364B204677E101F11D1DAB989559A1D
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040313F,?), ref: 0040344F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                          • Instruction ID: c7266a3154837caca095f11e7777f6dda2278cbf6cff4ee7664d3894fc3aa091
                          • Opcode Fuzzy Hash: d5a77a7b91dde00220c09aa0a832f43c90240fc94845358d4caa889c1b96a79f
                          • Instruction Fuzzy Hash: ECB01271240300BFDA214F00DF09F057B21AB90700F10C034B348380F086711035EB0D
                          APIs
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000,?), ref: 0040544C
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00402EEC,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000), ref: 0040545C
                            • Part of subcall function 00405414: lstrcatW.KERNEL32(00422708,00402EEC,00402EEC,00422708,00000000,00000000,00000000), ref: 0040546F
                            • Part of subcall function 00405414: SetWindowTextW.USER32(00422708,00422708), ref: 00405481
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054A7
                            • Part of subcall function 00405414: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054C1
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054CF
                            • Part of subcall function 00405995: CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00426730,Error launching installer), ref: 004059BE
                            • Part of subcall function 00405995: CloseHandle.KERNEL32(?), ref: 004059CB
                          • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401F47
                            • Part of subcall function 0040683B: WaitForSingleObject.KERNEL32(?,00000064), ref: 0040684C
                            • Part of subcall function 0040683B: GetExitCodeProcess.KERNEL32(?,?), ref: 0040686E
                            • Part of subcall function 004062F7: wsprintfW.USER32 ref: 00406304
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                          • String ID:
                          • API String ID: 2972824698-0
                          • Opcode ID: b4474b7c365b70f9dc7c58f3b4c8f6c607978000052ce3e09dedc8896c81aea9
                          • Instruction ID: 78872c6594437c8f6fb94a475087433cb7c5ddb6828dda6eb17a8edff69df0b5
                          • Opcode Fuzzy Hash: b4474b7c365b70f9dc7c58f3b4c8f6c607978000052ce3e09dedc8896c81aea9
                          • Instruction Fuzzy Hash: 93F0F072905021DBCB20FBA58E848DE72B09F01328B2101BFF101F21D1C77C0E418AAE
                          APIs
                          • Sleep.KERNELBASE(00000000), ref: 004014EA
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: cb92cf7ccb1965bdce3badc7d49dd673c55c158fa478f1f9cab94f81649d65d9
                          • Instruction ID: adf76bd272608bb1b99769d9a9b05885636640fbfa2c3f91bbd7a8ebdab0685d
                          • Opcode Fuzzy Hash: cb92cf7ccb1965bdce3badc7d49dd673c55c158fa478f1f9cab94f81649d65d9
                          • Instruction Fuzzy Hash: 45D0A773F141008BD720EBB8BE8945E73F8E7803193208837E102F11D1E578C8928A2D
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 004055B1
                          • GetDlgItem.USER32(?,000003EE), ref: 004055C0
                          • GetClientRect.USER32(?,?), ref: 004055FD
                          • GetSystemMetrics.USER32(00000002), ref: 00405604
                          • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405625
                          • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405636
                          • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 00405649
                          • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 00405657
                          • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040566A
                          • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040568C
                          • ShowWindow.USER32(?,00000008), ref: 004056A0
                          • GetDlgItem.USER32(?,000003EC), ref: 004056C1
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004056D1
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004056EA
                          • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004056F6
                          • GetDlgItem.USER32(?,000003F8), ref: 004055CF
                            • Part of subcall function 0040437A: SendMessageW.USER32(00000028,?,00000001,004041A5), ref: 00404388
                          • GetDlgItem.USER32(?,000003EC), ref: 00405713
                          • CreateThread.KERNEL32(00000000,00000000,Function_000054E7,00000000), ref: 00405721
                          • CloseHandle.KERNEL32(00000000), ref: 00405728
                          • ShowWindow.USER32(00000000), ref: 0040574C
                          • ShowWindow.USER32(?,00000008), ref: 00405751
                          • ShowWindow.USER32(00000008), ref: 0040579B
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057CF
                          • CreatePopupMenu.USER32 ref: 004057E0
                          • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 004057F4
                          • GetWindowRect.USER32(?,?), ref: 00405814
                          • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 0040582D
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405865
                          • OpenClipboard.USER32(00000000), ref: 00405875
                          • EmptyClipboard.USER32 ref: 0040587B
                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405887
                          • GlobalLock.KERNEL32(00000000), ref: 00405891
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 004058A5
                          • GlobalUnlock.KERNEL32(00000000), ref: 004058C5
                          • SetClipboardData.USER32(0000000D,00000000), ref: 004058D0
                          • CloseClipboard.USER32 ref: 004058D6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                          • String ID: (7B${
                          • API String ID: 590372296-525222780
                          • Opcode ID: f086514403ad079958e05c79f9398a2ee239ec86c73215fd307c521ee98444fa
                          • Instruction ID: f8c5fe522ebc9739dae7df13929d3a15495bf3740f19f89270c8c50aa4207807
                          • Opcode Fuzzy Hash: f086514403ad079958e05c79f9398a2ee239ec86c73215fd307c521ee98444fa
                          • Instruction Fuzzy Hash: AFB15870900608FFDB11AFA0DD85AAE7B79FB44354F00847AFA45B61A0CB754E51DF68
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 00404DA8
                          • GetDlgItem.USER32(?,00000408), ref: 00404DB3
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 00404DFD
                          • LoadBitmapW.USER32(0000006E), ref: 00404E10
                          • SetWindowLongW.USER32(?,000000FC,00405388), ref: 00404E29
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404E3D
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404E4F
                          • SendMessageW.USER32(?,00001109,00000002), ref: 00404E65
                          • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00404E71
                          • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00404E83
                          • DeleteObject.GDI32(00000000), ref: 00404E86
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404EB1
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404EBD
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F53
                          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404F7E
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00404F92
                          • GetWindowLongW.USER32(?,000000F0), ref: 00404FC1
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404FCF
                          • ShowWindow.USER32(?,00000005), ref: 00404FE0
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 004050DD
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00405142
                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00405157
                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 0040517B
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 0040519B
                          • ImageList_Destroy.COMCTL32(?), ref: 004051B0
                          • GlobalFree.KERNEL32(?), ref: 004051C0
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405239
                          • SendMessageW.USER32(?,00001102,?,?), ref: 004052E2
                          • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004052F1
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00405311
                          • ShowWindow.USER32(?,00000000), ref: 0040535F
                          • GetDlgItem.USER32(?,000003FE), ref: 0040536A
                          • ShowWindow.USER32(00000000), ref: 00405371
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                          • String ID: $M$N
                          • API String ID: 1638840714-813528018
                          • Opcode ID: dd7e303e7a082920acbddfa323b9c1fe09c51fd00b8ac91a0555c01a181f07cb
                          • Instruction ID: 31ae2990ecb9e768136dc40aca02b7f59ce629e1f3cadc681249b7cbd6abf0de
                          • Opcode Fuzzy Hash: dd7e303e7a082920acbddfa323b9c1fe09c51fd00b8ac91a0555c01a181f07cb
                          • Instruction Fuzzy Hash: 09027DB0A00609EFDB209F54DC45AAE7BB5FB44354F10817AE610BA2E0C7798E52CF58
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 00404863
                          • SetWindowTextW.USER32(00000000,?), ref: 0040488D
                          • SHBrowseForFolderW.SHELL32(?), ref: 0040493E
                          • CoTaskMemFree.OLE32(00000000), ref: 00404949
                          • lstrcmpiW.KERNEL32(Call,00423728,00000000,?,?), ref: 0040497B
                          • lstrcatW.KERNEL32(?,Call), ref: 00404987
                          • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404999
                            • Part of subcall function 004059F6: GetDlgItemTextW.USER32(?,?,00000400,004049D0), ref: 00405A09
                            • Part of subcall function 00406644: CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PEDIDO-144797.exe",00403464,C:\Users\user\AppData\Local\Temp\,74DF3420,004036D5,?,00000006,00000008,0000000A), ref: 004066A7
                            • Part of subcall function 00406644: CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066B6
                            • Part of subcall function 00406644: CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PEDIDO-144797.exe",00403464,C:\Users\user\AppData\Local\Temp\,74DF3420,004036D5,?,00000006,00000008,0000000A), ref: 004066BB
                            • Part of subcall function 00406644: CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PEDIDO-144797.exe",00403464,C:\Users\user\AppData\Local\Temp\,74DF3420,004036D5,?,00000006,00000008,0000000A), ref: 004066CE
                          • GetDiskFreeSpaceW.KERNEL32(004216F8,?,?,0000040F,?,004216F8,004216F8,?,00000001,004216F8,?,?,000003FB,?), ref: 00404A5C
                          • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404A77
                            • Part of subcall function 00404BD0: lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404C71
                            • Part of subcall function 00404BD0: wsprintfW.USER32 ref: 00404C7A
                            • Part of subcall function 00404BD0: SetDlgItemTextW.USER32(?,00423728), ref: 00404C8D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                          • String ID: (7B$A$C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet$Call
                          • API String ID: 2624150263-3025720597
                          • Opcode ID: f04caca690f49e87266c44fb9cab88c370668c693f36f0659ef379fd8dc31e70
                          • Instruction ID: 8d8d1438250e4d518a9e2371570913b63a9457987511b3c3302aefac7d34506d
                          • Opcode Fuzzy Hash: f04caca690f49e87266c44fb9cab88c370668c693f36f0659ef379fd8dc31e70
                          • Instruction Fuzzy Hash: B3A184F1A00209ABDB119FA5CD45AAF77B8EF84314F14843BFA01B62D1D77C99418B6D
                          APIs
                          • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040217D
                          Strings
                          • C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet\sludrehovedet\mississippi, xrefs: 004021BD
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID: C:\Users\user\AppData\Roaming\Microsoft\Windows\Templates\Eddadigtet\sludrehovedet\mississippi
                          • API String ID: 542301482-1577978938
                          • Opcode ID: d21109b947604d2aeedf4ad2c9da0992de00d0e594a19d7853b024dfbf8c0e49
                          • Instruction ID: fcf7de762e0310186ccf97c85ab7d5ba58e988de4da68cff16f28a22b081737a
                          • Opcode Fuzzy Hash: d21109b947604d2aeedf4ad2c9da0992de00d0e594a19d7853b024dfbf8c0e49
                          • Instruction Fuzzy Hash: EE414A75A00208AFCB10DFE4C988AAEBBB5FF48314F20457AF515EB2D1DB799941CB44
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402871
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: d93f1720afb55d10142a5d85e05fc16c00c53f1b0b53f4af4ae9949186ca55c3
                          • Instruction ID: 1506565ccd7b679c7f55cec76d0c208d7a3b57e4c41f2eb52868ec6bdbdc004a
                          • Opcode Fuzzy Hash: d93f1720afb55d10142a5d85e05fc16c00c53f1b0b53f4af4ae9949186ca55c3
                          • Instruction Fuzzy Hash: 38F05E71A04104ABD710EBA4DA499ADB368EF00314F2005BBF541F21D1D7B84D919B2A
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403EA8
                          • ShowWindow.USER32(?), ref: 00403EC5
                          • DestroyWindow.USER32 ref: 00403ED9
                          • SetWindowLongW.USER32(?,00000000,00000000), ref: 00403EF5
                          • GetDlgItem.USER32(?,?), ref: 00403F16
                          • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00403F2A
                          • IsWindowEnabled.USER32(00000000), ref: 00403F31
                          • GetDlgItem.USER32(?,00000001), ref: 00403FDF
                          • GetDlgItem.USER32(?,00000002), ref: 00403FE9
                          • SetClassLongW.USER32(?,000000F2,?), ref: 00404003
                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404054
                          • GetDlgItem.USER32(?,00000003), ref: 004040FA
                          • ShowWindow.USER32(00000000,?), ref: 0040411B
                          • EnableWindow.USER32(?,?), ref: 0040412D
                          • EnableWindow.USER32(?,?), ref: 00404148
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040415E
                          • EnableMenuItem.USER32(00000000), ref: 00404165
                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040417D
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00404190
                          • lstrlenW.KERNEL32(00423728,?,00423728,00000000), ref: 004041BA
                          • SetWindowTextW.USER32(?,00423728), ref: 004041CE
                          • ShowWindow.USER32(?,0000000A), ref: 00404302
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                          • String ID: (7B
                          • API String ID: 184305955-3251261122
                          • Opcode ID: a59e4a4ec43d7d40c0b393105adb60ca25607e9856a65bb271622870994d4568
                          • Instruction ID: 85a8b1cb5875a9f0130709c86f20b78f231723f1bf47f2e7597622744019d293
                          • Opcode Fuzzy Hash: a59e4a4ec43d7d40c0b393105adb60ca25607e9856a65bb271622870994d4568
                          • Instruction Fuzzy Hash: 88C1A1B1640200FFDB216F61EE85D2B3BA8EB95305F40053EFA41B21F0CB7959529B6E
                          APIs
                          • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 00404580
                          • GetDlgItem.USER32(?,000003E8), ref: 00404594
                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004045B1
                          • GetSysColor.USER32(?), ref: 004045C2
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004045D0
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004045DE
                          • lstrlenW.KERNEL32(?), ref: 004045E3
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004045F0
                          • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404605
                          • GetDlgItem.USER32(?,0000040A), ref: 0040465E
                          • SendMessageW.USER32(00000000), ref: 00404665
                          • GetDlgItem.USER32(?,000003E8), ref: 00404690
                          • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004046D3
                          • LoadCursorW.USER32(00000000,00007F02), ref: 004046E1
                          • SetCursor.USER32(00000000), ref: 004046E4
                          • LoadCursorW.USER32(00000000,00007F00), ref: 004046FD
                          • SetCursor.USER32(00000000), ref: 00404700
                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040472F
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404741
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                          • String ID: Call$N$YD@
                          • API String ID: 3103080414-3276248472
                          • Opcode ID: 777072e4300f85645cf7ffde5545d8883defabb32dd208014d98b1e23baa6229
                          • Instruction ID: b733f22c3e4a4344af423a89e947fb2470a434e6d87e1c723dfed1fecd84da00
                          • Opcode Fuzzy Hash: 777072e4300f85645cf7ffde5545d8883defabb32dd208014d98b1e23baa6229
                          • Instruction Fuzzy Hash: E16172B1A00209BFDB109F60DD85AAA7B69FB85354F00813AFB05BB1E0D7789951CF58
                          APIs
                          • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                          • BeginPaint.USER32(?,?), ref: 00401047
                          • GetClientRect.USER32(?,?), ref: 0040105B
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                          • DeleteObject.GDI32(?), ref: 004010ED
                          • CreateFontIndirectW.GDI32(?), ref: 00401105
                          • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                          • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                          • SelectObject.GDI32(00000000,?), ref: 00401140
                          • DrawTextW.USER32(00000000,00429240,000000FF,00000010,00000820), ref: 00401156
                          • SelectObject.GDI32(00000000,00000000), ref: 00401160
                          • DeleteObject.GDI32(?), ref: 00401165
                          • EndPaint.USER32(?,?), ref: 0040116E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                          • Instruction ID: b35030fe9107d9a8359b932f7918d2348922827c9ca57aaae851fe5b21190c6b
                          • Opcode Fuzzy Hash: a62f14d8607f0cab4b909ce482175ba86ddefa50def87cd09a38214d4056f576
                          • Instruction Fuzzy Hash: 92418A71800249AFCF058FA5DE459AFBBB9FF44310F00842AF991AA1A0C738E955DFA4
                          APIs
                          • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406197,?,?), ref: 00406037
                          • GetShortPathNameW.KERNEL32(?,00426DC8,00000400), ref: 00406040
                            • Part of subcall function 00405E07: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004060F0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E17
                            • Part of subcall function 00405E07: lstrlenA.KERNEL32(00000000,?,00000000,004060F0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E49
                          • GetShortPathNameW.KERNEL32(?,004275C8,00000400), ref: 0040605D
                          • wsprintfA.USER32 ref: 0040607B
                          • GetFileSize.KERNEL32(00000000,00000000,004275C8,C0000000,00000004,004275C8,?,?,?,?,?), ref: 004060B6
                          • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004060C5
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060FD
                          • SetFilePointer.KERNEL32(0040A590,00000000,00000000,00000000,00000000,004269C8,00000000,-0000000A,0040A590,00000000,[Rename],00000000,00000000,00000000), ref: 00406153
                          • GlobalFree.KERNEL32(00000000), ref: 00406164
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 0040616B
                            • Part of subcall function 00405EA2: GetFileAttributesW.KERNELBASE(00000003,00402F57,C:\Users\user\Desktop\PEDIDO-144797.exe,80000000,00000003), ref: 00405EA6
                            • Part of subcall function 00405EA2: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405EC8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                          • String ID: %ls=%ls$[Rename]
                          • API String ID: 2171350718-461813615
                          • Opcode ID: cc1e011b744674eb6045294d1f1ba8016b3cffab7c6b3a5cc0e4edd922729f6b
                          • Instruction ID: 7a97944e4ecdd21f919348e7cfc29446421eaa6be6f71a8f5a2bdcac5b6ce208
                          • Opcode Fuzzy Hash: cc1e011b744674eb6045294d1f1ba8016b3cffab7c6b3a5cc0e4edd922729f6b
                          • Instruction Fuzzy Hash: 953139703007157BC2206B259D49F673A6CEF45714F15003AFA42FA2D2DE7C992586AD
                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PEDIDO-144797.exe",00403464,C:\Users\user\AppData\Local\Temp\,74DF3420,004036D5,?,00000006,00000008,0000000A), ref: 004066A7
                          • CharNextW.USER32(?,?,?,00000000,?,00000006,00000008,0000000A), ref: 004066B6
                          • CharNextW.USER32(?,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PEDIDO-144797.exe",00403464,C:\Users\user\AppData\Local\Temp\,74DF3420,004036D5,?,00000006,00000008,0000000A), ref: 004066BB
                          • CharPrevW.USER32(?,?,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\PEDIDO-144797.exe",00403464,C:\Users\user\AppData\Local\Temp\,74DF3420,004036D5,?,00000006,00000008,0000000A), ref: 004066CE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: "C:\Users\user\Desktop\PEDIDO-144797.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 589700163-1699034994
                          • Opcode ID: 77b224228f8c57f44dbd024cb25da7c2d773c522f2af8fdd1da9e6af7933f215
                          • Instruction ID: 91382b34e261ab6a6b837a41ec70345278d3faa82d58aea2d88f3062b19e38b1
                          • Opcode Fuzzy Hash: 77b224228f8c57f44dbd024cb25da7c2d773c522f2af8fdd1da9e6af7933f215
                          • Instruction Fuzzy Hash: 8C11E61580070295DB302B149C40E7766B8EF587A4F12483FED86B32C0E77E4CD286AD
                          APIs
                          • GetWindowLongW.USER32(?,000000EB), ref: 004043C9
                          • GetSysColor.USER32(00000000), ref: 004043E5
                          • SetTextColor.GDI32(?,00000000), ref: 004043F1
                          • SetBkMode.GDI32(?,?), ref: 004043FD
                          • GetSysColor.USER32(?), ref: 00404410
                          • SetBkColor.GDI32(?,?), ref: 00404420
                          • DeleteObject.GDI32(?), ref: 0040443A
                          • CreateBrushIndirect.GDI32(?), ref: 00404444
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: d93bb5df8f2b76ccefaad0a5d1bb7d3eec77da1dbbaa67d130298efb7d8eee66
                          • Instruction ID: 701ae6dfa2b2a9365c03cf2c9b1b76f0db24f0feb35c46e7544c905291b2d973
                          • Opcode Fuzzy Hash: d93bb5df8f2b76ccefaad0a5d1bb7d3eec77da1dbbaa67d130298efb7d8eee66
                          • Instruction Fuzzy Hash: 4B216671500704AFCB219F68DE48B5BBBF8AF81714F04893EED95E22A1D774E944CB54
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 10002411
                            • Part of subcall function 1000122C: lstrcpynW.KERNEL32(00000000,?,100012DF,00000019,100011BE,-000000A0), ref: 1000123C
                          • GlobalAlloc.KERNEL32(00000040), ref: 10002397
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 100023B2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4137820666.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4137808632.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137830674.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137859867.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                          • String ID: @Hmu
                          • API String ID: 4216380887-887474944
                          • Opcode ID: 40c1fda0fc222d3deaf0be0606799ffba2a33d40f74f168943dcfaeb9bc9158e
                          • Instruction ID: e010a8171ff36a63e9221139458dc5df23460d7ee6f57f6168b5e09891e1807c
                          • Opcode Fuzzy Hash: 40c1fda0fc222d3deaf0be0606799ffba2a33d40f74f168943dcfaeb9bc9158e
                          • Instruction Fuzzy Hash: 9141D2B4408305EFF324DF24C880A6AB7F8FB843D4B11892DF94687199DB34BA94CB65
                          APIs
                          • lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000,?), ref: 0040544C
                          • lstrlenW.KERNEL32(00402EEC,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000), ref: 0040545C
                          • lstrcatW.KERNEL32(00422708,00402EEC,00402EEC,00422708,00000000,00000000,00000000), ref: 0040546F
                          • SetWindowTextW.USER32(00422708,00422708), ref: 00405481
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054A7
                          • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054C1
                          • SendMessageW.USER32(?,00001013,?,00000000), ref: 004054CF
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$TextWindowlstrcat
                          • String ID:
                          • API String ID: 2531174081-0
                          • Opcode ID: ae6ed24060c0e1e5203a454600f337dd8354be9e28b06d37a059070ec5477373
                          • Instruction ID: b4c9d1203d7b93b364d12d55a96473d81469f1a16e33619bfa53f57c996d0385
                          • Opcode Fuzzy Hash: ae6ed24060c0e1e5203a454600f337dd8354be9e28b06d37a059070ec5477373
                          • Instruction Fuzzy Hash: 0E219071900518BACF119FA5DD85ADFBFB4EF45364F10803AF904B62A0C3794A90CFA8
                          APIs
                          • DestroyWindow.USER32(00000000,00000000), ref: 00402E8D
                          • GetTickCount.KERNEL32 ref: 00402EAB
                          • wsprintfW.USER32 ref: 00402ED9
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000,?), ref: 0040544C
                            • Part of subcall function 00405414: lstrlenW.KERNEL32(00402EEC,00422708,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402EEC,00000000), ref: 0040545C
                            • Part of subcall function 00405414: lstrcatW.KERNEL32(00422708,00402EEC,00402EEC,00422708,00000000,00000000,00000000), ref: 0040546F
                            • Part of subcall function 00405414: SetWindowTextW.USER32(00422708,00422708), ref: 00405481
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004054A7
                            • Part of subcall function 00405414: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004054C1
                            • Part of subcall function 00405414: SendMessageW.USER32(?,00001013,?,00000000), ref: 004054CF
                          • CreateDialogParamW.USER32(0000006F,00000000,00402DD7,00000000), ref: 00402EFD
                          • ShowWindow.USER32(00000000,00000005), ref: 00402F0B
                            • Part of subcall function 00402E56: MulDiv.KERNEL32(00000000,00000064,000600F3), ref: 00402E6B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                          • String ID: ... %d%%
                          • API String ID: 722711167-2449383134
                          • Opcode ID: 9d96e1b775b00f8f1aa504ccf668d13eff31e418fbd4a6343fc61565dbea9545
                          • Instruction ID: c2ec4548d439a14d597b05689786213ff5532ac021c242b5895b0761ec4a5705
                          • Opcode Fuzzy Hash: 9d96e1b775b00f8f1aa504ccf668d13eff31e418fbd4a6343fc61565dbea9545
                          • Instruction Fuzzy Hash: 0501C430440724EBCB31AB60EF4CB9B7B68AB00B44B50417FF945F12E0CAB844558BEE
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404CF9
                          • GetMessagePos.USER32 ref: 00404D01
                          • ScreenToClient.USER32(?,?), ref: 00404D1B
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 00404D2D
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00404D53
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                          • Instruction ID: b067d4b0ecc7c77c1c3f0caef97ada8ed48413e9bef28a1d47140c0a876cf8aa
                          • Opcode Fuzzy Hash: e2d2d6aa42d138b4bf43a857dc2fb8cfa63f2fbdf5f441295addbf44c9bf4daa
                          • Instruction Fuzzy Hash: AD015E71A0021DBADB00DB94DD85BFEBBBCAF95715F10412BBA50B62D0C7B899018BA4
                          APIs
                          • GetDC.USER32(?), ref: 00401DB6
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DD0
                          • MulDiv.KERNEL32(00000000,00000000), ref: 00401DD8
                          • ReleaseDC.USER32(?,00000000), ref: 00401DE9
                          • CreateFontIndirectW.GDI32(0040CDE0), ref: 00401E38
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectRelease
                          • String ID: Tahoma
                          • API String ID: 3808545654-3580928618
                          • Opcode ID: dd5e8fa4d463f4addcea7a8cc9fa64d55b0ecfa5d277173ec9cca7ca7d10c693
                          • Instruction ID: c2f05a2c3ba2ec5405c4fe8fe652dd8f1d703414ee124caa90b8b383e79e86eb
                          • Opcode Fuzzy Hash: dd5e8fa4d463f4addcea7a8cc9fa64d55b0ecfa5d277173ec9cca7ca7d10c693
                          • Instruction Fuzzy Hash: 3201B171904241EFE7006BB0AF4AB9A7FB0BF55301F10493EF242B71E2CAB800469B2D
                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402DF5
                          • wsprintfW.USER32 ref: 00402E29
                          • SetWindowTextW.USER32(?,?), ref: 00402E39
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 00402E4B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                          • API String ID: 1451636040-1158693248
                          • Opcode ID: 5563c221c1669b5fd2184c8b70bdefae7b5ad080d5cf5862aa05c867891839d9
                          • Instruction ID: 0bc749b122006b2f9f6abad3e9991ed6065550717762caf8ffdc158a825a6066
                          • Opcode Fuzzy Hash: 5563c221c1669b5fd2184c8b70bdefae7b5ad080d5cf5862aa05c867891839d9
                          • Instruction Fuzzy Hash: 69F0367154020DABDF206F50DD4ABEA3B69FB00714F00803AFA06B51D0DBFD55598F99
                          APIs
                            • Part of subcall function 1000121B: GlobalAlloc.KERNEL32(00000040,?,1000123B,?,100012DF,00000019,100011BE,-000000A0), ref: 10001225
                          • GlobalFree.KERNEL32(?), ref: 1000256D
                          • GlobalFree.KERNEL32(00000000), ref: 100025A8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4137820666.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4137808632.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137830674.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137859867.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: e72053471c67904cbc9fe51406c75cdd0d1e7ae72e07fb5691a107031e3f1593
                          • Instruction ID: 149f0ffe7112dafd64944f245e56057b96fa329c468151baa91e3d773918aa42
                          • Opcode Fuzzy Hash: e72053471c67904cbc9fe51406c75cdd0d1e7ae72e07fb5691a107031e3f1593
                          • Instruction Fuzzy Hash: 1031AF71504651EFF721CF14CCA8E2B7BB8FB853D2F114119F940961A8C7719851DB69
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000), ref: 004028FB
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 00402917
                          • GlobalFree.KERNEL32(?), ref: 00402950
                          • GlobalFree.KERNEL32(00000000), ref: 00402963
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,000000F0), ref: 0040297B
                          • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000), ref: 0040298F
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                          • String ID:
                          • API String ID: 2667972263-0
                          • Opcode ID: 71fa0d7f1f6972b2f5f4a603ea8383ed055fcf66cbac6c56c0d77bb029e8dc11
                          • Instruction ID: c824e8dfb1c84b3956194132b72a9c46ff30f807773af65f81dcebc4e122496d
                          • Opcode Fuzzy Hash: 71fa0d7f1f6972b2f5f4a603ea8383ed055fcf66cbac6c56c0d77bb029e8dc11
                          • Instruction Fuzzy Hash: 6521BFB1800128BBDF216FA5DE49D9E7E79EF09364F10023AF960762E0CB7949418B98
                          APIs
                          • lstrlenW.KERNEL32(00423728,00423728,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404C71
                          • wsprintfW.USER32 ref: 00404C7A
                          • SetDlgItemTextW.USER32(?,00423728), ref: 00404C8D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s$(7B
                          • API String ID: 3540041739-1320723960
                          • Opcode ID: 58f77135636fcca40ac9b9d1b3b9f97977a6748d84aaa2f98ffb75d2f2ac1724
                          • Instruction ID: 703546cccce40a16f7c4e0327b319c47dc4604cc2262111db7ea86f65ec4581c
                          • Opcode Fuzzy Hash: 58f77135636fcca40ac9b9d1b3b9f97977a6748d84aaa2f98ffb75d2f2ac1724
                          • Instruction Fuzzy Hash: 0911E7736041287BEB00556DAD46EAF329CDB85374F254237FA66F31D1DA79CC2182E8
                          APIs
                          • WideCharToMultiByte.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\nskAD56.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nskAD56.tmp\System.dll,00000400,?,?,00000021), ref: 004025E2
                          • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nskAD56.tmp\System.dll,?,?,C:\Users\user\AppData\Local\Temp\nskAD56.tmp,000000FF,C:\Users\user\AppData\Local\Temp\nskAD56.tmp\System.dll,00000400,?,?,00000021), ref: 004025ED
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: ByteCharMultiWidelstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\nskAD56.tmp$C:\Users\user\AppData\Local\Temp\nskAD56.tmp\System.dll
                          • API String ID: 3109718747-2474397983
                          • Opcode ID: 04c8a0be0a3c8b5bca7af342d1437c7cd7f7eafe97cd42d6f17c4336303185e8
                          • Instruction ID: 778b7e41730bacb68cbd472b7e3a637cf80abcfea8faeb2db308f16ae4ae4a1c
                          • Opcode Fuzzy Hash: 04c8a0be0a3c8b5bca7af342d1437c7cd7f7eafe97cd42d6f17c4336303185e8
                          • Instruction Fuzzy Hash: 35112E72A00204BBDB146FB18F8D99F76649F55394F20443BF502F61C1DAFC48425B5E
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.4137820666.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4137808632.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137830674.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137859867.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: FreeGlobal
                          • String ID:
                          • API String ID: 2979337801-0
                          • Opcode ID: fe7133a2f93821227e3a7e703367dd144469a15fe8ff947d0f1e508e715dc704
                          • Instruction ID: 56de187798276af1e94fdae5c91d23c4da0ac5596926d43ddda2a484f8c4ba85
                          • Opcode Fuzzy Hash: fe7133a2f93821227e3a7e703367dd144469a15fe8ff947d0f1e508e715dc704
                          • Instruction Fuzzy Hash: 82511336E06115ABFB14DFA488908EEBBF5FF863D0F16406AE801B315DD6706F809792
                          APIs
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,10002148,?,00000808), ref: 10001617
                          • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,10002148,?,00000808), ref: 1000161E
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,10002148,?,00000808), ref: 10001632
                          • GetProcAddress.KERNEL32(10002148,00000000), ref: 10001639
                          • GlobalFree.KERNEL32(00000000), ref: 10001642
                          Memory Dump Source
                          • Source File: 00000000.00000002.4137820666.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4137808632.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137830674.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137859867.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                          • String ID:
                          • API String ID: 1148316912-0
                          • Opcode ID: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                          • Instruction ID: 7647a3e7d8fb005f6fbf822ef0874fdc4783f8eaf5d0662476f5196d1f8db515
                          • Opcode Fuzzy Hash: 06a7266b7a9176b24ef6afb6e544002b11bc6a2d13ae022cf9eb1808419c0062
                          • Instruction Fuzzy Hash: 7CF098722071387BE62117A78C8CD9BBF9CDF8B2F5B114215F628921A4C6619D019BF1
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00401D5D
                          • GetClientRect.USER32(00000000,?), ref: 00401D6A
                          • LoadImageW.USER32(?,00000000,?,?,?,?), ref: 00401D8B
                          • SendMessageW.USER32(00000000,00000172,?,00000000), ref: 00401D99
                          • DeleteObject.GDI32(00000000), ref: 00401DA8
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: 1cce6cf5ba1aed4fa5ce4547bc0ae4b149cf4eb258e4777d2c59333f9832c14c
                          • Instruction ID: a606f7d5b7d9f25f85f3a996f6cf1d54ca927bfb9af82e5c1f6e8eb7e31f2730
                          • Opcode Fuzzy Hash: 1cce6cf5ba1aed4fa5ce4547bc0ae4b149cf4eb258e4777d2c59333f9832c14c
                          • Instruction Fuzzy Hash: 88F0FF72604518AFDB01DBE4DF88CEEB7BCEB08341B14047AF641F61A1CA749D518B78
                          APIs
                          • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C89
                          • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CA1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 8f57c4960d5009b47da13ac1dbf9672dc76c0f1a0d468b1b2fcc5bc99a892ac9
                          • Instruction ID: 90968196233f782bf8ff3785c90d26ea0bd53ded382d002e8ee2e27c6658862d
                          • Opcode Fuzzy Hash: 8f57c4960d5009b47da13ac1dbf9672dc76c0f1a0d468b1b2fcc5bc99a892ac9
                          • Instruction Fuzzy Hash: 6121C171948209AEEF05EFA5CE4AABE7BB4EF84308F14443EF502B61D0D7B84541DB28
                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403476,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004036D5,?,00000006,00000008,0000000A), ref: 00405C87
                          • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403476,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,74DF3420,004036D5,?,00000006,00000008,0000000A), ref: 00405C91
                          • lstrcatW.KERNEL32(?,0040A014,?,00000006,00000008,0000000A), ref: 00405CA3
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00405C81
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2659869361-3081826266
                          • Opcode ID: 2d89e3346713fcbf25affea4869717dbbf7bb0cb650dc976aff6b925dbbb9e25
                          • Instruction ID: 792cc20aee96bfe2db1a273563d78520df22e3750eb0c1a77993888458b10d09
                          • Opcode Fuzzy Hash: 2d89e3346713fcbf25affea4869717dbbf7bb0cb650dc976aff6b925dbbb9e25
                          • Instruction Fuzzy Hash: DBD0A731111631AAC1116B458D05CDF769C9F46315342143BF501B30A1C77C1D6187FD
                          APIs
                            • Part of subcall function 004063B0: lstrcpynW.KERNEL32(?,?,00000400,0040355A,00429240,NSIS Error,?,00000006,00000008,0000000A), ref: 004063BD
                            • Part of subcall function 00405D2C: CharNextW.USER32(?,?,00425F30,?,00405DA0,00425F30,00425F30,?,?,74DF2EE0,00405ADE,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405D3A
                            • Part of subcall function 00405D2C: CharNextW.USER32(00000000), ref: 00405D3F
                            • Part of subcall function 00405D2C: CharNextW.USER32(00000000), ref: 00405D57
                          • lstrlenW.KERNEL32(00425F30,00000000,00425F30,00425F30,?,?,74DF2EE0,00405ADE,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0,00000000), ref: 00405DE2
                          • GetFileAttributesW.KERNEL32(00425F30,00425F30,00425F30,00425F30,00425F30,00425F30,00000000,00425F30,00425F30,?,?,74DF2EE0,00405ADE,?,C:\Users\user\AppData\Local\Temp\,74DF2EE0), ref: 00405DF2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CharNext$AttributesFilelstrcpynlstrlen
                          • String ID: 0_B
                          • API String ID: 3248276644-2128305573
                          • Opcode ID: 9ab52294f1c51de88c4a4db8473d9fc5f5165192c0b0c0d383058277ec03ae92
                          • Instruction ID: 7d5bbe1e5c8c3abe72dbe24b1e5e7d34393fbb328f3a5d3c645332532cfc401b
                          • Opcode Fuzzy Hash: 9ab52294f1c51de88c4a4db8473d9fc5f5165192c0b0c0d383058277ec03ae92
                          • Instruction Fuzzy Hash: 61F0D125114E6156E62232364D0DBAF1954CE8236474A853BFC51B22D1DB3C8953CDAE
                          APIs
                          • IsWindowVisible.USER32(?), ref: 004053B7
                          • CallWindowProcW.USER32(?,?,?,?), ref: 00405408
                            • Part of subcall function 00404391: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004043A3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: 7f0b268359981ce96b8471a5d3c832aa899a6e6df9d4a1bd192212e4a6da3699
                          • Instruction ID: e7a51b5005e981c4ca122d20ba3fe12824fd99f760bfe42b36e815d14bf77052
                          • Opcode Fuzzy Hash: 7f0b268359981ce96b8471a5d3c832aa899a6e6df9d4a1bd192212e4a6da3699
                          • Instruction Fuzzy Hash: 5C01717120060DABDF209F11DD84AAB3735EB84395F204037FE457A1D1C7BA8D92AF69
                          APIs
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000800,00000002,00422708,00000000,?,?,Call,?,?,004064F2,80000002), ref: 004062C4
                          • RegCloseKey.ADVAPI32(?,?,004064F2,80000002,Software\Microsoft\Windows\CurrentVersion,Call,Call,Call,00000000,00422708), ref: 004062CF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID: Call
                          • API String ID: 3356406503-1824292864
                          • Opcode ID: eb1f67c4e7283d14696156d079f1c46a9bcf05f485b6848abf2eef10094c0e69
                          • Instruction ID: c3e7de0656b9710826ab6423f517e97bb9b3954c36c3ca231a2eb326ebdf078d
                          • Opcode Fuzzy Hash: eb1f67c4e7283d14696156d079f1c46a9bcf05f485b6848abf2eef10094c0e69
                          • Instruction Fuzzy Hash: 80019A32500209EADF219F90CC09EDB3BA8EF55360F01803AFD16A21A0D738DA64DBA4
                          APIs
                          • FreeLibrary.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00000000,74DF2EE0,00403A00,74DF3420,004037FF,00000006,?,00000006,00000008,0000000A), ref: 00403A43
                          • GlobalFree.KERNEL32(?), ref: 00403A4A
                          Strings
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 00403A3B
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Free$GlobalLibrary
                          • String ID: C:\Users\user\AppData\Local\Temp\
                          • API String ID: 1100898210-3081826266
                          • Opcode ID: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                          • Instruction ID: 78aecf43d79df039942bc1d46619d1d902388d1bf991e2316d5006033f35a71e
                          • Opcode Fuzzy Hash: e06207bb45b670d34af272b3fb1259f6a40c1f68299225e6b4906b67dd7614d2
                          • Instruction Fuzzy Hash: D9E08C32A000205BC6229F45ED04B5E7B6C6F48B22F0A023AE8C07B26087745C82CF88
                          APIs
                          • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00402F80,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PEDIDO-144797.exe,C:\Users\user\Desktop\PEDIDO-144797.exe,80000000,00000003), ref: 00405CD3
                          • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402F80,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\PEDIDO-144797.exe,C:\Users\user\Desktop\PEDIDO-144797.exe,80000000,00000003), ref: 00405CE3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: CharPrevlstrlen
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 2709904686-224404859
                          • Opcode ID: ce420ed133ef401578f7edf27e8b1e41d4059e21aeef7803f585746dd391eaaa
                          • Instruction ID: 4c3d9e560c0c996ae094f7ef7b1b4ed865fc8cc67bffad09b41611580a74fc2a
                          • Opcode Fuzzy Hash: ce420ed133ef401578f7edf27e8b1e41d4059e21aeef7803f585746dd391eaaa
                          • Instruction Fuzzy Hash: 03D05EB2414A209AD3126704DD01D9F73A8EF12314746442AE841A6161E7785C918AAC
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 1000116A
                          • GlobalFree.KERNEL32(00000000), ref: 100011C7
                          • GlobalFree.KERNEL32(00000000), ref: 100011D9
                          • GlobalFree.KERNEL32(?), ref: 10001203
                          Memory Dump Source
                          • Source File: 00000000.00000002.4137820666.0000000010001000.00000020.00000001.01000000.00000006.sdmp, Offset: 10000000, based on PE: true
                          • Associated: 00000000.00000002.4137808632.0000000010000000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137830674.0000000010003000.00000002.00000001.01000000.00000006.sdmpDownload File
                          • Associated: 00000000.00000002.4137859867.0000000010005000.00000002.00000001.01000000.00000006.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_10000000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                          • Instruction ID: f345eba8489605592ce73ef35c78e6b42925bf5f5eceaf1f60f0973e38c56604
                          • Opcode Fuzzy Hash: 9cbcb91a2cf1141c01d88779e182a67407fb9f9860b92084c2da8ef292891df1
                          • Instruction Fuzzy Hash: AE318FF6904211DBF314CF64DC859EA77E8EB853D0B12452AFB45E726CEB34E8018765
                          APIs
                          • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004060F0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E17
                          • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405E2F
                          • CharNextA.USER32(00000000,?,00000000,004060F0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E40
                          • lstrlenA.KERNEL32(00000000,?,00000000,004060F0,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405E49
                          Memory Dump Source
                          • Source File: 00000000.00000002.4136541417.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.4136530054.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136553228.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.000000000042D000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000452000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136566098.0000000000454000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.4136661162.0000000000457000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_PEDIDO-144797.jbxd
                          Similarity
                          • API ID: lstrlen$CharNextlstrcmpi
                          • String ID:
                          • API String ID: 190613189-0
                          • Opcode ID: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                          • Instruction ID: dc3323509655add47458b7bfdc28b409d7665b879035d0867add309d4545c2bc
                          • Opcode Fuzzy Hash: 7e71a0af936693ae9f9191b5a8beeb80aa55241a483ed2e2c495a4152d25f7df
                          • Instruction Fuzzy Hash: 89F06236104518EFC7029BA5DD40D9FBBA8EF06354B2540BAE980F7211D674DF01AB99