Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
-pdf.bat.exe

Overview

General Information

Sample name:-pdf.bat.exe
renamed because original name is a hash value
Original sample name:SZLEME ARTLARI (YEN SPAR SZLEMES)-pdf.bat.exe
Analysis ID:1525544
MD5:c8c2fa1b682b0bca8ed9de83455e8977
SHA1:ff96ea1f052d0e7745a4fe30bacb8362ea57ba2c
SHA256:4af23250a740fc8e855879c8f0492b8be3613ef015db4347d14885f57e25ee93
Tags:batexegeoGuLoaderTURuser-abuse_ch
Infos:

Detection

GuLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected GuLoader
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect virtualization through RDTSC time measurements
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Detected potential crypto function
Drops PE files
Found dropped PE file which has not been started or loaded
Found evaded block containing many API calls
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • -pdf.bat.exe (PID: 7644 cmdline: "C:\Users\user\Desktop\-pdf.bat.exe" MD5: C8C2FA1B682B0BCA8ED9DE83455E8977)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.3780975442.00000000054C5000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: -pdf.bat.exeReversingLabs: Detection: 36%
    Source: -pdf.bat.exeVirustotal: Detection: 57%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.9% probability
    Source: -pdf.bat.exeJoe Sandbox ML: detected
    Source: -pdf.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: -pdf.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_0040682E GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040682E
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_004066E4 FindFirstFileW,FindClose,0_2_004066E4
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_00402B75 FindFirstFileW,0_2_00402B75
    Source: -pdf.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_00404C33 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ShowWindow,ShowWindow,GetDlgItem,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageW,CreatePopupMenu,AppendMenuW,GetWindowRect,TrackPopupMenu,SendMessageW,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404C33
    Source: C:\Users\user\Desktop\-pdf.bat.exeProcess Stats: CPU usage > 49%
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_00403804 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_00403804
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_004045210_2_00404521
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_004072350_2_00407235
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_704423510_2_70442351
    Source: -pdf.bat.exe, 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesloffens.exeDVarFileInfo$ vs -pdf.bat.exe
    Source: -pdf.bat.exeBinary or memory string: OriginalFilenamesloffens.exeDVarFileInfo$ vs -pdf.bat.exe
    Source: -pdf.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal68.troj.evad.winEXE@1/7@0/0
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_00403804 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_00403804
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_00404188 GetDlgItem,SetWindowTextW,SHBrowseForFolderW,CoTaskMemFree,lstrcmpiW,lstrcatW,SetDlgItemTextW,GetDiskFreeSpaceW,MulDiv,SetDlgItemTextW,EnableWindow,0_2_00404188
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_0040234F CoCreateInstance,0_2_0040234F
    Source: C:\Users\user\Desktop\-pdf.bat.exeFile created: C:\Users\user\AppData\Local\AnvilledJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeFile created: C:\Users\user~1\AppData\Local\Temp\nslF5A9.tmpJump to behavior
    Source: -pdf.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\-pdf.bat.exeFile read: C:\Users\desktop.iniJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: -pdf.bat.exeReversingLabs: Detection: 36%
    Source: -pdf.bat.exeVirustotal: Detection: 57%
    Source: C:\Users\user\Desktop\-pdf.bat.exeFile read: C:\Users\user\Desktop\-pdf.bat.exeJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: userenv.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: propsys.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: dwmapi.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: cryptbase.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: oleacc.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: shfolder.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: riched20.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: usp10.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: msls31.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\-pdf.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
    Source: -pdf.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

    Data Obfuscation

    barindex
    Source: Yara matchFile source: 00000000.00000002.3780975442.00000000054C5000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_70442351 GlobalFree,GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70442351
    Source: C:\Users\user\Desktop\-pdf.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsk89.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\-pdf.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: C:\Users\user\Desktop\-pdf.bat.exeRDTSC instruction interceptor: First address: 58016BE second address: 58016BE instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007F5F6C51E543h 0x00000006 cmp ah, 00000006h 0x00000009 inc ebp 0x0000000a test bl, bl 0x0000000c inc ebx 0x0000000d test bh, bh 0x0000000f rdtsc
    Source: C:\Users\user\Desktop\-pdf.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsk89.tmp\System.dllJump to dropped file
    Source: C:\Users\user\Desktop\-pdf.bat.exeEvaded block: after key decisiongraph_0-4428
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_0040682E GetTempPathW,DeleteFileW,lstrcatW,lstrcatW,lstrcatW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,0_2_0040682E
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_004066E4 FindFirstFileW,FindClose,0_2_004066E4
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_00402B75 FindFirstFileW,0_2_00402B75
    Source: C:\Users\user\Desktop\-pdf.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4319
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_70442351 GlobalFree,GlobalAlloc,lstrcpyW,lstrcpyW,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleW,LoadLibraryW,GetProcAddress,lstrlenW,0_2_70442351
    Source: C:\Users\user\Desktop\-pdf.bat.exeCode function: 0_2_00403804 EntryPoint,SetErrorMode,GetVersionExW,GetVersionExW,GetVersionExW,lstrlenA,#17,OleInitialize,SHGetFileInfoW,GetCommandLineW,CharNextW,GetTempPathW,GetTempPathW,GetWindowsDirectoryW,lstrcatW,GetTempPathW,lstrcatW,SetEnvironmentVariableW,SetEnvironmentVariableW,SetEnvironmentVariableW,DeleteFileW,DeleteFileW,OleUninitialize,ExitProcess,lstrcatW,lstrcatW,lstrcatW,lstrcmpiW,SetCurrentDirectoryW,DeleteFileW,CopyFileW,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,ExitWindowsEx,0_2_00403804
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    OS Credential Dumping1
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network Medium1
    System Shutdown/Reboot
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Access Token Manipulation
    LSASS Memory2
    File and Directory Discovery
    Remote Desktop Protocol1
    Clipboard Data
    Junk DataExfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    DLL Side-Loading
    Security Account Manager13
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    -pdf.bat.exe37%ReversingLabsWin32.Trojan.Guloader
    -pdf.bat.exe58%VirustotalBrowse
    -pdf.bat.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Users\user\AppData\Local\Temp\nsk89.tmp\System.dll0%ReversingLabs
    C:\Users\user\AppData\Local\Temp\nsk89.tmp\System.dll1%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    s-part-0017.t-0009.fb-t-msedge.net0%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    s-part-0017.t-0009.fb-t-msedge.net
    13.107.253.45
    truefalseunknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://nsis.sf.net/NSIS_ErrorError-pdf.bat.exefalse
    • URL Reputation: safe
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1525544
    Start date and time:2024-10-04 11:20:08 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 34s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:-pdf.bat.exe
    renamed because original name is a hash value
    Original Sample Name:SZLEME ARTLARI (YEN SPAR SZLEMES)-pdf.bat.exe
    Detection:MAL
    Classification:mal68.troj.evad.winEXE@1/7@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 38
    • Number of non-executed functions: 32
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240s for sample files taking high CPU consumption
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe
    • Excluded domains from analysis (whitelisted): azurefd-t-fb-prod.trafficmanager.net, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, 4.8.2.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.0.2.0.c.0.0.3.0.1.3.0.6.2.ip6.arpa, ctldl.windowsupdate.com, azureedge-t-prod.trafficmanager.net, time.windows.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    s-part-0017.t-0009.fb-t-msedge.nethttps://wvr4dgzxxavl6jjpq7rl.igortsaplin.pro/WFzFCiNxGet hashmaliciousHTMLPhisherBrowse
    • 13.107.253.45
    http://bernas-medical-com.powerappsportals.comGet hashmaliciousUnknownBrowse
    • 13.107.253.45
    Notaire-document.htmlGet hashmaliciousUnknownBrowse
    • 13.107.253.45
    https://technopro-bg.com/redirect.php?action=url&goto=mairie-espondeilhan.com&osCsid=m24rb0l158b8m36rktotvg5ti2Get hashmaliciousHTMLPhisherBrowse
    • 13.107.253.45
    Axactor Microsoft - Introduksjonsm#U00f8te.msgGet hashmaliciousEvilProxyBrowse
    • 13.107.253.45
    Axactor Microsoft - Introduksjonsm#U00f8te.msgGet hashmaliciousEvilProxyBrowse
    • 13.107.253.45
    ELECTRONIC RECEIPT_Opcsa.htmlGet hashmaliciousEvilProxy, HTMLPhisherBrowse
    • 13.107.253.45
    Message_2477367.emlGet hashmaliciousUnknownBrowse
    • 13.107.253.45
    https://docs.zoom.us/doc/qMqlDrh-RUWwdmI-mAClTgGet hashmaliciousHTMLPhisherBrowse
    • 13.107.253.45
    SCAN_Client_No_XP9739270128398468932393.pdfGet hashmaliciousHTMLPhisherBrowse
    • 13.107.253.45
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\nsk89.tmp\System.dll#U0421#U041f#U041e#U0420#U0410#U0417#U0423#U041c#U0415#U041d#U0418#U0415-pdf.bat.exeGet hashmaliciousGuLoaderBrowse
      #U0421#U041f#U041e#U0420#U0410#U0417#U0423#U041c#U0415#U041d#U0418#U0415-pdf.bat.exeGet hashmaliciousGuLoaderBrowse
        -pdf.bat.exeGet hashmaliciousFormBookBrowse
          TERMENII CONTRACTULUI (ACORD NOU#U0102 COMAND#U0102)-pdf.bat.exeGet hashmaliciousFormBook, GuLoaderBrowse
            TERMENII CONTRACTULUI (ACORD NOU#U0102 COMAND#U0102)-pdf.bat.exeGet hashmaliciousGuLoaderBrowse
              -pdf.bat.exeGet hashmaliciousUnknownBrowse
                f5#U06f6.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                  f5#U06f6.vbsGet hashmaliciousGuLoaderBrowse
                    Solicitud de Cotizaci#U00f3n #U2013 Cat#U00e1logo de Muestras2024.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                      Solicitud de Cotizaci#U00f3n #U2013 Cat#U00e1logo de Muestras2024.vbsGet hashmaliciousGuLoaderBrowse
                        Process:C:\Users\user\Desktop\-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):153292
                        Entropy (8bit):4.599221882863509
                        Encrypted:false
                        SSDEEP:3072:auH/EMGAIZ02UvVMGQHl0HrpFkCd3/z9M:JHwAIqV4F0HdFk4y
                        MD5:D23AF20EF332C55E7E223CFA1FD94252
                        SHA1:04E86DCED7945775523BAB1D639B92334CFA327B
                        SHA-256:B9C3EDB15E270673ACA6A848033052CD34EBFF7AB54A74ADBAC6C6FC4D8D79A8
                        SHA-512:C2CC54BEB5243E62ED5A3FCE30FC624E371B1808C04DCFE96059BC21B4EA2CE3E66A1C6DB402930517704BDA5D2D6D990D5DE6C8028585576791E537E3FEB7F8
                        Malicious:false
                        Reputation:low
                        Preview:.....,......d.........##...k....???...................MM.......::.x............%.V...P...NN.GGGGG.........cccc...pp...........LL............................................f.........................;.W.\....>>......1...ZZ................[........EEEEEEE.........PP..........^......n....((.k......UUU.3.m............=====.......22...{......0..............MMM....,.......2..Z..........QQ....."....................$..,,.........sss....r..~..............m.........).....)).....I.p.........H.v........................6666.__.QQ.......Q............HHH..................5....QQ......TT.B........{{{{.........JJJ........77....................ddd.y..a...,,,,...............//................................D.....~.........,,,.!................kkkkkk.......T.,,,,........C................_.^^^^.-....................RR......v.....!........r....................ww.....Z.........................8.....0.........7......ppp.......%........c......___...........E.g......$$.................................y........
                        Process:C:\Users\user\Desktop\-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):355536
                        Entropy (8bit):7.653699193742095
                        Encrypted:false
                        SSDEEP:6144:UL2HS/TAnZUvR3jz2Fwo5jCBVy7b4tqdG8lI08e9N1lr9ITNdfOHNkX0KVSb:UL2HS/q6vR33A5mzy7bpG6l2TNdfO+Hq
                        MD5:9632912516372EEEF829ABBF8D80B755
                        SHA1:BD16F3F0049BCD88AFB2582EFDD0DD647E4C11F6
                        SHA-256:A4D0A3F7CA09F1D74AB0E5A3A1CB9B4AAC80B482C46EDABAFD9F9873F95A3990
                        SHA-512:BCEE99E04CCE817F0D97F8B304838C594704A0D675D34059E773A1D4F5B2FF938ECCC7EEF51E42AF06BA1B759C1AB6C4E9D3FEE493A980B2D74025FD58EBD98E
                        Malicious:false
                        Reputation:low
                        Preview:......SSS...................................................................^^..........[[..............................pp................r....FFFF........FF...........\......44.i.....>..L.......[[.........<<.aa.....(((.LLL..........................1........f.d....X.b...^.f...H...6}"w2F..`.......DT...<lS.1........3.O3......n.'gc...$oK..........V.JC.s.......m.R.......!.Q..W.I..5>.A\.P....+...x....#.u....%.....6M..e..L;.)..-W......h.!.].z*_|i..?dk...../N..=%( 8..4.......o..2..T#0.....E.rB.Y.76..~..p.j.9u:..j[.{...GL..._...f..........1..&.vyq.@.A.Z.at.X.b...^.f...H...6}"w2F..`......g..f.u.....2...DT...<lS.1..O3......n.'gc...$oK..........V.J!......%.s.......m.R+.Q..W.I..5>.A\.P....+....f.c.f....<.x....#.u..M..e..L;.)..-W......h.!.].z*_|i..?dk...../N..=%(..{.T?.......8..4...T#0.....E.rB.Y.76..~..p.f.....f....-.9u:..j[.{...GL..._......&.vyq.@.A.Z.at.X.b ..w...G..^.f...H...6}"w2F..`.......DT...<lS.1..O3......n.'gc...$oK..........E2........!..V.JC.s.......m.R+.Q.
                        Process:C:\Users\user\Desktop\-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):415743
                        Entropy (8bit):1.2524422116890421
                        Encrypted:false
                        SSDEEP:768:r1/VRVN7GaY97mbexftA4Z+RRCLDHuPxfARLhzR+9wBhtOxALX5Wa/5X6dJddvt2:LMxA4/Lf6dHgeGxN37ruZwuLi+OLj
                        MD5:A6B0286190FF25673A5BBCCA3E635E17
                        SHA1:B50D863E08054654434EEEAD618AE36D66F5AD59
                        SHA-256:2587546927274A33BE48C542AD1B98E07DF0C2A8503AFBC1F260EBEC1CB13EDE
                        SHA-512:1F9C0F6CD3BE6F79168BBD9B07931181CAE135D144DA4E569191E42BF66C5AF0BE49C894E1608A4C45C3BE38DFD47EB912CBA4DADB660A688474B1A3F2ACC72E
                        Malicious:false
                        Reputation:low
                        Preview:.........................................................................................................................................F....................i..........C...................................................X.............................................................._.................0...........(...............................S...............................?.............(................Z..............................."....................................................B...................;...........................................................................................................(..e...........A.........................................@............................f...............................................h.F............Q......................................................................W...............r..................D..D......4............................................................................U..........J....................._..
                        Process:C:\Users\user\Desktop\-pdf.bat.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):624
                        Entropy (8bit):4.25510206166015
                        Encrypted:false
                        SSDEEP:12:jXkvaDziGwRUF27KIqXVskejAECJX7lIHLGsvxAtbH1PIwp5Ayq1Bglj4UriJxMJ:jErRUWOjEM7lYLj5AtbB1Bq1U8hJxMJ
                        MD5:87F4B14CCA6F39D1C934F93B13234749
                        SHA1:9FCDD0EAD74EE185F49409E0FFE86B1925CC6F77
                        SHA-256:E619E25D31210DED72B4DBAE631948D4335AEAE318148E864421457EF0F4ACE9
                        SHA-512:13DB40313FEF1FDEB1D517E0664B7766328DD7DC7244741FF6B6EAE62C6D0BA5EE458E058375C466C9CB6062E0D7DCC3EC3F57310604A7372F79839ACAFE9471
                        Malicious:false
                        Reputation:low
                        Preview:dambrttets talentlseres hytteholds indtgtstabets udsondringernes wimp panickiness.perknite equibiradiate silverleaves abolitionising apotheosise serphidae eksempellses rochester fllesfagslreren..forvindet diligence staring anklagerne facades udgrftning klausulelimineringens.synchytrium listiges solsortredens sitarists encyclopedize femogfyrre sphagnummen pervertible pantomorphic polyprotic restress unwesternised udbudsmaterialets..canepin flipperen biogas trenchcoaters populreres abnormalise gult boks fejlsgningernes skakbrikken petromyzon knirkeriers rubiate..digteren adephagia laantagerens mariposite trop octylene,
                        Process:C:\Users\user\Desktop\-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):315351
                        Entropy (8bit):1.2455738850105664
                        Encrypted:false
                        SSDEEP:768:kFtpdTjsz/zhmhiCGrJI7rqVQuEB7QCGqvL2f0SQ1E2IC67MpqrchPadg+nlwAGP:mPGDDdQxvn1Xmrizhj8H3hE3MA
                        MD5:6957AC2FFFF57F658F70A8608C653D42
                        SHA1:A6764FE4F4FCDD48C73CB23CCCA9CE19E2845935
                        SHA-256:480D36CF0DE68BEAE5F1ED80A81AEE327BBA323C7B01A478E5D41BF429041F02
                        SHA-512:0B2575BDBB7DE38A6D5C2D1D5C8641EC7A65F9F05E2DA8CFAD8F09CE47C31EEEA70C891A8A42A4842F27215DEDDB69357DE9293D57C5ECFB19CC6007B1042505
                        Malicious:false
                        Reputation:low
                        Preview:.................^......... ..............`............3].......................................................C......................................................................o......i..............................B.......c.F....=T..'..........................................U.....m..............*...................K............?................................................................{...............................................j...L.....................................................2x...........................?a.............G.............<.............................................................................".......:............................1......$......+......................R.......................................[.................i............S..../...........................A............................................n................................@....?..................].......2.............................a....................................
                        Process:C:\Users\user\Desktop\-pdf.bat.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):1261154
                        Entropy (8bit):3.9929201101659686
                        Encrypted:false
                        SSDEEP:12288:JL2HS/q6vR33A5mzy7bpG6l2TNdfO+H43XREQABQtA:JL2HS/q6vR33GBpBudfO+H4REqA
                        MD5:4D77A418A8F9BFDCDBD2B26F15848997
                        SHA1:AF869D4286FA53A89970DF3156A751CF49CB3900
                        SHA-256:394529DBCFA73228F23C44F66C7145984D7A05F9EED3355C9631E90C1F1ED39E
                        SHA-512:B49E73977D05796EE21671644BC0739EFABC03F328C8AFA0659EDF588207EF5687A70F18D374A5576790E9CBFB32E5F71B462CD4BAA49E624100DB41E9C00755
                        Malicious:false
                        Reputation:low
                        Preview:d ......,...................o...................d ............................................................/.............................................................................................................................................................................G...J...............j...........................................................................................................................................E...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\-pdf.bat.exe
                        File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                        Category:modified
                        Size (bytes):12288
                        Entropy (8bit):5.9764977667479
                        Encrypted:false
                        SSDEEP:192:CVA1YOTDExj7EFrYCT4E8y3hoSdtTgwF43E7QbGPXI9uIc6w79Mw:CrR7SrtTv53tdtTgwF4SQbGPX36wJMw
                        MD5:D968CB2B98B83C03A9F02DD9B8DF97DC
                        SHA1:D784C9B7A92DCE58A5038BEB62A48FF509E166A0
                        SHA-256:A4EC98011EF99E595912718C1A1BF1AA67BFC2192575729D42F559D01F67B95C
                        SHA-512:2EE41DC68F329A1519A8073ECE7D746C9F3BF45D8EF3B915DEB376AF37E26074134AF5F83C8AF0FE0AB227F0D1ACCA9F37E5CA7AE37C46C3BCC0331FE5E2B97E
                        Malicious:false
                        Antivirus:
                        • Antivirus: ReversingLabs, Detection: 0%
                        • Antivirus: Virustotal, Detection: 1%, Browse
                        Joe Sandbox View:
                        • Filename: #U0421#U041f#U041e#U0420#U0410#U0417#U0423#U041c#U0415#U041d#U0418#U0415-pdf.bat.exe, Detection: malicious, Browse
                        • Filename: #U0421#U041f#U041e#U0420#U0410#U0417#U0423#U041c#U0415#U041d#U0418#U0415-pdf.bat.exe, Detection: malicious, Browse
                        • Filename: -pdf.bat.exe, Detection: malicious, Browse
                        • Filename: TERMENII CONTRACTULUI (ACORD NOU#U0102 COMAND#U0102)-pdf.bat.exe, Detection: malicious, Browse
                        • Filename: TERMENII CONTRACTULUI (ACORD NOU#U0102 COMAND#U0102)-pdf.bat.exe, Detection: malicious, Browse
                        • Filename: -pdf.bat.exe, Detection: malicious, Browse
                        • Filename: f5#U06f6.vbs, Detection: malicious, Browse
                        • Filename: f5#U06f6.vbs, Detection: malicious, Browse
                        • Filename: Solicitud de Cotizaci#U00f3n #U2013 Cat#U00e1logo de Muestras2024.vbs, Detection: malicious, Browse
                        • Filename: Solicitud de Cotizaci#U00f3n #U2013 Cat#U00e1logo de Muestras2024.vbs, Detection: malicious, Browse
                        Reputation:moderate, very likely benign file
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......7@t.s!..s!..s!..!T..t!..8Y..t!..s!..g!...T..w!...T..r!...T..r!...T..r!..Richs!..........................PE..L....c.........."!.....$..........J........@...............................p............@..........................@.......A..P............................`.......................................................@..X............................text...{".......$.................. ..`.rdata.......@.......(..............@..@.data...D....P.......,..............@....reloc.......`......................@..B........................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                        Entropy (8bit):7.064447166020408
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:-pdf.bat.exe
                        File size:915'912 bytes
                        MD5:c8c2fa1b682b0bca8ed9de83455e8977
                        SHA1:ff96ea1f052d0e7745a4fe30bacb8362ea57ba2c
                        SHA256:4af23250a740fc8e855879c8f0492b8be3613ef015db4347d14885f57e25ee93
                        SHA512:d692404d369b4755e760599a50078f0240dd3a5af2af5953ad86d00eaa788c812bed59b22f19c1251bdd192a8d81a10c4d10ec9cc6a15b1e7a44bfb51c20c258
                        SSDEEP:24576:ZFZsHTO9u9XKhrmod1RYTy7OQJs+45oi4:Z3n9i61RYeiQJBGf4
                        TLSH:1315DF0BACD4CADECA2CB1F2D937C8301D256D6998B0475E6974B6847076B97ED0F82C
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......3.;!wuUrwuUrwuUr<.QsuuUr<.SsvuUr<.TsxuUrwuTr.uUr..Qs|uUr...rvuUr..WsvuUrRichwuUr........................PE..L...*..c...........
                        Icon Hash:070911614d3d3117
                        Entrypoint:0x403804
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x63A18D2A [Tue Dec 20 10:23:38 2022 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:84062c623770f0d888e4ca58451aa7ad
                        Instruction
                        sub esp, 000003F0h
                        push ebx
                        push ebp
                        push esi
                        push edi
                        xor ebx, ebx
                        mov edi, 004084F8h
                        push 00008001h
                        mov ebp, ebx
                        mov dword ptr [esp+14h], ebx
                        call dword ptr [004080B8h]
                        mov esi, dword ptr [004080A8h]
                        lea eax, dword ptr [esp+30h]
                        xorps xmm0, xmm0
                        mov dword ptr [esp+44h], ebx
                        push eax
                        movlpd qword ptr [esp+00000148h], xmm0
                        mov dword ptr [esp+34h], 0000011Ch
                        call esi
                        test eax, eax
                        jne 00007F5F6C8B6109h
                        lea eax, dword ptr [esp+30h]
                        mov dword ptr [esp+30h], 00000114h
                        push eax
                        call esi
                        push 00000053h
                        pop eax
                        mov dl, 04h
                        mov byte ptr [esp+0000014Ah], dl
                        cmp word ptr [esp+44h], ax
                        jne 00007F5F6C8B60E3h
                        mov eax, dword ptr [esp+5Eh]
                        add eax, FFFFFFD0h
                        mov word ptr [esp+00000144h], ax
                        jmp 00007F5F6C8B60DDh
                        xor eax, eax
                        jmp 00007F5F6C8B60C4h
                        mov dl, byte ptr [esp+0000014Ah]
                        cmp dword ptr [esp+34h], 0Ah
                        jnc 00007F5F6C8B60DDh
                        movzx eax, word ptr [esp+3Ch]
                        mov dword ptr [esp+3Ch], eax
                        jmp 00007F5F6C8B60D6h
                        mov eax, dword ptr [esp+3Ch]
                        mov dword ptr [00429E38h], eax
                        movzx eax, byte ptr [esp+34h]
                        shl ax, 0008h
                        movzx ecx, ax
                        movzx eax, byte ptr [esp+38h]
                        or ecx, eax
                        movzx eax, byte ptr [esp+00000144h]
                        shl ax, 0008h
                        shl ecx, 10h
                        movzx eax, word ptr [eax]
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x8a200xa0.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4e0000x5b2b0.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x80000x2b0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x6dab0x6e001138756712947cfad0fec340a9f6322aFalse0.6540127840909091data6.396661733193989IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x80000x18940x1a00f104cfd27821b85fded983903a163042False0.4299879807692308data4.867236374474069IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xa0000x1fe400x2009a0317be14b12529a14c33f8334a2225False0.2265625data1.7566060613591612IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .ndata0x2a0000x240000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x4e0000x5b2b00x5b40043b3182ad5c6e9878a85fabd0388831eFalse0.3067208904109589data4.845999503948363IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x4e2f80x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.28078305766784034
                        RT_ICON0x903200x10828Device independent bitmap graphic, 128 x 256 x 32, image size 67584EnglishUnited States0.3406926534958003
                        RT_ICON0xa0b480x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16896EnglishUnited States0.42973547472838924
                        RT_ICON0xa4d700x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9600EnglishUnited States0.46763485477178424
                        RT_ICON0xa73180x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.5314258911819888
                        RT_ICON0xa83c00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.650709219858156
                        RT_DIALOG0xa88280x100dataEnglishUnited States0.5234375
                        RT_DIALOG0xa89280x11cdataEnglishUnited States0.6056338028169014
                        RT_DIALOG0xa8a480xc4dataEnglishUnited States0.5918367346938775
                        RT_DIALOG0xa8b100x60dataEnglishUnited States0.7291666666666666
                        RT_GROUP_ICON0xa8b700x5adataEnglishUnited States0.7555555555555555
                        RT_VERSION0xa8bd00x2b0dataEnglishUnited States0.4883720930232558
                        RT_MANIFEST0xa8e800x42eXML 1.0 document, ASCII text, with very long lines (1070), with no line terminatorsEnglishUnited States0.5149532710280373
                        DLLImport
                        ADVAPI32.dllRegCloseKey, RegDeleteKeyW, RegDeleteValueW, RegEnumKeyW, RegEnumValueW, RegQueryValueExW, RegSetValueExW, OpenProcessToken, AdjustTokenPrivileges, LookupPrivilegeValueW, SetFileSecurityW, RegCreateKeyExW, RegOpenKeyExW
                        SHELL32.dllSHFileOperationW, SHBrowseForFolderW, SHGetPathFromIDListW, SHGetFileInfoW, ShellExecuteExW
                        ole32.dllOleInitialize, OleUninitialize, CoTaskMemFree, IIDFromString, CoCreateInstance
                        COMCTL32.dllImageList_Destroy, ImageList_AddMasked, ImageList_Create
                        USER32.dllPeekMessageW, DispatchMessageW, wsprintfA, SystemParametersInfoW, SetClassLongW, GetWindowLongW, GetSysColor, ScreenToClient, SetCursor, GetWindowRect, TrackPopupMenu, AppendMenuW, EnableMenuItem, CreatePopupMenu, GetSystemMenu, GetSystemMetrics, IsWindowEnabled, EmptyClipboard, SetClipboardData, CloseClipboard, OpenClipboard, CheckDlgButton, EndDialog, DialogBoxParamW, IsWindowVisible, SetWindowPos, CreateWindowExW, GetClassInfoW, SetDlgItemTextW, CallWindowProcW, GetMessagePos, CharNextW, ExitWindowsEx, SetWindowTextW, SetTimer, CreateDialogParamW, DestroyWindow, LoadImageW, FindWindowExW, SetWindowLongW, InvalidateRect, ReleaseDC, GetDC, SetForegroundWindow, EnableWindow, GetDlgItem, ShowWindow, IsWindow, PostQuitMessage, SendMessageTimeoutW, SendMessageW, wsprintfW, FillRect, GetClientRect, EndPaint, BeginPaint, DrawTextW, DefWindowProcW, GetDlgItemTextW, CharNextA, CharPrevW, RegisterClassW, MessageBoxIndirectW, LoadCursorW
                        GDI32.dllSetBkMode, CreateBrushIndirect, GetDeviceCaps, SelectObject, DeleteObject, SetBkColor, SetTextColor, CreateFontIndirectW
                        KERNEL32.dllGetLastError, WaitForSingleObject, GetExitCodeProcess, RemoveDirectoryW, GetTempFileNameW, CreateDirectoryW, WideCharToMultiByte, lstrlenW, lstrcpynW, GlobalLock, GlobalUnlock, CreateThread, GetDiskFreeSpaceW, CopyFileW, GetVersionExW, GetWindowsDirectoryW, ExitProcess, GetCurrentProcess, SetErrorMode, CreateProcessW, SetEnvironmentVariableW, GetCommandLineW, GetModuleFileNameW, GetTickCount, GetFileSize, CreateFileW, MultiByteToWideChar, MoveFileW, WritePrivateProfileStringW, GetPrivateProfileStringW, lstrlenA, lstrcmpiW, lstrcmpW, MulDiv, GlobalFree, GlobalAlloc, LoadLibraryExW, GetModuleHandleW, FreeLibrary, Sleep, CloseHandle, SetFileTime, SetFilePointer, SetFileAttributesW, ReadFile, GetShortPathNameW, GetFullPathNameW, GetFileAttributesW, FindNextFileW, FindFirstFileW, FindClose, DeleteFileW, CompareFileTime, SearchPathW, SetCurrentDirectoryW, ExpandEnvironmentStringsW, WriteFile, MoveFileExW, GetSystemDirectoryW, GetModuleHandleA, GetProcAddress, lstrcmpiA, lstrcpyA, lstrcatW, GetTempPathW
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 4, 2024 11:21:55.835006952 CEST5350780162.159.36.2192.168.2.7
                        Oct 4, 2024 11:21:56.397016048 CEST53651201.1.1.1192.168.2.7
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 4, 2024 11:21:08.973453999 CEST1.1.1.1192.168.2.70x6c6bNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.netazurefd-t-fb-prod.trafficmanager.netCNAME (Canonical name)IN (0x0001)false
                        Oct 4, 2024 11:21:08.973453999 CEST1.1.1.1192.168.2.70x6c6bNo error (0)dual.s-part-0017.t-0009.fb-t-msedge.nets-part-0017.t-0009.fb-t-msedge.netCNAME (Canonical name)IN (0x0001)false
                        Oct 4, 2024 11:21:08.973453999 CEST1.1.1.1192.168.2.70x6c6bNo error (0)s-part-0017.t-0009.fb-t-msedge.net13.107.253.45A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:05:21:10
                        Start date:04/10/2024
                        Path:C:\Users\user\Desktop\-pdf.bat.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\-pdf.bat.exe"
                        Imagebase:0x400000
                        File size:915'912 bytes
                        MD5 hash:C8C2FA1B682B0BCA8ED9DE83455E8977
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.3780975442.00000000054C5000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Reset < >

                          Execution Graph

                          Execution Coverage:21.2%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:19%
                          Total number of Nodes:1582
                          Total number of Limit Nodes:39
                          execution_graph 4926 401c41 4927 403002 21 API calls 4926->4927 4928 401c4a 4927->4928 4929 403002 21 API calls 4928->4929 4930 401c53 4929->4930 4933 406734 wsprintfW 4930->4933 4932 401cdb 4933->4932 4934 4024c2 4935 40303e 21 API calls 4934->4935 4936 4024c8 4935->4936 4937 40303e 21 API calls 4936->4937 4938 4024d1 4937->4938 4939 40303e 21 API calls 4938->4939 4940 4024da 4939->4940 4941 4066e4 2 API calls 4940->4941 4946 4024e2 4941->4946 4942 4024f3 lstrlenW lstrlenW 4943 405e3d 28 API calls 4942->4943 4945 40253a SHFileOperationW 4943->4945 4944 405e3d 28 API calls 4944->4946 4945->4946 4947 402ea1 4945->4947 4946->4942 4946->4944 4946->4947 4948 704412c6 4951 7044101b 4948->4951 4958 7044156c 4951->4958 4953 70441020 4954 70441024 GlobalAlloc 4953->4954 4955 70441032 4953->4955 4954->4955 4956 704415c5 3 API calls 4955->4956 4957 70441038 4956->4957 4960 70441572 4958->4960 4959 70441578 4959->4953 4960->4959 4961 70441584 GlobalFree 4960->4961 4961->4953 4962 402b42 4963 402b48 4962->4963 4964 402b50 FindNextFileW 4963->4964 4965 4018be 4963->4965 4964->4965 4966 704410c7 4973 704410f8 4966->4973 4967 704412be GlobalFree 4968 704411d7 GlobalAlloc 4968->4973 4969 70441258 GlobalFree 4969->4973 4970 704412ba 4970->4967 4971 70441548 3 API calls 4971->4973 4972 70441296 GlobalFree 4972->4973 4973->4967 4973->4968 4973->4969 4973->4970 4973->4971 4973->4972 4974 704415eb 2 API calls 4973->4974 4976 70441165 GlobalAlloc 4973->4976 4977 70441638 lstrcpyW 4973->4977 4975 704411ca GlobalFree 4974->4975 4975->4973 4976->4973 4978 704411ab GlobalFree 4977->4978 4978->4973 4979 70441cc7 4980 70441cee 4979->4980 4981 70441d2f GlobalFree 4980->4981 4982 70441d4e __alldvrm 4980->4982 4981->4982 4983 704415eb 2 API calls 4982->4983 4984 70441de5 GlobalFree GlobalFree 4983->4984 4985 403747 4986 403759 SetTimer 4985->4986 4987 40376d 4985->4987 4986->4987 4988 4037bc 4987->4988 4991 4033cb MulDiv 4987->4991 4990 40377b wsprintfW SetWindowTextW SetDlgItemTextW 4990->4988 4991->4990 4675 402048 4676 403002 21 API calls 4675->4676 4677 40204e 4676->4677 4678 403002 21 API calls 4677->4678 4679 402057 4678->4679 4680 402061 ShowWindow 4679->4680 4681 40206c EnableWindow 4679->4681 4682 402ea1 4680->4682 4681->4682 4992 403e4b 4993 403e56 4992->4993 4994 403e5a 4993->4994 4995 403e5d GlobalAlloc 4993->4995 4995->4994 4996 401ecc 4997 403002 21 API calls 4996->4997 4998 401eda SetWindowLongW 4997->4998 4999 402ea1 4998->4999 4734 70441a4a 4735 70441aa1 4734->4735 4736 70441a5a VirtualProtect 4734->4736 4736->4735 5000 40234f 5001 40303e 21 API calls 5000->5001 5002 402356 5001->5002 5003 40303e 21 API calls 5002->5003 5004 402361 5003->5004 5005 40303e 21 API calls 5004->5005 5006 40236e 5005->5006 5007 40303e 21 API calls 5006->5007 5008 402379 5007->5008 5009 40303e 21 API calls 5008->5009 5011 402384 5009->5011 5010 4023c4 CoCreateInstance 5015 4023e8 5010->5015 5011->5010 5012 40303e 21 API calls 5011->5012 5012->5010 5013 405e3d 28 API calls 5014 4024ba 5013->5014 5015->5013 5016 402dd1 5017 402dd9 5016->5017 5027 402df2 5016->5027 5020 403002 21 API calls 5017->5020 5023 402e72 5017->5023 5018 4069fb 5 API calls 5019 402e2a 5018->5019 5021 40303e 21 API calls 5019->5021 5022 402de9 5020->5022 5024 402e33 5021->5024 5025 403002 21 API calls 5022->5025 5024->5023 5026 402e37 IIDFromString 5024->5026 5025->5027 5026->5023 5028 402e47 5026->5028 5027->5018 5028->5023 5031 406c2f lstrcpynW 5028->5031 5030 402e66 CoTaskMemFree 5030->5023 5031->5030 5032 4059d3 5033 4059e8 5032->5033 5034 4059fc 5032->5034 5035 405a41 CallWindowProcW 5033->5035 5036 4059ee 5033->5036 5037 405a1b 5034->5037 5038 405a04 IsWindowVisible 5034->5038 5041 4059f8 5035->5041 5039 4055eb SendMessageW 5036->5039 5037->5035 5049 4055b9 5037->5049 5038->5035 5040 405a11 5038->5040 5039->5041 5044 4057dd SendMessageW 5040->5044 5045 40583c SendMessageW 5044->5045 5046 4057fe GetMessagePos ScreenToClient SendMessageW 5044->5046 5047 405834 5045->5047 5046->5047 5048 405839 5046->5048 5047->5037 5048->5045 5058 406c2f lstrcpynW 5049->5058 5051 4055cc 5059 406734 wsprintfW 5051->5059 5053 4055d6 5054 401533 102 API calls 5053->5054 5055 4055df 5054->5055 5060 406c2f lstrcpynW 5055->5060 5057 4055e6 5057->5035 5058->5051 5059->5053 5060->5057 4652 402656 4653 40303e 21 API calls 4652->4653 4654 40266d 4653->4654 4655 40303e 21 API calls 4654->4655 4656 402678 4655->4656 4671 4063ba 4656->4671 4659 402ea5 4660 4026d1 4663 4026e7 4660->4663 4664 4026d8 4660->4664 4661 4026bb 4662 40303e 21 API calls 4661->4662 4667 4026c2 lstrlenW 4662->4667 4666 402700 RegSetValueExW 4663->4666 4669 4032c7 48 API calls 4663->4669 4665 403002 21 API calls 4664->4665 4668 4026df 4665->4668 4670 40271c RegCloseKey 4666->4670 4667->4666 4668->4666 4669->4668 4670->4659 4672 4063c9 4671->4672 4673 4063d2 RegCreateKeyExW 4672->4673 4674 402697 4672->4674 4673->4674 4674->4659 4674->4660 4674->4661 5061 405758 lstrcpynW lstrlenW 4683 40225d 4684 402335 4683->4684 4685 40226e 4683->4685 4687 405e3d 28 API calls 4684->4687 4686 40303e 21 API calls 4685->4686 4688 402275 4686->4688 4693 40234a 4687->4693 4689 40303e 21 API calls 4688->4689 4690 402281 4689->4690 4691 40228b GetModuleHandleW 4690->4691 4692 40229c LoadLibraryExW 4690->4692 4694 4022b0 4691->4694 4695 402298 4691->4695 4692->4684 4692->4694 4704 40637e 4694->4704 4695->4692 4698 4022c4 4701 405e3d 28 API calls 4698->4701 4702 4022da 4698->4702 4699 402306 4700 405e3d 28 API calls 4699->4700 4700->4702 4701->4702 4702->4693 4703 402329 FreeLibrary 4702->4703 4703->4693 4709 40657e WideCharToMultiByte 4704->4709 4706 40639b 4707 4063a2 GetProcAddress 4706->4707 4708 4022ba 4706->4708 4707->4708 4708->4698 4708->4699 4709->4706 5062 402cde 5063 403002 21 API calls 5062->5063 5066 402b21 5063->5066 5064 401709 5065 402d10 5067 402d35 5065->5067 5068 402d25 5065->5068 5066->5062 5066->5064 5066->5065 5070 405fbd 21 API calls 5067->5070 5069 403002 21 API calls 5068->5069 5069->5064 5070->5064 5071 40285f 5072 402883 5071->5072 5073 402899 5071->5073 5074 403002 21 API calls 5072->5074 5075 4028c3 5073->5075 5076 40289e 5073->5076 5083 402889 5074->5083 5077 40303e 21 API calls 5075->5077 5078 40303e 21 API calls 5076->5078 5079 4028ca lstrlenW 5077->5079 5080 4028a5 5078->5080 5079->5083 5088 40657e WideCharToMultiByte 5080->5088 5082 402910 5083->5082 5086 406599 5 API calls 5083->5086 5087 4028fc 5083->5087 5084 4028b5 lstrlenA 5084->5083 5085 406b20 WriteFile 5085->5082 5086->5087 5087->5082 5087->5085 5088->5084 5089 401ce0 5090 40303e 21 API calls 5089->5090 5091 401ce7 5090->5091 5092 403002 21 API calls 5091->5092 5093 401cf0 wsprintfW 5092->5093 5094 402ea1 5093->5094 5095 402566 5096 402574 5095->5096 5097 40256e 5095->5097 5099 40303e 21 API calls 5096->5099 5102 402585 5096->5102 5098 40303e 21 API calls 5097->5098 5098->5096 5099->5102 5100 40303e 21 API calls 5103 402594 5100->5103 5101 40303e 21 API calls 5104 40259d WritePrivateProfileStringW 5101->5104 5102->5100 5102->5103 5103->5101 5105 402d69 5106 403002 21 API calls 5105->5106 5107 402d6f 5106->5107 5108 405fbd 21 API calls 5107->5108 5109 401709 5107->5109 5108->5109 5110 401eea 5111 401ef4 5110->5111 5112 401efe GetDlgItem 5110->5112 5113 403002 21 API calls 5111->5113 5114 401efb 5112->5114 5113->5114 5115 401f3c GetClientRect LoadImageW SendMessageW 5114->5115 5116 40303e 21 API calls 5114->5116 5118 401f9c 5115->5118 5120 401fa7 5115->5120 5116->5115 5119 401fa0 DeleteObject 5118->5119 5118->5120 5119->5120 5121 401aec 5122 401aa2 5121->5122 5125 401ab1 5121->5125 5123 40303e 21 API calls 5122->5123 5124 401aa7 5123->5124 5126 40682e 70 API calls 5124->5126 5126->5125 5127 40216c 5128 40303e 21 API calls 5127->5128 5129 402173 5128->5129 5130 4066e4 2 API calls 5129->5130 5131 402179 5130->5131 5133 402188 5131->5133 5134 406734 wsprintfW 5131->5134 5134->5133 5135 70442c6a 5136 70442cd8 5135->5136 5137 70442cc3 5135->5137 5137->5136 5138 70442ccd GetLastError 5137->5138 5138->5136 5139 404fef 5140 405025 5139->5140 5141 404fff 5139->5141 5143 40585e 8 API calls 5140->5143 5142 40561d 22 API calls 5141->5142 5144 40500c SetDlgItemTextW 5142->5144 5145 405031 5143->5145 5144->5140 5146 401af0 5147 40303e 21 API calls 5146->5147 5148 401af7 lstrlenW 5147->5148 5151 401afd 5148->5151 5149 40303e 21 API calls 5149->5151 5151->5149 5152 402855 5151->5152 5153 406a30 GetFileAttributesW CreateFileW 5151->5153 5153->5151 4566 402af5 4567 402afc 4566->4567 4569 401709 4566->4569 4568 403002 21 API calls 4567->4568 4570 402b03 4568->4570 4571 402b10 SetFilePointer 4570->4571 4571->4569 4573 402b21 4571->4573 4572 403002 21 API calls 4572->4573 4573->4569 4573->4572 4574 402d10 4573->4574 4575 402d35 4574->4575 4576 402d25 4574->4576 4578 405fbd 21 API calls 4575->4578 4577 403002 21 API calls 4576->4577 4577->4569 4578->4569 5154 402b75 5155 40303e 21 API calls 5154->5155 5156 402b7c FindFirstFileW 5155->5156 5157 402b90 5156->5157 5160 406734 wsprintfW 5157->5160 5159 402b67 5160->5159 5161 402077 5162 40303e 21 API calls 5161->5162 5163 40207d 5162->5163 5164 40303e 21 API calls 5163->5164 5165 402086 5164->5165 5166 40303e 21 API calls 5165->5166 5167 40208f 5166->5167 5168 40303e 21 API calls 5167->5168 5169 402098 5168->5169 5170 405e3d 28 API calls 5169->5170 5171 4020a4 5170->5171 5178 406b08 ShellExecuteExW 5171->5178 5173 4020ea 5175 401709 5173->5175 5179 406629 WaitForSingleObject 5173->5179 5176 402109 CloseHandle 5176->5175 5178->5173 5180 406640 5179->5180 5181 406656 GetExitCodeProcess 5180->5181 5182 406324 2 API calls 5180->5182 5181->5176 5183 406647 WaitForSingleObject 5182->5183 5183->5180 5184 402e7c SendMessageW 5185 402e94 InvalidateRect 5184->5185 5186 402ea1 5184->5186 5185->5186 4737 7044167a 4738 704416b7 4737->4738 4779 70442351 4738->4779 4740 704416be 4741 704417ef 4740->4741 4742 704416d6 4740->4742 4743 704416cf 4740->4743 4809 70442049 4742->4809 4825 70441fcb 4743->4825 4748 70441740 4752 70441746 4748->4752 4753 70441791 4748->4753 4749 70441722 4838 70442209 4749->4838 4750 7044170a 4766 70441700 4750->4766 4835 70442f9f 4750->4835 4751 704416eb 4755 704416f5 4751->4755 4760 70441702 4751->4760 4857 70441f1e 4752->4857 4758 70442209 10 API calls 4753->4758 4755->4766 4819 70442d14 4755->4819 4764 7044177e 4758->4764 4759 70441728 4849 70441668 4759->4849 4829 704417f7 4760->4829 4770 704417de 4764->4770 4862 7044200d 4764->4862 4766->4748 4766->4749 4767 70441708 4767->4766 4768 70442209 10 API calls 4768->4764 4770->4741 4772 704417e8 GlobalFree 4770->4772 4772->4741 4776 704417cf 4776->4770 4866 704415c5 wsprintfW 4776->4866 4778 704417c2 FreeLibrary 4778->4776 4869 704412f8 GlobalAlloc 4779->4869 4781 7044237f 4870 704412f8 GlobalAlloc 4781->4870 4783 70442a3a GlobalFree GlobalFree GlobalFree 4784 70442a5a 4783->4784 4798 70442aa7 4783->4798 4785 70442af7 4784->4785 4790 70442a73 4784->4790 4784->4798 4787 70442b19 GetModuleHandleW 4785->4787 4785->4798 4786 70442947 GlobalAlloc 4804 7044238a 4786->4804 4788 70442b3f 4787->4788 4789 70442b2a LoadLibraryW 4787->4789 4877 70441f7b WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4788->4877 4789->4788 4789->4798 4795 704412e1 2 API calls 4790->4795 4790->4798 4792 7044299f lstrcpyW 4792->4804 4793 704429bd GlobalFree 4793->4804 4794 70442b8e 4797 70442b9c lstrlenW 4794->4797 4794->4798 4795->4798 4796 704429af lstrcpyW 4796->4804 4878 70441f7b WideCharToMultiByte GlobalAlloc WideCharToMultiByte GetProcAddress GlobalFree 4797->4878 4798->4740 4799 70442b4c 4799->4794 4807 70442b78 GetProcAddress 4799->4807 4802 70442bb6 4802->4798 4803 70442822 GlobalFree 4803->4804 4804->4783 4804->4786 4804->4792 4804->4793 4804->4796 4804->4803 4806 704429fb 4804->4806 4871 704412f8 GlobalAlloc 4804->4871 4872 704412e1 4804->4872 4806->4804 4875 70441309 GlobalSize GlobalAlloc 4806->4875 4807->4794 4814 7044205e 4809->4814 4811 70442124 GlobalAlloc WideCharToMultiByte 4813 704421be GlobalFree 4811->4813 4812 70442154 GlobalAlloc 4818 7044208b 4812->4818 4813->4814 4816 704416dc 4813->4816 4814->4811 4814->4812 4814->4813 4815 704412e1 lstrcpynW GlobalAlloc 4814->4815 4814->4818 4815->4814 4816->4750 4816->4751 4816->4766 4818->4813 4818->4814 4880 70441548 4818->4880 4885 704419db 4818->4885 4821 70442d26 4819->4821 4820 70442dcb VirtualAlloc 4824 70442de9 4820->4824 4821->4820 4888 70442cbf 4824->4888 4826 70441fde 4825->4826 4827 70441fe9 GlobalAlloc 4826->4827 4828 704416d5 4826->4828 4827->4826 4828->4742 4833 70441823 4829->4833 4830 70441897 GlobalAlloc 4834 704418b5 4830->4834 4831 704418a8 4832 704418ac GlobalSize 4831->4832 4831->4834 4832->4834 4833->4830 4833->4831 4834->4767 4836 70442faa 4835->4836 4837 70442fea GlobalFree 4836->4837 4891 704412f8 GlobalAlloc 4838->4891 4840 704422a6 StringFromGUID2 4844 70442211 4840->4844 4841 704422b7 lstrcpynW 4841->4844 4842 70442280 MultiByteToWideChar 4842->4844 4843 704422ee GlobalFree 4843->4844 4844->4840 4844->4841 4844->4842 4844->4843 4845 704422ca wsprintfW 4844->4845 4846 70442325 GlobalFree 4844->4846 4847 704415eb 2 API calls 4844->4847 4892 70441638 4844->4892 4845->4844 4846->4759 4847->4844 4896 704412f8 GlobalAlloc 4849->4896 4851 7044166d 4852 70441f1e 2 API calls 4851->4852 4853 70441677 4852->4853 4854 704415eb 4853->4854 4855 704415f4 GlobalAlloc lstrcpynW 4854->4855 4856 70441633 GlobalFree 4854->4856 4855->4856 4856->4764 4858 70441f5c lstrcpyW 4857->4858 4859 70441f2b wsprintfW 4857->4859 4861 70441765 4858->4861 4859->4861 4861->4768 4863 704417a4 4862->4863 4864 7044201c 4862->4864 4863->4776 4863->4778 4864->4863 4865 70442033 GlobalFree 4864->4865 4865->4864 4867 704415eb 2 API calls 4866->4867 4868 704415e6 4867->4868 4868->4770 4869->4781 4870->4804 4871->4804 4879 704412f8 GlobalAlloc 4872->4879 4874 704412f0 lstrcpynW 4874->4804 4876 70441327 4875->4876 4876->4806 4877->4799 4878->4802 4879->4874 4881 70441555 4880->4881 4882 704412f8 GlobalAlloc 4880->4882 4883 704412e1 2 API calls 4881->4883 4882->4818 4884 7044156a 4883->4884 4884->4818 4886 70441a48 4885->4886 4887 704419ea VirtualAlloc 4885->4887 4886->4818 4887->4886 4889 70442ccd GetLastError 4888->4889 4890 70442cd8 4888->4890 4889->4890 4890->4766 4891->4844 4893 70441663 4892->4893 4894 7044163f 4892->4894 4893->4844 4894->4893 4895 70441648 lstrcpyW 4894->4895 4895->4893 4896->4851 4897 4025ff 4898 402608 4897->4898 4899 40262f 4897->4899 4900 4030c1 21 API calls 4898->4900 4901 40303e 21 API calls 4899->4901 4902 40260f 4900->4902 4903 402636 4901->4903 4904 402615 4902->4904 4908 402648 4902->4908 4909 40307c 4903->4909 4906 40303e 21 API calls 4904->4906 4907 40261c RegDeleteValueW RegCloseKey 4906->4907 4907->4908 4910 403089 4909->4910 4911 403090 4909->4911 4910->4908 4911->4910 4913 40141e 4911->4913 4914 4063ed RegOpenKeyExW 4913->4914 4915 40145b 4914->4915 4916 40146f RegEnumValueW 4915->4916 4923 401493 4915->4923 4924 401514 4915->4924 4917 401503 RegCloseKey 4916->4917 4916->4923 4917->4924 4918 4014ce RegEnumKeyW 4919 4014d8 RegCloseKey 4918->4919 4918->4923 4920 4069fb 5 API calls 4919->4920 4921 4014e9 4920->4921 4921->4924 4925 4014ed RegDeleteKeyW 4921->4925 4922 40141e 6 API calls 4922->4923 4923->4917 4923->4918 4923->4919 4923->4922 4924->4910 4925->4924 5187 401000 5188 401039 BeginPaint GetClientRect 5187->5188 5189 40100a DefWindowProcW 5187->5189 5191 40110f 5188->5191 5192 40119a 5189->5192 5193 401117 5191->5193 5194 40107e CreateBrushIndirect FillRect DeleteObject 5191->5194 5195 401185 EndPaint 5193->5195 5196 40111d CreateFontIndirectW 5193->5196 5194->5191 5195->5192 5196->5195 5197 401130 6 API calls 5196->5197 5197->5195 5198 401d01 5199 401d5d 5198->5199 5200 401d0f 5198->5200 5201 401d67 5199->5201 5202 401d8c GlobalAlloc 5199->5202 5203 401d50 5200->5203 5207 401d1e 5200->5207 5208 401709 5201->5208 5218 406c2f lstrcpynW 5201->5218 5205 405fbd 21 API calls 5202->5205 5204 405fbd 21 API calls 5203->5204 5204->5199 5205->5208 5215 406c2f lstrcpynW 5207->5215 5209 401d79 GlobalFree 5209->5208 5211 401d2d 5216 406c2f lstrcpynW 5211->5216 5213 401d3c 5217 406c2f lstrcpynW 5213->5217 5215->5211 5216->5213 5217->5208 5218->5209 5219 401b03 5220 403002 21 API calls 5219->5220 5221 401b0a 5220->5221 5222 403002 21 API calls 5221->5222 5223 401b15 5222->5223 5224 40303e 21 API calls 5223->5224 5225 401b20 lstrlenW 5224->5225 5226 401b3c 5225->5226 5228 401b67 5225->5228 5226->5228 5231 406c2f lstrcpynW 5226->5231 5229 401b5b 5229->5228 5230 401b5f lstrlenW 5229->5230 5230->5228 5231->5229 4265 403804 SetErrorMode GetVersionExW 4266 40384f GetVersionExW 4265->4266 4268 403886 4265->4268 4267 403871 4266->4267 4267->4268 4269 4038ed 4268->4269 4270 4069fb 5 API calls 4268->4270 4271 4062b3 3 API calls 4269->4271 4270->4269 4272 403903 lstrlenA 4271->4272 4272->4269 4273 403911 4272->4273 4274 4069fb 5 API calls 4273->4274 4275 403918 4274->4275 4276 4069fb 5 API calls 4275->4276 4277 40391f 4276->4277 4278 4069fb 5 API calls 4277->4278 4279 40392b #17 OleInitialize SHGetFileInfoW 4278->4279 4355 406c2f lstrcpynW 4279->4355 4282 403979 GetCommandLineW 4356 406c2f lstrcpynW 4282->4356 4284 40398a 4285 40670b CharNextW 4284->4285 4286 4039c4 CharNextW 4285->4286 4287 403ab4 GetTempPathW 4286->4287 4290 4039dd 4286->4290 4357 403da8 4287->4357 4289 403acc 4291 403ad0 GetWindowsDirectoryW lstrcatW 4289->4291 4292 403b26 DeleteFileW 4289->4292 4290->4287 4296 40670b CharNextW 4290->4296 4305 403aa0 4290->4305 4294 403da8 12 API calls 4291->4294 4367 40348f GetTickCount GetModuleFileNameW 4292->4367 4295 403aec 4294->4295 4295->4292 4299 403af0 GetTempPathW lstrcatW SetEnvironmentVariableW SetEnvironmentVariableW 4295->4299 4296->4290 4297 403b3c 4298 403bb5 4297->4298 4300 403ba7 4297->4300 4303 40670b CharNextW 4297->4303 4472 4037c2 4298->4472 4301 403da8 12 API calls 4299->4301 4397 405b41 4300->4397 4306 403b1e 4301->4306 4316 403b55 4303->4316 4454 406c2f lstrcpynW 4305->4454 4306->4292 4306->4298 4309 403bcc 4311 406bbd MessageBoxIndirectW 4309->4311 4310 403d0f 4312 403d94 4310->4312 4313 403d18 GetCurrentProcess OpenProcessToken 4310->4313 4319 403bd7 ExitProcess 4311->4319 4314 403d30 LookupPrivilegeValueW AdjustTokenPrivileges 4313->4314 4315 403d64 4313->4315 4314->4315 4320 4069fb 5 API calls 4315->4320 4317 403bdf 4316->4317 4318 403b7f 4316->4318 4322 406611 5 API calls 4317->4322 4455 40674d 4318->4455 4323 403d6b 4320->4323 4325 403be4 lstrcatW 4322->4325 4328 403d80 ExitWindowsEx 4323->4328 4330 403d8d 4323->4330 4326 403c08 lstrcatW lstrcmpiW 4325->4326 4327 403bf9 lstrcatW 4325->4327 4326->4298 4329 403c2b 4326->4329 4327->4326 4328->4312 4328->4330 4333 403c34 4329->4333 4334 403c3b 4329->4334 4486 401533 4330->4486 4332 403b9c 4471 406c2f lstrcpynW 4332->4471 4337 405f41 4 API calls 4333->4337 4338 405f21 2 API calls 4334->4338 4339 403c39 4337->4339 4340 403c40 SetCurrentDirectoryW 4338->4340 4339->4340 4341 403c65 4340->4341 4342 403c56 4340->4342 4482 406c2f lstrcpynW 4341->4482 4481 406c2f lstrcpynW 4342->4481 4345 405fbd 21 API calls 4346 403c97 DeleteFileW 4345->4346 4347 403ca2 CopyFileW 4346->4347 4352 403c73 4346->4352 4347->4352 4348 403cfb 4350 406352 39 API calls 4348->4350 4349 406352 39 API calls 4349->4352 4350->4298 4351 405fbd 21 API calls 4351->4352 4352->4345 4352->4348 4352->4349 4352->4351 4354 403ce6 CloseHandle 4352->4354 4483 4067eb CreateProcessW 4352->4483 4354->4352 4355->4282 4356->4284 4358 406e52 5 API calls 4357->4358 4359 403db4 4358->4359 4360 403dbe 4359->4360 4361 40666b 3 API calls 4359->4361 4360->4289 4362 403dc6 4361->4362 4363 405f21 2 API calls 4362->4363 4364 403dcc 4363->4364 4365 406b6b 2 API calls 4364->4365 4366 403dd7 4365->4366 4366->4289 4489 406a30 GetFileAttributesW CreateFileW 4367->4489 4369 4034d0 4396 4034dd 4369->4396 4490 406c2f lstrcpynW 4369->4490 4371 4034f3 4491 406e25 lstrlenW 4371->4491 4375 403504 GetFileSize 4376 40360b 4375->4376 4380 40351d 4375->4380 4377 4033e9 36 API calls 4376->4377 4378 403616 4377->4378 4382 40364f GlobalAlloc 4378->4382 4378->4396 4497 403131 SetFilePointer 4378->4497 4379 40311b ReadFile 4379->4380 4380->4376 4380->4379 4381 4036a4 4380->4381 4389 4033e9 36 API calls 4380->4389 4380->4396 4384 4033e9 36 API calls 4381->4384 4383 403667 4382->4383 4387 406b6b 2 API calls 4383->4387 4384->4396 4386 403633 4388 406a5d ReadFile 4386->4388 4390 403676 CreateFileW 4387->4390 4392 403645 4388->4392 4389->4380 4391 4036be 4390->4391 4390->4396 4496 403131 SetFilePointer 4391->4496 4392->4382 4392->4396 4394 4036cc 4395 4032c7 48 API calls 4394->4395 4395->4396 4396->4297 4396->4396 4398 4069fb 5 API calls 4397->4398 4399 405b55 4398->4399 4400 405b70 4399->4400 4401 405b5e 4399->4401 4402 406a8c 3 API calls 4400->4402 4506 406734 wsprintfW 4401->4506 4403 405b9f 4402->4403 4405 405bbe lstrcatW 4403->4405 4407 406a8c 3 API calls 4403->4407 4406 405b6e 4405->4406 4498 405a82 4406->4498 4407->4405 4410 40674d 18 API calls 4411 405bf0 4410->4411 4412 405c8a 4411->4412 4415 406a8c 3 API calls 4411->4415 4413 40674d 18 API calls 4412->4413 4414 405c90 4413->4414 4417 405ca0 LoadImageW 4414->4417 4418 405fbd 21 API calls 4414->4418 4416 405c23 4415->4416 4416->4412 4421 405c47 lstrlenW 4416->4421 4425 40670b CharNextW 4416->4425 4419 405cd0 RegisterClassW 4417->4419 4420 405d4d 4417->4420 4418->4417 4422 405d04 SystemParametersInfoW CreateWindowExW 4419->4422 4423 405cfd 4419->4423 4424 401533 102 API calls 4420->4424 4426 405c57 lstrcmpiW 4421->4426 4427 405c7d 4421->4427 4422->4420 4423->4298 4428 405d53 4424->4428 4429 405c42 4425->4429 4426->4427 4430 405c67 GetFileAttributesW 4426->4430 4431 40666b 3 API calls 4427->4431 4428->4423 4433 405a82 22 API calls 4428->4433 4429->4421 4432 405c73 4430->4432 4434 405c83 4431->4434 4432->4427 4435 406e25 2 API calls 4432->4435 4436 405d60 4433->4436 4507 406c2f lstrcpynW 4434->4507 4435->4427 4438 405d6c ShowWindow 4436->4438 4439 405dee 4436->4439 4441 4062b3 3 API calls 4438->4441 4440 405967 105 API calls 4439->4440 4443 405df4 4440->4443 4442 405d84 4441->4442 4444 405d92 GetClassInfoW 4442->4444 4447 4062b3 3 API calls 4442->4447 4445 405e12 4443->4445 4446 405df8 4443->4446 4449 405da5 GetClassInfoW RegisterClassW 4444->4449 4450 405dbb DialogBoxParamW 4444->4450 4448 401533 102 API calls 4445->4448 4446->4423 4453 401533 102 API calls 4446->4453 4447->4444 4451 405e19 4448->4451 4449->4450 4452 401533 102 API calls 4450->4452 4451->4451 4452->4423 4453->4423 4454->4287 4512 406c2f lstrcpynW 4455->4512 4457 40675e 4458 406cda 4 API calls 4457->4458 4459 406764 4458->4459 4460 403b8d 4459->4460 4461 406e52 5 API calls 4459->4461 4460->4298 4470 406c2f lstrcpynW 4460->4470 4468 406770 4461->4468 4462 4067a0 lstrlenW 4463 4067ac 4462->4463 4462->4468 4465 40666b 3 API calls 4463->4465 4464 4066e4 2 API calls 4464->4468 4466 4067b1 GetFileAttributesW 4465->4466 4466->4460 4467 4067bd 4466->4467 4467->4460 4468->4460 4468->4462 4468->4464 4469 406e25 2 API calls 4468->4469 4469->4462 4470->4332 4471->4300 4473 4037da 4472->4473 4474 4037cc CloseHandle 4472->4474 4475 4037f2 4473->4475 4476 4037e4 CloseHandle 4473->4476 4474->4473 4513 403e16 4475->4513 4476->4475 4481->4341 4482->4352 4484 40682a 4483->4484 4485 40681e CloseHandle 4483->4485 4484->4352 4485->4484 4487 401399 102 API calls 4486->4487 4488 401547 4487->4488 4488->4312 4489->4369 4490->4371 4492 406e34 4491->4492 4493 4034f9 4492->4493 4494 406e3a CharPrevW 4492->4494 4495 406c2f lstrcpynW 4493->4495 4494->4492 4494->4493 4495->4375 4496->4394 4497->4386 4499 405a95 4498->4499 4508 406734 wsprintfW 4499->4508 4501 405b0e 4509 405e1e 4501->4509 4503 405b3c 4503->4410 4504 405b13 4504->4503 4505 405fbd 21 API calls 4504->4505 4505->4504 4506->4406 4507->4412 4508->4501 4510 405fbd 21 API calls 4509->4510 4511 405e2c SetWindowTextW 4510->4511 4511->4504 4512->4457 4514 403e24 4513->4514 4515 4037f7 4514->4515 4516 403e29 FreeLibrary GlobalFree 4514->4516 4517 40682e 4515->4517 4516->4515 4516->4516 4518 40674d 18 API calls 4517->4518 4519 406850 4518->4519 4520 406870 4519->4520 4521 406859 DeleteFileW 4519->4521 4522 403803 OleUninitialize 4520->4522 4524 406990 4520->4524 4556 406c2f lstrcpynW 4520->4556 4521->4522 4522->4309 4522->4310 4524->4522 4526 4066e4 2 API calls 4524->4526 4525 406898 4527 4068b0 4525->4527 4528 4068a2 lstrcatW 4525->4528 4531 4069ad 4526->4531 4530 406e25 2 API calls 4527->4530 4529 4068b6 4528->4529 4532 4068c7 lstrcatW 4529->4532 4534 4068cf lstrlenW FindFirstFileW 4529->4534 4530->4529 4531->4522 4533 4069b1 4531->4533 4532->4534 4535 40666b 3 API calls 4533->4535 4534->4524 4540 4068f8 4534->4540 4536 4069b7 4535->4536 4537 40669a 5 API calls 4536->4537 4538 4069c3 4537->4538 4541 4069e6 4538->4541 4544 4069c7 4538->4544 4539 406972 FindNextFileW 4539->4540 4545 406989 FindClose 4539->4545 4540->4539 4549 40682e 63 API calls 4540->4549 4552 40693e 4540->4552 4557 406c2f lstrcpynW 4540->4557 4543 405e3d 28 API calls 4541->4543 4543->4522 4544->4522 4546 405e3d 28 API calls 4544->4546 4545->4524 4548 4069d3 4546->4548 4550 406352 39 API calls 4548->4550 4549->4552 4551 4069dc 4550->4551 4551->4522 4552->4539 4553 405e3d 28 API calls 4552->4553 4554 405e3d 28 API calls 4552->4554 4555 406352 39 API calls 4552->4555 4558 40669a 4552->4558 4553->4539 4554->4552 4555->4552 4556->4525 4557->4540 4559 406cb2 2 API calls 4558->4559 4561 4066a6 4559->4561 4560 4066c8 4560->4552 4561->4560 4562 4066b6 RemoveDirectoryW 4561->4562 4563 4066be DeleteFileW 4561->4563 4564 4066c4 4562->4564 4563->4564 4564->4560 4565 4066d3 SetFileAttributesW 4564->4565 4565->4560 5232 401c04 5233 403002 21 API calls 5232->5233 5234 401c0e 5233->5234 5235 403002 21 API calls 5234->5235 5236 401bb2 5235->5236 5237 70441000 5238 7044101b 5 API calls 5237->5238 5239 70441019 5238->5239 5240 401b88 5241 40303e 21 API calls 5240->5241 5242 401b8f 5241->5242 5243 40303e 21 API calls 5242->5243 5244 401b98 5243->5244 5245 401ba0 lstrcmpiW 5244->5245 5246 401ba8 lstrcmpW 5244->5246 5247 401bae 5245->5247 5246->5247 5248 404188 5249 4041c5 5248->5249 5250 4041af 5248->5250 5251 4041cf GetDlgItem 5249->5251 5260 404242 5249->5260 5309 406b4f GetDlgItemTextW 5250->5309 5253 4041e7 5251->5253 5257 4041fb SetWindowTextW 5253->5257 5261 406cda 4 API calls 5253->5261 5254 404261 5258 4041c0 5254->5258 5311 406b4f GetDlgItemTextW 5254->5311 5255 4041ba 5256 406e52 5 API calls 5255->5256 5256->5258 5262 40561d 22 API calls 5257->5262 5265 40585e 8 API calls 5258->5265 5260->5254 5264 405fbd 21 API calls 5260->5264 5266 4041f1 5261->5266 5267 404218 5262->5267 5263 404358 5268 40674d 18 API calls 5263->5268 5269 4042bd SHBrowseForFolderW 5264->5269 5270 404519 5265->5270 5266->5257 5274 40666b 3 API calls 5266->5274 5271 40561d 22 API calls 5267->5271 5272 40435e 5268->5272 5269->5254 5273 4042d8 CoTaskMemFree 5269->5273 5275 404223 5271->5275 5312 406c2f lstrcpynW 5272->5312 5277 40666b 3 API calls 5273->5277 5274->5257 5310 405606 SendMessageW 5275->5310 5280 4042e5 5277->5280 5279 404378 5282 4069fb 5 API calls 5279->5282 5283 404322 SetDlgItemTextW 5280->5283 5286 405fbd 21 API calls 5280->5286 5281 404229 5284 4069fb 5 API calls 5281->5284 5291 40437e 5282->5291 5283->5254 5284->5258 5285 4043d3 5313 406c2f lstrcpynW 5285->5313 5287 404303 lstrcmpiW 5286->5287 5287->5283 5289 404317 lstrcatW 5287->5289 5289->5283 5290 4043df 5292 406cda 4 API calls 5290->5292 5291->5285 5296 406e25 2 API calls 5291->5296 5297 40442d 5291->5297 5293 4043e5 GetDiskFreeSpaceW 5292->5293 5295 40440d MulDiv 5293->5295 5293->5297 5295->5297 5296->5291 5298 4044a4 5297->5298 5314 405663 5297->5314 5299 4044cc EnableWindow 5298->5299 5302 401533 102 API calls 5298->5302 5299->5258 5303 4044f5 5299->5303 5301 40448c 5304 404490 5301->5304 5305 4044a6 SetDlgItemTextW 5301->5305 5306 4044ca 5302->5306 5303->5258 5322 40563f SendMessageW 5303->5322 5307 405663 24 API calls 5304->5307 5305->5298 5306->5299 5307->5298 5309->5255 5310->5281 5311->5263 5312->5279 5313->5290 5315 405678 5314->5315 5316 405fbd 21 API calls 5315->5316 5317 405701 5316->5317 5318 405fbd 21 API calls 5317->5318 5319 40570d 5318->5319 5320 405fbd 21 API calls 5319->5320 5321 405719 lstrlenW wsprintfW SetDlgItemTextW 5320->5321 5321->5301 5322->5258 5323 403e8d 5324 403ea2 5323->5324 5325 403fc7 5323->5325 5329 40561d 22 API calls 5324->5329 5326 403fd5 5325->5326 5327 404048 5325->5327 5334 404002 GetDlgItem SendMessageW EnableWindow 5326->5334 5342 404043 5326->5342 5328 404053 GetDlgItem 5327->5328 5327->5342 5331 404075 5328->5331 5332 404116 5328->5332 5333 403f11 5329->5333 5330 40585e 8 API calls 5345 40415b 5330->5345 5338 4040a5 SendMessageW LoadCursorW SetCursor 5331->5338 5331->5342 5336 404127 5332->5336 5332->5342 5335 40561d 22 API calls 5333->5335 5352 40563f SendMessageW 5334->5352 5339 403f20 CheckDlgButton EnableWindow GetDlgItem 5335->5339 5340 404146 5336->5340 5341 40412f SendMessageW 5336->5341 5353 406b08 ShellExecuteExW 5338->5353 5351 405606 SendMessageW 5339->5351 5340->5345 5346 40414b SendMessageW 5340->5346 5341->5340 5342->5330 5346->5345 5347 404108 LoadCursorW SetCursor 5347->5332 5348 403f53 SendMessageW 5349 403f78 SendMessageW SendMessageW lstrlenW SendMessageW SendMessageW 5348->5349 5350 403f6f GetSysColor 5348->5350 5349->5345 5350->5349 5351->5348 5352->5342 5353->5347 5354 401e8e 5355 403002 21 API calls 5354->5355 5356 401e94 IsWindow 5355->5356 5357 401bb2 5356->5357 5358 70441b0a 5359 70441b38 5358->5359 5360 70442351 21 API calls 5359->5360 5361 70441b3f 5360->5361 5362 70441b46 5361->5362 5363 70441b52 5361->5363 5364 704415eb 2 API calls 5362->5364 5365 70441b73 5363->5365 5366 70441b5c 5363->5366 5373 70441b50 5364->5373 5368 70441b9f 5365->5368 5369 70441b79 5365->5369 5367 704415c5 3 API calls 5366->5367 5371 70441b61 5367->5371 5370 704415c5 3 API calls 5368->5370 5372 70441668 3 API calls 5369->5372 5370->5373 5374 70441668 3 API calls 5371->5374 5375 70441b7e 5372->5375 5376 70441b67 5374->5376 5377 704415eb 2 API calls 5375->5377 5378 704415eb 2 API calls 5376->5378 5379 70441b84 GlobalFree 5377->5379 5380 70441b6d GlobalFree 5378->5380 5379->5373 5379->5380 5382 40578f lstrlenW WideCharToMultiByte 4579 405095 4580 4050b4 4579->4580 4581 405236 4579->4581 4580->4581 4582 4050c0 4580->4582 4583 405283 4581->4583 4584 40524a GetDlgItem GetDlgItem 4581->4584 4585 4050c5 SetWindowPos 4582->4585 4586 4050df 4582->4586 4588 4052da 4583->4588 4594 401399 102 API calls 4583->4594 4587 40561d 22 API calls 4584->4587 4589 405222 4585->4589 4590 405132 4586->4590 4591 4050e4 ShowWindow 4586->4591 4593 40526d SetClassLongW 4587->4593 4592 4055eb SendMessageW 4588->4592 4605 405231 4588->4605 4600 40585e 8 API calls 4589->4600 4596 405154 4590->4596 4597 40513a DestroyWindow 4590->4597 4591->4589 4595 405109 GetWindowLongW 4591->4595 4625 4052ec 4592->4625 4598 401533 102 API calls 4593->4598 4599 4052b3 4594->4599 4595->4589 4601 405125 ShowWindow 4595->4601 4602 405159 SetWindowLongW 4596->4602 4603 40516c 4596->4603 4607 40556b 4597->4607 4598->4583 4599->4588 4604 4052b7 SendMessageW 4599->4604 4600->4605 4601->4589 4602->4605 4603->4589 4609 405178 GetDlgItem 4603->4609 4604->4605 4606 401533 102 API calls 4606->4625 4607->4605 4610 40559e ShowWindow 4607->4610 4608 40556d DestroyWindow EndDialog 4608->4607 4611 405194 SendMessageW IsWindowEnabled 4609->4611 4612 4051b7 4609->4612 4610->4605 4611->4605 4613 4051b3 4611->4613 4615 4051c6 4612->4615 4617 405209 SendMessageW 4612->4617 4618 4051d8 4612->4618 4626 4051be 4612->4626 4613->4612 4614 405fbd 21 API calls 4614->4625 4615->4617 4615->4626 4616 405a5b SendMessageW 4619 405207 4616->4619 4617->4589 4620 4051e1 4618->4620 4621 4051ef 4618->4621 4619->4589 4623 401533 102 API calls 4620->4623 4624 401533 102 API calls 4621->4624 4622 40561d 22 API calls 4622->4625 4623->4626 4627 4051f6 4624->4627 4625->4605 4625->4606 4625->4608 4625->4614 4625->4622 4628 40561d 22 API calls 4625->4628 4641 4054ad DestroyWindow 4625->4641 4626->4616 4627->4589 4627->4626 4629 405370 GetDlgItem 4628->4629 4630 405397 ShowWindow KiUserCallbackDispatcher KiUserCallbackDispatcher EnableWindow 4629->4630 4634 40538b 4629->4634 4630->4634 4631 4053ec GetSystemMenu EnableMenuItem SendMessageW 4632 405419 SendMessageW 4631->4632 4631->4634 4632->4634 4634->4630 4634->4631 4635 405e1e 22 API calls 4634->4635 4650 405606 SendMessageW 4634->4650 4651 406c2f lstrcpynW 4634->4651 4635->4634 4637 40544b lstrlenW 4638 405fbd 21 API calls 4637->4638 4639 405465 SetWindowTextW 4638->4639 4640 401399 102 API calls 4639->4640 4640->4625 4641->4607 4642 4054c7 CreateDialogParamW 4641->4642 4642->4607 4643 4054fa 4642->4643 4644 40561d 22 API calls 4643->4644 4645 405505 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4644->4645 4646 401399 102 API calls 4645->4646 4647 40554b 4646->4647 4647->4605 4648 405553 ShowWindow 4647->4648 4649 4055eb SendMessageW 4648->4649 4649->4607 4650->4634 4651->4637 5383 40211b 5384 40303e 21 API calls 5383->5384 5385 402121 5384->5385 5386 405e3d 28 API calls 5385->5386 5387 40212b 5386->5387 5388 4067eb 2 API calls 5387->5388 5389 402131 5388->5389 5390 406629 5 API calls 5389->5390 5392 401709 5389->5392 5395 40215b 5389->5395 5393 40214b 5390->5393 5391 402110 CloseHandle 5391->5392 5393->5395 5396 406734 wsprintfW 5393->5396 5395->5391 5395->5392 5396->5395 4710 40291d 4711 403002 21 API calls 4710->4711 4719 40292e 4711->4719 4712 402aa2 SetFilePointer 4713 402aee 4715 402980 ReadFile 4715->4712 4715->4719 4716 406a5d ReadFile 4716->4719 4717 402a3d 4717->4712 4717->4719 4724 406599 SetFilePointer 4717->4724 4719->4712 4719->4713 4719->4715 4719->4716 4719->4717 4720 402ae4 4719->4720 4721 4029c5 MultiByteToWideChar 4719->4721 4723 4029f6 SetFilePointer MultiByteToWideChar 4719->4723 4733 406734 wsprintfW 4720->4733 4721->4719 4723->4719 4725 4065b5 4724->4725 4728 4065d0 4724->4728 4726 406a5d ReadFile 4725->4726 4727 4065c1 4726->4727 4727->4728 4729 406601 SetFilePointer 4727->4729 4730 4065d9 SetFilePointer 4727->4730 4728->4717 4729->4728 4730->4729 4731 4065e4 4730->4731 4732 406b20 WriteFile 4731->4732 4732->4728 4733->4713 5397 40219d 5398 40303e 21 API calls 5397->5398 5399 4021a4 5398->5399 5400 4069fb 5 API calls 5399->5400 5401 4021b5 5400->5401 5402 4021ce GlobalAlloc 5401->5402 5404 402ea5 5401->5404 5403 4021e3 5402->5403 5402->5404 5405 4069fb 5 API calls 5403->5405 5406 4021ea 5405->5406 5407 4069fb 5 API calls 5406->5407 5409 4021f3 5407->5409 5408 40224e GlobalFree 5408->5404 5409->5408 5414 406734 wsprintfW 5409->5414 5411 402237 5415 406734 wsprintfW 5411->5415 5413 40224c 5413->5408 5414->5411 5415->5413 5416 401aa1 5417 401aa2 5416->5417 5418 40303e 21 API calls 5417->5418 5419 401aa7 5418->5419 5420 40682e 70 API calls 5419->5420 5421 401ab1 5420->5421 5422 404521 GetDlgItem GetDlgItem 5423 404575 7 API calls 5422->5423 5428 40479b 5422->5428 5424 404618 DeleteObject 5423->5424 5425 40460b SendMessageW 5423->5425 5426 404627 5424->5426 5425->5424 5433 405fbd 21 API calls 5426->5433 5434 404665 5426->5434 5427 4048d2 5429 404917 5427->5429 5430 4049ac 5427->5430 5428->5427 5436 40482d 5428->5436 5439 4057dd 5 API calls 5428->5439 5435 404a01 5429->5435 5442 404936 SendMessageW 5429->5442 5431 4049d7 5430->5431 5432 4049bb SendMessageW 5430->5432 5437 4049e1 5431->5437 5453 404a17 5431->5453 5432->5435 5440 40463d SendMessageW SendMessageW 5433->5440 5441 40561d 22 API calls 5434->5441 5438 40585e 8 API calls 5435->5438 5436->5427 5443 4048ba SendMessageW 5436->5443 5444 4049f1 5437->5444 5445 4049ea ImageList_Destroy 5437->5445 5446 404c29 5438->5446 5439->5436 5440->5426 5447 40467d 5441->5447 5442->5435 5448 404953 SendMessageW 5442->5448 5443->5427 5444->5435 5449 4049fa GlobalFree 5444->5449 5445->5444 5450 40561d 22 API calls 5447->5450 5451 40496c 5448->5451 5449->5435 5461 404689 5450->5461 5456 404982 SendMessageW 5451->5456 5452 404bf7 ShowWindow GetDlgItem ShowWindow 5452->5435 5458 4055b9 102 API calls 5453->5458 5469 404be0 5453->5469 5470 404a4e 5453->5470 5454 404768 GetWindowLongW SetWindowLongW 5455 40477e 5454->5455 5457 404785 ShowWindow 5455->5457 5459 404795 5455->5459 5456->5453 5457->5459 5458->5470 5475 405606 SendMessageW 5459->5475 5460 4046e1 SendMessageW 5460->5461 5461->5454 5461->5460 5462 404730 SendMessageW 5461->5462 5463 40471d SendMessageW 5461->5463 5464 404764 5461->5464 5462->5461 5463->5461 5464->5454 5464->5455 5466 404b96 5467 404bb2 InvalidateRect 5466->5467 5472 404bc1 5466->5472 5467->5472 5468 404a8c SendMessageW 5471 404aa6 5468->5471 5469->5435 5469->5452 5470->5468 5470->5470 5470->5471 5471->5466 5473 404b3c SendMessageW SendMessageW 5471->5473 5472->5469 5474 405663 24 API calls 5472->5474 5473->5471 5474->5469 5475->5428 5476 70441aa7 5477 7044156c GlobalFree 5476->5477 5479 70441abf 5477->5479 5478 70441b01 GlobalFree 5479->5478 5480 70441add 5479->5480 5481 70441aed VirtualFree 5479->5481 5480->5478 5481->5478 5482 402ba3 5483 40303e 21 API calls 5482->5483 5484 402bb2 5483->5484 5485 402bc9 5484->5485 5487 40303e 21 API calls 5484->5487 5486 406cb2 2 API calls 5485->5486 5488 402bcf 5486->5488 5487->5485 5510 406a30 GetFileAttributesW CreateFileW 5488->5510 5490 402cb7 5494 402cc0 DeleteFileW 5490->5494 5495 402ccf 5490->5495 5491 402bdc 5491->5490 5492 402c9f 5491->5492 5493 402bfd GlobalAlloc 5491->5493 5497 4032c7 48 API calls 5492->5497 5493->5492 5496 402c1d 5493->5496 5494->5495 5511 403131 SetFilePointer 5496->5511 5499 402cac CloseHandle 5497->5499 5499->5490 5500 402c23 5501 40311b ReadFile 5500->5501 5502 402c2d GlobalAlloc 5501->5502 5503 402c43 5502->5503 5504 402c84 5502->5504 5506 4032c7 48 API calls 5503->5506 5505 406b20 WriteFile 5504->5505 5507 402c93 GlobalFree 5505->5507 5509 402c52 5506->5509 5507->5492 5508 402c7a GlobalFree 5508->5504 5509->5508 5510->5491 5511->5500 5512 402728 5513 4030c1 21 API calls 5512->5513 5514 402732 5513->5514 5515 40303e 21 API calls 5514->5515 5516 40273b 5515->5516 5517 402748 RegQueryValueExW 5516->5517 5520 401709 5516->5520 5518 40276b 5517->5518 5522 402772 5517->5522 5518->5522 5523 406734 wsprintfW 5518->5523 5519 40271c RegCloseKey 5519->5520 5522->5519 5522->5520 5523->5522 5524 402b28 5525 402b2e 5524->5525 5526 402b36 FindClose 5525->5526 5527 402ea1 5525->5527 5526->5527 5528 4025ac 5529 40303e 21 API calls 5528->5529 5530 4025bd 5529->5530 5531 40303e 21 API calls 5530->5531 5532 4025c6 5531->5532 5533 40303e 21 API calls 5532->5533 5534 4025cf GetPrivateProfileStringW 5533->5534 5535 4025f4 5534->5535 5536 401ead 5537 403002 21 API calls 5536->5537 5538 401eb4 5537->5538 5539 403002 21 API calls 5538->5539 5540 401ebd GetDlgItem 5539->5540 3842 4027b0 3852 4030c1 3842->3852 3846 4027c3 3847 4027d5 3846->3847 3851 401709 3846->3851 3848 4027f0 RegEnumValueW 3847->3848 3849 4027e4 RegEnumKeyW 3847->3849 3850 40280e RegCloseKey 3848->3850 3849->3850 3850->3851 3860 40303e 3852->3860 3854 4030d9 3865 4063ed 3854->3865 3857 403002 3858 405fbd 21 API calls 3857->3858 3859 403016 3858->3859 3859->3846 3869 405fbd 3860->3869 3863 403076 3863->3854 3866 4063fc 3865->3866 3867 4027ba 3866->3867 3868 406405 RegOpenKeyExW 3866->3868 3867->3857 3868->3867 3884 405fc8 3869->3884 3870 406213 3871 403067 3870->3871 3908 406c2f lstrcpynW 3870->3908 3871->3863 3886 406e52 3871->3886 3874 4061de lstrlenW 3874->3884 3875 4060de GetSystemDirectoryW 3875->3884 3878 405fbd 15 API calls 3878->3874 3879 4060f4 GetWindowsDirectoryW 3879->3884 3880 405fbd 15 API calls 3880->3884 3882 406e52 5 API calls 3882->3884 3883 406189 lstrcatW 3883->3884 3884->3870 3884->3874 3884->3875 3884->3878 3884->3879 3884->3880 3884->3882 3884->3883 3885 406154 SHGetPathFromIDListW CoTaskMemFree 3884->3885 3895 406a8c 3884->3895 3900 4069fb GetModuleHandleA 3884->3900 3906 406734 wsprintfW 3884->3906 3907 406c2f lstrcpynW 3884->3907 3885->3884 3887 406e67 3886->3887 3889 406eda CharNextW 3887->3889 3890 406ee9 3887->3890 3893 406ec6 CharNextW 3887->3893 3894 406ed5 CharNextW 3887->3894 3912 40670b 3887->3912 3888 406ef1 CharPrevW 3888->3890 3889->3887 3889->3890 3890->3888 3892 406f11 3890->3892 3892->3863 3893->3887 3894->3889 3896 4063ed RegOpenKeyExW 3895->3896 3897 406aba 3896->3897 3898 406ac1 RegQueryValueExW RegCloseKey 3897->3898 3899 406af2 3897->3899 3898->3899 3899->3884 3901 406a13 3900->3901 3902 406a1d GetProcAddress 3900->3902 3909 4062b3 GetSystemDirectoryW 3901->3909 3904 406a2b 3902->3904 3904->3884 3905 406a19 3905->3902 3905->3904 3906->3884 3907->3884 3908->3871 3910 4062d5 wsprintfW LoadLibraryExW 3909->3910 3910->3905 3913 406731 3912->3913 3914 406717 3912->3914 3913->3887 3914->3913 3915 406720 CharNextW 3914->3915 3915->3913 3915->3914 3916 404c33 3917 404c50 GetDlgItem GetDlgItem GetDlgItem 3916->3917 3918 404ddc 3916->3918 3962 405606 SendMessageW 3917->3962 3920 404de4 GetDlgItem CreateThread CloseHandle 3918->3920 3921 404e28 3918->3921 3925 404e10 3920->3925 3996 405967 OleInitialize 3920->3996 3922 404e30 3921->3922 3923 404e59 3921->3923 3922->3925 3926 404e3c ShowWindow ShowWindow 3922->3926 3927 404e61 3923->3927 3928 404ea7 3923->3928 3924 404cc9 3933 404cd0 GetClientRect GetSystemMetrics SendMessageW SendMessageW 3924->3933 3967 40585e 3925->3967 3981 405606 SendMessageW 3926->3981 3931 404e6a 3927->3931 3932 404e7d ShowWindow 3927->3932 3928->3925 3935 404eba SendMessageW 3928->3935 3982 405a5b 3931->3982 3932->3931 3937 404e94 3932->3937 3938 404d20 SendMessageW SendMessageW 3933->3938 3939 404d34 3933->3939 3934 404e1e 3935->3934 3940 404ed8 CreatePopupMenu 3935->3940 3936 404e57 3936->3925 3985 405e3d 3937->3985 3938->3939 3943 404d46 3939->3943 3944 404d3c SendMessageW 3939->3944 3946 405fbd 21 API calls 3940->3946 3963 40561d 3943->3963 3944->3943 3948 404eea AppendMenuW 3946->3948 3947 404d58 3949 404d61 ShowWindow 3947->3949 3950 404d93 GetDlgItem SendMessageW 3947->3950 3951 404f20 TrackPopupMenu 3948->3951 3952 404f0c GetWindowRect 3948->3952 3953 404d82 3949->3953 3954 404d77 ShowWindow 3949->3954 3950->3934 3956 404dbf SendMessageW SendMessageW 3950->3956 3951->3934 3955 404f42 3951->3955 3952->3951 3966 405606 SendMessageW 3953->3966 3954->3953 3957 404f56 SendMessageW 3955->3957 3956->3934 3957->3957 3959 404f72 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3957->3959 3960 404f9e SendMessageW 3959->3960 3960->3960 3961 404fcc GlobalUnlock SetClipboardData CloseClipboard 3960->3961 3961->3934 3962->3924 3964 405fbd 21 API calls 3963->3964 3965 405628 SetDlgItemTextW 3964->3965 3965->3947 3966->3950 3968 40592c 3967->3968 3969 405876 GetWindowLongW 3967->3969 3968->3934 3969->3968 3970 40588b 3969->3970 3970->3968 3971 4058b3 GetSysColor 3970->3971 3972 4058bf 3970->3972 3971->3972 3973 4058c3 SetTextColor 3972->3973 3974 4058cd SetBkMode 3972->3974 3973->3974 3975 4058f5 3974->3975 3976 4058e6 GetSysColor 3974->3976 3977 405906 3975->3977 3978 4058f9 SetBkColor 3975->3978 3976->3975 3977->3968 3979 405916 DeleteObject 3977->3979 3980 40591f CreateBrushIndirect 3977->3980 3978->3977 3979->3980 3980->3968 3981->3936 3983 405a62 3982->3983 3984 405a68 SendMessageW 3982->3984 3983->3984 3984->3936 3986 405e4f 3985->3986 3992 405f05 3985->3992 3987 405e6e lstrlenW 3986->3987 3990 405fbd 21 API calls 3986->3990 3988 405e80 lstrlenW 3987->3988 3989 405ea3 3987->3989 3991 405e95 lstrcatW 3988->3991 3988->3992 3993 405eba 3989->3993 3994 405ead SetWindowTextW 3989->3994 3990->3987 3991->3989 3992->3931 3993->3992 3995 405ebf SendMessageW SendMessageW SendMessageW 3993->3995 3994->3993 3995->3992 4003 4055eb 3996->4003 3998 40598a 4001 4059b1 3998->4001 4006 401399 3998->4006 3999 4055eb SendMessageW 4000 4059c3 OleUninitialize 3999->4000 4001->3999 4004 405603 4003->4004 4005 4055f4 SendMessageW 4003->4005 4004->3998 4005->4004 4007 401413 4006->4007 4009 4013a3 4006->4009 4007->3998 4009->4007 4010 4013df MulDiv SendMessageW 4009->4010 4011 40154a 4009->4011 4010->4009 4012 4015c3 4011->4012 4122 4015ce 4011->4122 4013 4016c1 4012->4013 4014 4017c2 4012->4014 4015 4015e6 4012->4015 4016 4018cb 4012->4016 4017 4016ef 4012->4017 4018 4016af 4012->4018 4019 40182f 4012->4019 4020 401711 4012->4020 4021 401633 SetForegroundWindow 4012->4021 4022 4017d3 4012->4022 4023 4015d5 4012->4023 4024 401618 4012->4024 4025 4015f9 4012->4025 4026 40189b 4012->4026 4027 4018de 4012->4027 4028 40163f 4012->4028 4072 40160c 4012->4072 4012->4122 4035 4016d1 ShowWindow 4013->4035 4036 4016d9 4013->4036 4039 40303e 21 API calls 4014->4039 4038 4015f0 PostQuitMessage 4015->4038 4015->4122 4030 40303e 21 API calls 4016->4030 4037 40303e 21 API calls 4017->4037 4157 406734 wsprintfW 4018->4157 4033 40303e 21 API calls 4019->4033 4040 40303e 21 API calls 4020->4040 4021->4122 4029 40303e 21 API calls 4022->4029 4049 405e3d 28 API calls 4023->4049 4023->4122 4031 403002 21 API calls 4024->4031 4061 401399 85 API calls 4025->4061 4041 40303e 21 API calls 4026->4041 4032 40303e 21 API calls 4027->4032 4056 403002 21 API calls 4028->4056 4028->4122 4042 4017da 4029->4042 4043 4018d2 4030->4043 4045 40161e Sleep 4031->4045 4046 4018e5 4032->4046 4047 401835 GetFullPathNameW 4033->4047 4035->4036 4048 4016e6 ShowWindow 4036->4048 4036->4122 4050 4016f6 SetFileAttributesW 4037->4050 4038->4122 4051 4017c8 4039->4051 4052 401718 4040->4052 4053 4018a2 SearchPathW 4041->4053 4054 40303e 21 API calls 4042->4054 4138 406b6b 4043->4138 4044 405e3d 28 API calls 4044->4122 4045->4122 4064 401906 4046->4064 4065 40190e 4046->4065 4057 401857 4047->4057 4058 40184d 4047->4058 4048->4122 4049->4122 4050->4122 4161 4066e4 FindFirstFileW 4051->4161 4123 406cda CharNextW CharNextW 4052->4123 4053->4122 4062 4017e3 4054->4062 4056->4122 4057->4058 4073 4066e4 2 API calls 4057->4073 4066 401889 GetShortPathNameW 4058->4066 4058->4122 4061->4122 4063 40303e 21 API calls 4062->4063 4068 4017ec MoveFileW 4063->4068 4169 406c2f lstrcpynW 4064->4169 4170 406c2f lstrcpynW 4065->4170 4066->4122 4067 40670b CharNextW 4091 401720 4067->4091 4074 401804 4068->4074 4075 4017f8 4068->4075 4071 401790 4078 405e3d 28 API calls 4071->4078 4072->4044 4079 40186a 4073->4079 4082 4066e4 2 API calls 4074->4082 4074->4122 4075->4072 4076 40190c 4085 406e52 5 API calls 4076->4085 4077 401919 4171 40666b lstrlenW CharPrevW 4077->4171 4081 401797 4078->4081 4079->4058 4168 406c2f lstrcpynW 4079->4168 4137 406c2f lstrcpynW 4081->4137 4089 401814 4082->4089 4116 40192b 4085->4116 4089->4122 4164 406352 MoveFileExW 4089->4164 4090 4017a2 SetCurrentDirectoryW 4090->4122 4091->4067 4093 401769 GetFileAttributesW 4091->4093 4094 401780 4091->4094 4129 406611 4091->4129 4132 405f41 CreateDirectoryW 4091->4132 4158 405f21 CreateDirectoryW 4091->4158 4093->4091 4094->4071 4094->4072 4096 4066e4 2 API calls 4096->4116 4097 401968 4174 406cb2 GetFileAttributesW 4097->4174 4100 40193f CompareFileTime 4100->4116 4101 401a18 4103 405e3d 28 API calls 4101->4103 4102 4019fd 4104 405e3d 28 API calls 4102->4104 4105 401a24 4103->4105 4104->4122 4143 4032c7 4105->4143 4108 401a52 SetFileTime 4110 401a60 CloseHandle 4108->4110 4109 405fbd 21 API calls 4109->4116 4111 401a73 4110->4111 4110->4122 4113 401a78 4111->4113 4114 401a89 4111->4114 4112 406c2f lstrcpynW 4112->4116 4117 405fbd 21 API calls 4113->4117 4115 405fbd 21 API calls 4114->4115 4118 401a91 4115->4118 4116->4023 4116->4096 4116->4097 4116->4100 4116->4101 4116->4102 4116->4109 4116->4112 4142 406a30 GetFileAttributesW CreateFileW 4116->4142 4177 406bbd 4116->4177 4120 401a80 lstrcatW 4117->4120 4121 406bbd MessageBoxIndirectW 4118->4121 4120->4118 4121->4122 4122->4009 4124 406cf8 4123->4124 4128 406d2f 4123->4128 4125 406d07 CharNextW 4124->4125 4126 406d0c 4124->4126 4125->4128 4127 40670b CharNextW 4126->4127 4126->4128 4127->4126 4128->4091 4130 4069fb 5 API calls 4129->4130 4131 406618 4130->4131 4131->4091 4133 405f8c GetLastError 4132->4133 4134 405faf 4132->4134 4133->4134 4135 405f99 SetFileSecurityW 4133->4135 4134->4091 4135->4134 4136 405fb3 GetLastError 4135->4136 4136->4134 4137->4090 4139 406b78 GetTickCount GetTempFileNameW 4138->4139 4140 406bb0 4139->4140 4141 406bac 4139->4141 4140->4122 4141->4139 4141->4140 4142->4116 4144 4032f0 4143->4144 4145 4032d5 SetFilePointer 4143->4145 4181 403148 GetTickCount 4144->4181 4145->4144 4148 401a3a 4148->4108 4148->4110 4151 403148 46 API calls 4152 403329 4151->4152 4152->4148 4153 403391 ReadFile 4152->4153 4156 403338 4152->4156 4153->4148 4154 406a5d ReadFile 4154->4156 4156->4148 4156->4154 4196 406b20 WriteFile 4156->4196 4157->4122 4159 405f33 GetLastError 4158->4159 4160 405f3b 4158->4160 4159->4160 4160->4091 4162 406705 4161->4162 4163 4066fa FindClose 4161->4163 4162->4122 4163->4162 4165 406366 4164->4165 4167 406373 4164->4167 4232 40641b 4165->4232 4167->4075 4168->4058 4169->4076 4170->4077 4172 40191f lstrcatW 4171->4172 4173 406688 lstrcatW 4171->4173 4172->4076 4173->4172 4175 406cd4 4174->4175 4176 406cc4 SetFileAttributesW 4174->4176 4175->4116 4176->4175 4178 406bd2 4177->4178 4179 406c20 4178->4179 4180 406be8 MessageBoxIndirectW 4178->4180 4179->4116 4180->4179 4182 4032b3 4181->4182 4183 403173 4181->4183 4185 4033e9 36 API calls 4182->4185 4198 403131 SetFilePointer 4183->4198 4191 40329a 4185->4191 4186 40317e SetFilePointer 4190 4031a5 4186->4190 4190->4191 4192 406b20 WriteFile 4190->4192 4193 4032a4 SetFilePointer 4190->4193 4199 406fbd 4190->4199 4207 40311b 4190->4207 4210 4033e9 4190->4210 4191->4148 4194 406a5d ReadFile 4191->4194 4192->4190 4193->4182 4195 403312 4194->4195 4195->4148 4195->4151 4197 406b41 4196->4197 4197->4156 4198->4186 4200 406fe8 4199->4200 4204 406fe0 4199->4204 4201 407123 4200->4201 4202 407109 GlobalAlloc 4200->4202 4203 4070ff GlobalFree 4200->4203 4200->4204 4201->4201 4201->4204 4205 407196 GlobalAlloc 4201->4205 4206 40718f GlobalFree 4201->4206 4202->4201 4202->4204 4203->4202 4204->4190 4205->4204 4206->4205 4208 406a5d ReadFile 4207->4208 4209 40312e 4208->4209 4209->4190 4211 403411 4210->4211 4212 4033f8 4210->4212 4215 403423 GetTickCount 4211->4215 4216 40341a 4211->4216 4213 403401 DestroyWindow 4212->4213 4214 403408 4212->4214 4213->4214 4214->4190 4218 403431 4215->4218 4219 40348d 4215->4219 4227 406324 4216->4227 4221 403468 CreateDialogParamW ShowWindow 4218->4221 4222 40343a 4218->4222 4219->4190 4221->4219 4222->4219 4231 4033cb MulDiv 4222->4231 4224 403448 wsprintfW 4225 405e3d 28 API calls 4224->4225 4226 403466 4225->4226 4226->4190 4228 406336 PeekMessageW 4227->4228 4229 40632c DispatchMessageW 4228->4229 4230 403421 4228->4230 4229->4228 4230->4190 4231->4224 4233 406471 GetShortPathNameW 4232->4233 4234 40644b 4232->4234 4236 406551 4233->4236 4237 406486 4233->4237 4259 406a30 GetFileAttributesW CreateFileW 4234->4259 4236->4167 4237->4236 4239 40648e wsprintfA 4237->4239 4238 406455 CloseHandle GetShortPathNameW 4238->4236 4240 406469 4238->4240 4241 405fbd 21 API calls 4239->4241 4240->4233 4240->4236 4242 4064b7 4241->4242 4260 406a30 GetFileAttributesW CreateFileW 4242->4260 4244 4064c4 4244->4236 4245 4064cf GetFileSize GlobalAlloc 4244->4245 4246 40654a CloseHandle 4245->4246 4247 4064ee 4245->4247 4246->4236 4248 406a5d ReadFile 4247->4248 4249 4064f6 4248->4249 4249->4246 4261 406c4b lstrlenA lstrlenA 4249->4261 4252 406556 4254 406c4b 3 API calls 4252->4254 4253 406509 lstrcpyA 4256 40651b 4253->4256 4254->4256 4255 40652c SetFilePointer 4257 406b20 WriteFile 4255->4257 4256->4255 4258 406543 GlobalFree 4257->4258 4258->4246 4259->4238 4260->4244 4262 406505 4261->4262 4263 406c6a 4261->4263 4262->4252 4262->4253 4263->4262 4264 406c97 lstrlenA 4263->4264 4264->4262 4264->4263 5541 405036 5542 405042 5541->5542 5543 40505a 5541->5543 5551 406b4f GetDlgItemTextW 5542->5551 5544 405060 SHGetPathFromIDListW 5543->5544 5545 40508e 5543->5545 5547 405070 5544->5547 5550 40504f SendMessageW 5544->5550 5549 401533 102 API calls 5547->5549 5549->5550 5550->5545 5551->5550 5552 401ab6 5553 40303e 21 API calls 5552->5553 5554 401abd 5553->5554 5555 406bbd MessageBoxIndirectW 5554->5555 5556 401709 5555->5556 5557 402837 5558 40303e 21 API calls 5557->5558 5561 401afd 5558->5561 5560 402855 5561->5557 5561->5560 5562 406a30 GetFileAttributesW CreateFileW 5561->5562 5562->5561 5563 401fb8 GetDC 5564 403002 21 API calls 5563->5564 5565 401fc8 GetDeviceCaps MulDiv ReleaseDC 5564->5565 5566 403002 21 API calls 5565->5566 5567 401ff8 5566->5567 5568 405fbd 21 API calls 5567->5568 5569 402032 CreateFontIndirectW 5568->5569 5570 401dba 5571 403002 21 API calls 5570->5571 5572 401dc1 5571->5572 5573 403002 21 API calls 5572->5573 5574 401dce 5573->5574 5575 401de1 5574->5575 5576 40303e 21 API calls 5574->5576 5577 401df6 5575->5577 5580 40303e 21 API calls 5575->5580 5576->5575 5578 401e50 5577->5578 5579 401e01 5577->5579 5582 40303e 21 API calls 5578->5582 5581 403002 21 API calls 5579->5581 5580->5577 5583 401e06 5581->5583 5584 401e55 5582->5584 5585 403002 21 API calls 5583->5585 5586 40303e 21 API calls 5584->5586 5587 401e11 5585->5587 5588 401e5e FindWindowExW 5586->5588 5589 401e41 SendMessageW 5587->5589 5590 401e1e SendMessageTimeoutW 5587->5590 5591 401e7b 5588->5591 5589->5591 5590->5591 5592 70442ebf 5593 70442ed7 5592->5593 5594 70441309 2 API calls 5593->5594 5595 70442ef2 5594->5595 5596 401bbb 5597 40303e 21 API calls 5596->5597 5598 401bc4 ExpandEnvironmentStringsW 5597->5598 5599 401bd7 5598->5599 5601 401be9 5598->5601 5600 401bdd lstrcmpW 5599->5600 5599->5601 5600->5601 5602 7044103a 5603 70441052 5602->5603 5604 704410c5 5603->5604 5605 70441081 5603->5605 5606 70441061 5603->5606 5607 7044156c GlobalFree 5605->5607 5608 7044156c GlobalFree 5606->5608 5609 70441079 5607->5609 5610 70441072 5608->5610 5611 70441091 GlobalSize 5609->5611 5613 7044109a 5609->5613 5612 7044156c GlobalFree 5610->5612 5611->5613 5612->5609 5614 704410af 5613->5614 5615 7044109e GlobalAlloc 5613->5615 5617 704410b8 GlobalFree 5614->5617 5616 704415c5 3 API calls 5615->5616 5616->5614 5617->5604

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 403804-40384d SetErrorMode GetVersionExW 1 403886 0->1 2 40384f-40386f GetVersionExW 0->2 5 40388d-403892 1->5 3 403871-403875 2->3 4 403882-403884 2->4 6 403878-403880 3->6 4->6 7 403894-40389d 5->7 8 40389f 5->8 6->5 9 4038a3-4038e5 7->9 8->9 10 4038e7-4038ef call 4069fb 9->10 11 4038f8 9->11 10->11 16 4038f1 10->16 13 4038fd-40390f call 4062b3 lstrlenA 11->13 18 403911-40392d call 4069fb * 3 13->18 16->11 25 40393e-4039d7 #17 OleInitialize SHGetFileInfoW call 406c2f GetCommandLineW call 406c2f call 40670b CharNextW 18->25 26 40392f-403935 18->26 35 403ab4-403ace GetTempPathW call 403da8 25->35 36 4039dd 25->36 26->25 30 403937 26->30 30->25 44 403ad0-403aee GetWindowsDirectoryW lstrcatW call 403da8 35->44 45 403b26-403b40 DeleteFileW call 40348f 35->45 38 4039df-4039e5 36->38 40 4039f2-4039fd 38->40 41 4039e7-4039f0 38->41 42 403a08-403a17 40->42 43 4039ff-403a06 40->43 41->40 41->41 47 403a74-403a88 call 40670b 42->47 48 403a19-403a25 42->48 43->42 44->45 62 403af0-403b20 GetTempPathW lstrcatW SetEnvironmentVariableW * 2 call 403da8 44->62 56 403b42-403b48 45->56 57 403bb7 45->57 63 403a90-403a96 47->63 64 403a8a-403a8d 47->64 51 403a27-403a2e 48->51 52 403a3f-403a45 48->52 58 403a30-403a33 51->58 59 403a35 51->59 60 403a63-403a6a 52->60 61 403a47-403a4e 52->61 65 403ba9-403bb0 call 405b41 56->65 66 403b4a-403b5c call 40670b 56->66 67 403bb9-403bc6 call 4037c2 OleUninitialize 57->67 58->52 58->59 59->52 60->47 69 403a6c-403a72 60->69 61->60 68 403a50-403a57 61->68 62->45 62->57 63->35 71 403a98-403a9b 63->71 64->63 79 403bb5 65->79 83 403b72-403b74 66->83 84 403bcc-403bd9 call 406bbd ExitProcess 67->84 85 403d0f-403d16 67->85 75 403a59-403a5c 68->75 76 403a5e 68->76 69->47 77 403aa0-403aaf call 406c2f 69->77 71->38 75->60 75->76 76->60 77->35 79->57 86 403b76-403b7d 83->86 87 403b5e-403b64 83->87 89 403d94-403da2 85->89 90 403d18-403d2e GetCurrentProcess OpenProcessToken 85->90 95 403bdf-403bf7 call 406611 lstrcatW 86->95 96 403b7f-403b8f call 40674d 86->96 93 403b66-403b6d 87->93 94 403b6f 87->94 91 403d30-403d5e LookupPrivilegeValueW AdjustTokenPrivileges 90->91 92 403d64-403d72 call 4069fb 90->92 91->92 106 403d80-403d8b ExitWindowsEx 92->106 107 403d74-403d7e 92->107 93->86 93->94 94->83 104 403c08-403c29 lstrcatW lstrcmpiW 95->104 105 403bf9-403c03 lstrcatW 95->105 96->57 108 403b91-403ba7 call 406c2f * 2 96->108 104->57 109 403c2b-403c32 104->109 105->104 106->89 110 403d8d-403d8f call 401533 106->110 107->106 107->110 108->65 113 403c34-403c39 call 405f41 109->113 114 403c3b call 405f21 109->114 110->89 122 403c40-403c54 SetCurrentDirectoryW 113->122 114->122 123 403c65-403c81 call 406c2f 122->123 124 403c56-403c60 call 406c2f 122->124 128 403c82-403ca0 call 405fbd DeleteFileW 123->128 124->123 131 403ca2-403cb6 CopyFileW 128->131 132 403cef-403cf9 128->132 131->132 133 403cb8-403ce4 call 406352 call 405fbd call 4067eb 131->133 132->128 134 403cfb-403d0a call 406352 132->134 133->132 143 403ce6-403ced CloseHandle 133->143 134->67 143->132
                          APIs
                          • SetErrorMode.KERNELBASE(00008001), ref: 00403820
                          • GetVersionExW.KERNEL32 ref: 00403849
                          • GetVersionExW.KERNEL32(?), ref: 0040385C
                          • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403904
                          • #17.COMCTL32(00000008,0000000A,0000000C), ref: 0040393E
                          • OleInitialize.OLE32(00000000), ref: 00403945
                          • SHGetFileInfoW.SHELL32(004085D4,00000000,?,000002B4,00000000), ref: 00403964
                          • GetCommandLineW.KERNEL32(00428D40,NSIS Error), ref: 00403979
                          • CharNextW.USER32(00000000,"C:\Users\user\Desktop\-pdf.bat.exe",?,"C:\Users\user\Desktop\-pdf.bat.exe",00000000), ref: 004039C5
                          • GetTempPathW.KERNEL32(00000400,C:\Users\user~1\AppData\Local\Temp\), ref: 00403AC5
                          • GetWindowsDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,000003FB), ref: 00403AD6
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 00403AE2
                          • GetTempPathW.KERNEL32(000003FC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,\Temp), ref: 00403AF6
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403AFE
                          • SetEnvironmentVariableW.KERNEL32(TEMP,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,Low), ref: 00403B0F
                          • SetEnvironmentVariableW.KERNEL32(TMP,C:\Users\user~1\AppData\Local\Temp\), ref: 00403B17
                          • DeleteFileW.KERNELBASE(1033), ref: 00403B31
                            • Part of subcall function 0040348F: GetTickCount.KERNEL32 ref: 004034A1
                            • Part of subcall function 0040348F: GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\-pdf.bat.exe,00000400), ref: 004034BD
                          • OleUninitialize.OLE32(?), ref: 00403BBE
                          • ExitProcess.KERNEL32 ref: 00403BD9
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\-pdf.bat.exe",00000000,?), ref: 00403BF0
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,00408624,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\-pdf.bat.exe",00000000,?), ref: 00403C03
                          • lstrcatW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,.tmp,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\-pdf.bat.exe",00000000,?), ref: 00403C12
                          • lstrcmpiW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user\Desktop,C:\Users\user~1\AppData\Local\Temp\,.tmp,C:\Users\user~1\AppData\Local\Temp\,~nsu,"C:\Users\user\Desktop\-pdf.bat.exe",00000000,?), ref: 00403C21
                          • SetCurrentDirectoryW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\), ref: 00403C45
                          • DeleteFileW.KERNEL32(004209F0,004209F0,?,0042A000,?), ref: 00403C9C
                          • CopyFileW.KERNEL32(C:\Users\user\Desktop\-pdf.bat.exe,004209F0,00000001), ref: 00403CAE
                          • CloseHandle.KERNEL32(00000000,004209F0,004209F0,?,004209F0,00000000), ref: 00403CE7
                          • GetCurrentProcess.KERNEL32(00000028,?), ref: 00403D1F
                          • OpenProcessToken.ADVAPI32(00000000), ref: 00403D26
                          • LookupPrivilegeValueW.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403D3B
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 00403D5E
                          • ExitWindowsEx.USER32(00000002,80040002), ref: 00403D83
                            • Part of subcall function 0040670B: CharNextW.USER32(?,004039C4,"C:\Users\user\Desktop\-pdf.bat.exe",?,"C:\Users\user\Desktop\-pdf.bat.exe",00000000), ref: 00406721
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Filelstrcat$Process$CharCurrentDeleteDirectoryEnvironmentExitNextPathTempTokenVariableVersionWindows$AdjustCloseCommandCopyCountErrorHandleInfoInitializeLineLookupModeModuleNameOpenPrivilegePrivilegesTickUninitializeValuelstrcmpilstrlen
                          • String ID: "C:\Users\user\Desktop\-pdf.bat.exe"$.tmp$1033$C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\AppData\Local\Anvilled$C:\Users\user\AppData\Local\Anvilled$C:\Users\user\Desktop$C:\Users\user\Desktop\-pdf.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                          • API String ID: 354787867-3180056700
                          • Opcode ID: 0ecbbf3be232c534373af848fddc9e6d681202fbfdc88adff2eb4d376a06b390
                          • Instruction ID: ea8d09071dbbbb8128f2a3040c0526679499edfae626c6519bb85817cf976ccd
                          • Opcode Fuzzy Hash: 0ecbbf3be232c534373af848fddc9e6d681202fbfdc88adff2eb4d376a06b390
                          • Instruction Fuzzy Hash: 8DD116716443116AD7207F619D46B3B7AACEF4874AF41443FF982B62D2DABC8E40872D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 144 404c33-404c4a 145 404c50-404d1e GetDlgItem * 3 call 405606 call 405938 GetClientRect GetSystemMetrics SendMessageW * 2 144->145 146 404ddc-404de2 144->146 170 404d20-404d32 SendMessageW * 2 145->170 171 404d34-404d3a 145->171 148 404de4-404e0a GetDlgItem CreateThread CloseHandle 146->148 149 404e28-404e2e 146->149 153 404e10-404e19 call 40585e 148->153 150 404e30-404e3a 149->150 151 404e59-404e5f 149->151 150->153 154 404e3c-404e57 ShowWindow * 2 call 405606 150->154 155 404e61-404e68 151->155 156 404ea7-404eaa 151->156 163 404e1e-404e25 153->163 154->153 160 404e6a-404e74 155->160 161 404e7d-404e92 ShowWindow 155->161 156->153 164 404eb0-404eb4 156->164 167 404e76-404e7b call 405a5b 160->167 168 404ea3-404ea5 161->168 169 404e94-404e9e call 405e3d 161->169 164->153 165 404eba-404ed2 SendMessageW 164->165 172 404fe8-404fea 165->172 173 404ed8-404f0a CreatePopupMenu call 405fbd AppendMenuW 165->173 167->153 168->167 169->168 170->171 176 404d46-404d5f call 40561d 171->176 177 404d3c-404d44 SendMessageW 171->177 172->163 185 404f20-404f3c TrackPopupMenu 173->185 186 404f0c-404f1c GetWindowRect 173->186 183 404d61-404d75 ShowWindow 176->183 184 404d93-404db9 GetDlgItem SendMessageW 176->184 177->176 187 404d82 183->187 188 404d77-404d80 ShowWindow 183->188 184->172 190 404dbf-404dd7 SendMessageW * 2 184->190 185->172 189 404f42-404f4e 185->189 186->185 191 404d88-404d8e call 405606 187->191 188->191 192 404f56-404f70 SendMessageW 189->192 190->172 191->184 192->192 194 404f72-404f9c OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 192->194 195 404f9e-404fca SendMessageW 194->195 195->195 196 404fcc-404fe2 GlobalUnlock SetClipboardData CloseClipboard 195->196 196->172
                          APIs
                          • GetDlgItem.USER32(?,00000403), ref: 00404C94
                          • GetDlgItem.USER32(?,000003EE), ref: 00404CA4
                          • GetClientRect.USER32(00000000,?), ref: 00404CE1
                          • GetSystemMetrics.USER32(00000002), ref: 00404CE9
                          • SendMessageW.USER32(00000000,00001061,00000000,00000002), ref: 00404D0B
                          • SendMessageW.USER32(00000000,00001036,00004000,00004000), ref: 00404D1A
                          • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00404D28
                          • SendMessageW.USER32(00000000,00001026,00000000,?), ref: 00404D32
                            • Part of subcall function 00405FBD: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,?,00403466), ref: 0040618F
                          • SendMessageW.USER32(00000000,00001024,00000000,?), ref: 00404D44
                          • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00404D68
                          • ShowWindow.USER32(00000000,00000008), ref: 00404D7A
                          • GetDlgItem.USER32(?,000003EC), ref: 00404D9C
                          • SendMessageW.USER32(00000000,00000401,00000000,75300000), ref: 00404DB0
                          • SendMessageW.USER32(00000000,00000409,00000000,?), ref: 00404DCB
                          • SendMessageW.USER32(00000000,00002001,00000000,?), ref: 00404DD5
                          • ShowWindow.USER32(00000000), ref: 00404E4A
                          • ShowWindow.USER32(?,00000008), ref: 00404E4F
                          • GetDlgItem.USER32(?,000003F8), ref: 00404CB4
                            • Part of subcall function 00405606: SendMessageW.USER32(00000028,?,00000001,0040543B), ref: 00405614
                          • GetDlgItem.USER32(?,000003EC), ref: 00404DF5
                          • CreateThread.KERNELBASE(00000000,00000000,Function_00005967,00000000), ref: 00404E03
                          • CloseHandle.KERNELBASE(00000000), ref: 00404E0A
                          • ShowWindow.USER32(00000008), ref: 00404E85
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00404EC4
                          • CreatePopupMenu.USER32 ref: 00404ED8
                          • AppendMenuW.USER32(?,00000000,00000001,00000000), ref: 00404EF4
                          • GetWindowRect.USER32(?,?), ref: 00404F12
                          • TrackPopupMenu.USER32(?,00000180,?,?,00000000,?,00000000), ref: 00404F34
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00404F63
                          • OpenClipboard.USER32(00000000), ref: 00404F73
                          • EmptyClipboard.USER32 ref: 00404F79
                          • GlobalAlloc.KERNEL32(00000042,00000000), ref: 00404F85
                          • GlobalLock.KERNEL32(00000000), ref: 00404F92
                          • SendMessageW.USER32(?,00001073,00000000,?), ref: 00404FAE
                          • GlobalUnlock.KERNEL32(?), ref: 00404FD1
                          • SetClipboardData.USER32(0000000D,?), ref: 00404FDC
                          • CloseClipboard.USER32 ref: 00404FE2
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlocklstrcat
                          • String ID:
                          • API String ID: 2901622961-0
                          • Opcode ID: ea1a75e568242b9c33b2ed96f24b2eced80ea02c800ea097d1b7c8c4f431d408
                          • Instruction ID: c1dd0ba4c6afa04db5033a3826b5e43042ec5fa9b8d6c5df5c2cdf9d5ac6668d
                          • Opcode Fuzzy Hash: ea1a75e568242b9c33b2ed96f24b2eced80ea02c800ea097d1b7c8c4f431d408
                          • Instruction Fuzzy Hash: 63A1B3B1644304ABD320AB65DD49F5B7FADFF88750F00093EF685A62E1CB789841CB69

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 715 40682e-406857 call 40674d 718 406870-40687a 715->718 719 406859-40686b DeleteFileW 715->719 721 40687c-40687e 718->721 722 40688d-4068a0 call 406c2f 718->722 720 4069ef-4069f8 719->720 723 406884-406887 721->723 724 4069de-4069e4 721->724 730 4068b0-4068b1 call 406e25 722->730 731 4068a2-4068ae lstrcatW 722->731 723->722 727 4069a7-4069af call 4066e4 723->727 726 4069ee 724->726 726->720 727->726 737 4069b1-4069c5 call 40666b call 40669a 727->737 732 4068b6-4068bb 730->732 731->732 735 4068c7-4068cd lstrcatW 732->735 736 4068bd-4068c5 732->736 738 4068cf-4068f2 lstrlenW FindFirstFileW 735->738 736->735 736->738 751 4069e6-4069e9 call 405e3d 737->751 752 4069c7-4069c9 737->752 740 406990-406995 738->740 741 4068f8-4068fa 738->741 740->726 743 406997-4069a5 740->743 744 4068fb-406900 741->744 743->724 743->727 746 406902-406908 744->746 747 406919-40692c call 406c2f 744->747 749 406972-406983 FindNextFileW 746->749 750 40690a-40690f 746->750 760 406940-406949 call 40669a 747->760 761 40692e-406935 747->761 749->744 758 406989-40698a FindClose 749->758 750->747 755 406911-406917 750->755 751->726 752->724 756 4069cb-4069dc call 405e3d call 406352 752->756 755->747 755->749 756->726 758->740 769 40696a-40696d call 405e3d 760->769 770 40694b-40694d 760->770 761->749 764 406937-406939 call 40682e 761->764 768 40693e 764->768 768->749 769->749 772 406962-406968 770->772 773 40694f-406960 call 405e3d call 406352 770->773 772->749 773->749
                          APIs
                            • Part of subcall function 0040674D: lstrlenW.KERNEL32(00425A78,00000000,00425A78,00425A78,00000000,?,?,00406850,?,00000000,771B3420,00000000), ref: 004067A1
                            • Part of subcall function 0040674D: GetFileAttributesW.KERNEL32(00425A78,00425A78), ref: 004067B2
                          • DeleteFileW.KERNELBASE(?,?,00000000,771B3420,00000000), ref: 0040685A
                          • lstrcatW.KERNEL32(00425278,\*.*,00425278,?,00000000,?,00000000,771B3420,00000000), ref: 004068AC
                          • lstrcatW.KERNEL32(?,004082B0,?,00425278,?,00000000,?,00000000,771B3420,00000000), ref: 004068CD
                          • lstrlenW.KERNEL32(?), ref: 004068D0
                          • FindFirstFileW.KERNEL32(00425278,?), ref: 004068E7
                          • FindNextFileW.KERNEL32(00000000,00000010,000000F2,?,?,?), ref: 00406978
                          • FindClose.KERNEL32(00000000), ref: 0040698A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: File$Find$lstrcatlstrlen$AttributesCloseDeleteFirstNext
                          • String ID: \*.*
                          • API String ID: 2636146433-1173974218
                          • Opcode ID: 463e512100b669bbf7148d43155592073aa84a6e49227fc6e470d5d44a4eaa6f
                          • Instruction ID: 1679f268d6f2e5967709a76d03bf4fa32a028c009496777b7310e2c01a678238
                          • Opcode Fuzzy Hash: 463e512100b669bbf7148d43155592073aa84a6e49227fc6e470d5d44a4eaa6f
                          • Instruction Fuzzy Hash: DD413871105711A9D320BB358D05A7B76A8DF41314F16093FF893B25D1EB3C8D6686BE
                          APIs
                          • FindFirstFileW.KERNELBASE(00000000,00427678,00000000,00406791,00425A78), ref: 004066EF
                          • FindClose.KERNEL32(00000000), ref: 004066FB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID: xvB
                          • API String ID: 2295610775-1142169142
                          • Opcode ID: d8979bb77e590fa5ef2a9612d96aa81559f91ada1dd450823ce235b6f1bcece9
                          • Instruction ID: e316ebd25e92877113dce2226e0b75b13365ed97af6927094cd3affcf016b760
                          • Opcode Fuzzy Hash: d8979bb77e590fa5ef2a9612d96aa81559f91ada1dd450823ce235b6f1bcece9
                          • Instruction Fuzzy Hash: 17D0127150A1209BD2401778AE0C85B7A59AF153757524B36F0A6F21E0E7348C6286AC

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 197 405095-4050ae 198 4050b4-4050ba 197->198 199 405236-405248 197->199 198->199 200 4050c0-4050c3 198->200 201 405290-4052a4 199->201 202 40524a-40528a GetDlgItem * 2 call 40561d SetClassLongW call 401533 199->202 203 4050c5-4050da SetWindowPos 200->203 204 4050df-4050e2 200->204 206 4052e2-4052e7 call 4055eb 201->206 207 4052a6-4052a8 201->207 202->201 210 405222 203->210 211 405132-405138 204->211 212 4050e4-405103 ShowWindow 204->212 219 4052ec-40530b 206->219 208 4052da-4052dc 207->208 209 4052aa-4052b5 call 401399 207->209 208->206 216 4055ad 208->216 209->208 233 4052b7-4052d5 SendMessageW 209->233 217 405226-405231 call 40585e 210->217 220 405154-405157 211->220 221 40513a-40514f DestroyWindow 211->221 212->217 218 405109-40511f GetWindowLongW 212->218 231 4055af-4055b6 216->231 217->231 218->217 225 405125-40512d ShowWindow 218->225 226 40530d-405318 call 401533 219->226 227 40531e-405324 219->227 229 405159-405167 SetWindowLongW 220->229 230 40516c-405172 220->230 228 405591-405598 221->228 225->217 226->227 237 40532a-40532c 227->237 238 40556d-405586 DestroyWindow EndDialog 227->238 228->216 236 40559a-40559c 228->236 229->231 230->210 239 405178-405192 GetDlgItem 230->239 233->231 236->216 242 40559e-4055a7 ShowWindow 236->242 237->238 243 405332-405389 call 405fbd call 40561d * 3 GetDlgItem 237->243 240 40558c 238->240 244 405194-4051ad SendMessageW IsWindowEnabled 239->244 245 4051b7-4051bc 239->245 240->228 242->216 273 405397-4053e6 ShowWindow KiUserCallbackDispatcher * 2 EnableWindow 243->273 274 40538b-405393 243->274 244->216 246 4051b3 244->246 247 4051c1-4051c4 245->247 248 4051be-4051bf 245->248 246->245 251 4051d3-4051d6 247->251 252 4051c6-4051cd 247->252 250 405202-405207 call 405a5b 248->250 250->217 256 405209-40521c SendMessageW 251->256 258 4051d8-4051df 251->258 252->256 257 4051cf-4051d1 252->257 256->210 257->250 261 4051e1-4051ed call 401533 258->261 262 4051ef-4051f8 call 401533 258->262 270 405200 261->270 262->217 271 4051fa 262->271 270->250 271->270 275 4053e8-4053e9 273->275 276 4053eb 273->276 274->273 277 4053ec-405417 GetSystemMenu EnableMenuItem SendMessageW 275->277 276->277 278 405430 277->278 279 405419-40542e SendMessageW 277->279 280 405436-40547c call 405606 call 405e1e call 406c2f lstrlenW call 405fbd SetWindowTextW call 401399 278->280 279->280 280->219 291 405482-405484 280->291 291->219 292 40548a-40548e 291->292 293 405490-405496 292->293 294 4054ad-4054c1 DestroyWindow 292->294 293->216 295 40549c-4054a2 293->295 294->240 296 4054c7-4054f4 CreateDialogParamW 294->296 295->219 297 4054a8 295->297 296->228 298 4054fa-405551 call 40561d GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401399 296->298 297->216 298->216 303 405553-405566 ShowWindow call 4055eb 298->303 305 40556b 303->305 305->240
                          APIs
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 004050D4
                          • ShowWindow.USER32(?), ref: 004050FE
                          • GetWindowLongW.USER32(?,000000F0), ref: 0040510F
                          • ShowWindow.USER32(?,00000004), ref: 0040512B
                          • GetDlgItem.USER32(?,00000001), ref: 00405252
                          • GetDlgItem.USER32(?,00000002), ref: 0040525C
                          • SetClassLongW.USER32(?,000000F2,?), ref: 00405276
                          • SendMessageW.USER32(0000040F,00000000,00000001,?), ref: 004052C4
                          • GetDlgItem.USER32(?,00000003), ref: 00405373
                          • ShowWindow.USER32(00000000,?), ref: 0040539C
                          • KiUserCallbackDispatcher.NTDLL(?,?), ref: 004053B0
                          • KiUserCallbackDispatcher.NTDLL(?), ref: 004053C4
                          • EnableWindow.USER32(?), ref: 004053DC
                          • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 004053F3
                          • EnableMenuItem.USER32(00000000), ref: 004053FA
                          • SendMessageW.USER32(?,000000F4,00000000,00000001), ref: 0040540B
                          • SendMessageW.USER32(?,00000401,00000002,00000000), ref: 00405422
                          • lstrlenW.KERNEL32(00421200,?,00421200,00000000), ref: 00405453
                            • Part of subcall function 00405FBD: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,?,00403466), ref: 0040618F
                          • SetWindowTextW.USER32(?,00421200), ref: 0040546B
                            • Part of subcall function 00401399: MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                            • Part of subcall function 00401399: SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                          • DestroyWindow.USER32(?,00000000), ref: 004054B3
                          • CreateDialogParamW.USER32(?,?,-00429D60), ref: 004054E7
                            • Part of subcall function 0040561D: SetDlgItemTextW.USER32(?,?,00000000), ref: 00405637
                          • GetDlgItem.USER32(?,000003FA), ref: 00405510
                          • GetWindowRect.USER32(00000000), ref: 00405517
                          • ScreenToClient.USER32(?,?), ref: 00405523
                          • SetWindowPos.USER32(00000000,?,?,00000000,00000000,00000015), ref: 0040553C
                          • ShowWindow.USER32(00000008,?,00000000), ref: 0040555B
                            • Part of subcall function 004055EB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004055FD
                          • ShowWindow.USER32(?,0000000A), ref: 004055A1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Window$Item$MessageSendShow$CallbackDispatcherEnableLongMenuTextUser$ClassClientCreateDestroyDialogParamRectScreenSystemlstrcatlstrlen
                          • String ID:
                          • API String ID: 162979904-0
                          • Opcode ID: ba739dc4ba6d18f16267d183e3e068b8daf47d42d4500b1c76a39e8f7c61ad0f
                          • Instruction ID: dde6768bf825ec23dd98222ce6025154883a759c232661181bb8438464b7c65b
                          • Opcode Fuzzy Hash: ba739dc4ba6d18f16267d183e3e068b8daf47d42d4500b1c76a39e8f7c61ad0f
                          • Instruction Fuzzy Hash: F2D1DD71601A10BBDB206F21ED48E2B7BA9FF58355F80493EF545B21E1CA388852DF6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 306 405b41-405b5c call 4069fb 309 405b70-405ba6 call 406a8c 306->309 310 405b5e-405b6e call 406734 306->310 315 405ba8-405bb9 call 406a8c 309->315 316 405bbe-405bc4 lstrcatW 309->316 319 405bc9-405bf2 call 405a82 call 40674d 310->319 315->316 316->319 324 405bf8-405bfd 319->324 325 405c8a-405c92 call 40674d 319->325 324->325 327 405c03-405c2c call 406a8c 324->327 331 405ca0-405cce LoadImageW 325->331 332 405c94-405c9b call 405fbd 325->332 327->325 333 405c2e-405c34 327->333 335 405cd0-405cfb RegisterClassW 331->335 336 405d4d-405d55 call 401533 331->336 332->331 337 405c36-405c44 call 40670b 333->337 338 405c47-405c55 lstrlenW 333->338 339 405d04-405d48 SystemParametersInfoW CreateWindowExW 335->339 340 405cfd-405cff 335->340 349 405e07-405e09 336->349 350 405d5b-405d66 call 405a82 336->350 337->338 343 405c57-405c65 lstrcmpiW 338->343 344 405c7d-405c85 call 40666b call 406c2f 338->344 339->336 345 405e0a-405e11 340->345 343->344 348 405c67-405c71 GetFileAttributesW 343->348 344->325 352 405c73-405c75 348->352 353 405c77-405c78 call 406e25 348->353 349->345 359 405d6c-405d86 ShowWindow call 4062b3 350->359 360 405dee-405def call 405967 350->360 352->344 352->353 353->344 365 405d92-405da3 GetClassInfoW 359->365 366 405d88-405d8d call 4062b3 359->366 364 405df4-405df6 360->364 367 405e12-405e14 call 401533 364->367 368 405df8-405dfe 364->368 371 405da5-405db9 GetClassInfoW RegisterClassW 365->371 372 405dbb-405dde DialogBoxParamW call 401533 365->372 366->365 374 405e19 367->374 368->349 373 405e00-405e02 call 401533 368->373 371->372 377 405de3-405dec call 403dfb 372->377 373->349 374->374 377->345
                          APIs
                            • Part of subcall function 004069FB: GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,00403918,0000000C), ref: 00406A09
                            • Part of subcall function 004069FB: GetProcAddress.KERNEL32(00000000), ref: 00406A25
                          • lstrcatW.KERNEL32(1033,00421200,80000001,Control Panel\Desktop\ResourceLocale,00000000,00421200,00000000,00000002,00000000,771B3420,00000000,771B3170), ref: 00405BC4
                          • lstrlenW.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Anvilled,1033,00421200,80000001,Control Panel\Desktop\ResourceLocale,00000000,00421200,00000000,00000002,00000000), ref: 00405C48
                          • lstrcmpiW.KERNEL32(-000000FC,.exe,Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Anvilled,1033,00421200,80000001,Control Panel\Desktop\ResourceLocale,00000000,00421200,00000000), ref: 00405C5D
                          • GetFileAttributesW.KERNEL32(Call), ref: 00405C68
                          • LoadImageW.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Anvilled), ref: 00405CB1
                            • Part of subcall function 00406734: wsprintfW.USER32 ref: 00406741
                          • RegisterClassW.USER32(00428CE0), ref: 00405CF6
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00405D0D
                          • CreateWindowExW.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00405D42
                          • ShowWindow.USER32(00000005,00000000), ref: 00405D74
                          • GetClassInfoW.USER32(00000000,RichEdit20W,00428CE0), ref: 00405D9F
                          • GetClassInfoW.USER32(00000000,RichEdit,00428CE0), ref: 00405DAC
                          • RegisterClassW.USER32(00428CE0), ref: 00405DB9
                          • DialogBoxParamW.USER32(?,00000000,00405095,00000000), ref: 00405DD4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                          • String ID: .DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Anvilled$Call$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20W$_Nb
                          • API String ID: 1975747703-2507647627
                          • Opcode ID: edc898fe0945ce5741e5c6398a2f53b5c95347c49c29c129406737a47328b788
                          • Instruction ID: a853d14af79947da6f9b2e8ec0e988c18d5098f7c5c81f72d75faaabc62159d3
                          • Opcode Fuzzy Hash: edc898fe0945ce5741e5c6398a2f53b5c95347c49c29c129406737a47328b788
                          • Instruction Fuzzy Hash: B461E570201605BEE620AB65EE46F2B366CEF14758F51403FF941B61E1DF7C59018EAD

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 380 40154a-4015bd 381 402ea1 380->381 382 4015c3-4015c7 380->382 402 402ea5 381->402 383 4016c1-4016cf 382->383 384 4017c2-401e9e call 40303e call 4066e4 382->384 385 401684-4016aa 382->385 386 4015e6-4015ee 382->386 387 4018cb-4018d4 call 40303e call 406b6b 382->387 388 40160c-40160d 382->388 389 4015ce-4015d0 382->389 390 4016ef-4016fb call 40303e SetFileAttributesW 382->390 391 4016af-4016bc call 406734 382->391 392 40182f-40184b call 40303e GetFullPathNameW 382->392 393 401711-401728 call 40303e call 406cda 382->393 394 401633-40163a SetForegroundWindow 382->394 395 4017d3-4017f6 call 40303e * 3 MoveFileW 382->395 396 4015d5-4015d6 382->396 397 401618-40162e call 403002 Sleep 382->397 398 4015f9-401607 call 4030fd call 401399 382->398 399 40189b-4018b8 call 40303e SearchPathW 382->399 400 4018de-401904 call 40303e call 406f18 382->400 401 40163f-401645 382->401 414 4016d1-4016d5 ShowWindow 383->414 415 4016d9-4016e0 383->415 471 401bb2-401bb6 384->471 472 401ea4-401ea8 384->472 412 402ead-402eb7 385->412 418 4015f0-4015f7 PostQuitMessage 386->418 419 4015dc-4015e1 386->419 455 4018d9 387->455 406 40160e-401613 call 405e3d 388->406 389->412 448 401701-401703 390->448 391->381 446 401857-40185d 392->446 447 40184d-401855 392->447 464 401784-40178e 393->464 465 40172a-40173f call 40670b 393->465 394->381 481 401804-401808 395->481 482 4017f8-4017ff 395->482 416 4015d7 call 405e3d 396->416 397->381 398->412 399->381 440 4018be-4018c6 399->440 467 401906-40190c call 406c2f 400->467 468 40190e-401920 call 406c2f call 40666b lstrcatW 400->468 409 401671-40167f 401->409 410 401647 401->410 403 402eab 402->403 403->412 406->381 409->381 429 401657-40166c call 403002 410->429 430 401649-401650 410->430 414->415 415->381 433 4016e6-4016ea ShowWindow 415->433 416->419 418->419 419->412 429->381 430->429 433->381 440->402 459 40187b 446->459 460 40185f-401862 446->460 458 40187f-401883 447->458 448->381 461 401709-40170c 448->461 455->448 458->402 470 401889-401896 GetShortPathNameW 458->470 459->458 460->459 469 401864-40186c call 4066e4 460->469 461->402 477 401790-4017ab call 405e3d call 406c2f SetCurrentDirectoryW 464->477 478 4017bb-4017bd 464->478 487 401741-401745 465->487 488 401758-401759 call 405f21 465->488 490 401925-40192d call 406e52 467->490 468->490 469->447 493 40186e-401876 call 406c2f 469->493 470->402 471->412 472->412 477->381 511 4017b1-4017b6 477->511 478->406 481->461 489 40180e-401816 call 4066e4 481->489 482->406 487->488 494 401747-40174e call 406611 487->494 503 40175e-401760 488->503 489->461 507 40181c-40182a call 406352 489->507 510 40192e-401931 490->510 493->459 494->488 512 401750-401751 call 405f41 494->512 508 401762-401767 503->508 509 401775-40177e 503->509 507->406 514 401774 508->514 515 401769-401772 GetFileAttributesW 508->515 509->465 516 401780 509->516 517 401933-40193d call 4066e4 510->517 518 401964-401966 510->518 511->381 525 401756 512->525 514->509 515->509 515->514 516->464 529 401950-401960 517->529 530 40193f-40194e CompareFileTime 517->530 522 401968-401969 call 406cb2 518->522 523 40196e-401989 call 406a30 518->523 522->523 531 401a18-401a49 call 405e3d call 4032c7 523->531 532 40198f-401991 523->532 525->503 529->518 530->529 545 401a52-401a5a SetFileTime 531->545 546 401a4b-401a50 531->546 533 401993-4019df call 406c2f * 2 call 405fbd call 406c2f call 406bbd 532->533 534 4019fd-401a13 call 405e3d 532->534 533->510 563 4019e5-4019e8 533->563 534->402 548 401a60-401a6d CloseHandle 545->548 546->545 546->548 548->381 550 401a73-401a76 548->550 552 401a78-401a87 call 405fbd lstrcatW 550->552 553 401a89-401a8c call 405fbd 550->553 557 401a91-401a9c call 406bbd 552->557 553->557 557->419 557->471 564 4019f2-4019f8 563->564 565 4019ea-4019ed 563->565 564->403 565->416
                          APIs
                          • PostQuitMessage.USER32(00000000), ref: 004015F1
                          • Sleep.KERNELBASE(00000001,?,00000000,00000000), ref: 00401628
                          • SetForegroundWindow.USER32 ref: 00401634
                          • ShowWindow.USER32(?,00000000,?,?,00000000,00000000), ref: 004016D3
                          • ShowWindow.USER32(?,?,?,?,00000000,00000000), ref: 004016E8
                          • SetFileAttributesW.KERNELBASE(00000000,?,000000F0,?,?,00000000,00000000), ref: 004016FB
                          • GetFileAttributesW.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0,?,?,00000000,00000000), ref: 0040176A
                          • SetCurrentDirectoryW.KERNELBASE(00000000,C:\Users\user\AppData\Local\Anvilled,00000000,000000E6,C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll), ref: 004017A3
                          • MoveFileW.KERNEL32(00000000,00000000), ref: 004017EE
                          • GetFullPathNameW.KERNEL32(00000000,00000400,00000000,?,00000000,000000E3,C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll,?,?,00000000,00000000), ref: 00401843
                          • GetShortPathNameW.KERNEL32(00000000,00000000,00000400), ref: 00401890
                          • SearchPathW.KERNEL32(00000000,00000000,00000000,00000400,00000000,?,000000FF,?,?,00000000,00000000), ref: 004018B0
                          • lstrcatW.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Anvilled,00000000,00000000,00000031,00000000,00000000,000000EF,?,?,00000000,00000000), ref: 00401920
                          • CompareFileTime.KERNEL32(-00000014,00000000,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Anvilled,00000000,00000000,00000031,00000000,00000000,000000EF), ref: 00401948
                          • SetFileTime.KERNELBASE(00000000,000000FF,00000000,000000FF,?,00000000,00000000,00000000,000000EA,00000000,Call,40000000,00000001,Call,00000000), ref: 00401A5A
                          • CloseHandle.KERNELBASE(00000000), ref: 00401A61
                          • lstrcatW.KERNEL32(Call,00000000,Call,000000E9), ref: 00401A82
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: File$PathWindow$AttributesNameShowTimelstrcat$CloseCompareCurrentDirectoryForegroundFullHandleMessageMovePostQuitSearchShortSleep
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nsk89.tmp$C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll$C:\Users\user\AppData\Local\Anvilled$Call
                          • API String ID: 3895412863-1593856006
                          • Opcode ID: 68950bb1ebeb6225cd62330d136d113d7f3aaaaab8d8f59b6ae84e2e14c53e75
                          • Instruction ID: a1785f87335a1d6f00f335b021900493bb5bdccd3db236d5a22e690d77315129
                          • Opcode Fuzzy Hash: 68950bb1ebeb6225cd62330d136d113d7f3aaaaab8d8f59b6ae84e2e14c53e75
                          • Instruction Fuzzy Hash: 89D1D871204301ABD710AF26CD85D2F76A8EF85758F110A3FF456B22E1DB7CD902966E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 566 40348f-4034db GetTickCount GetModuleFileNameW call 406a30 569 4034e7-403517 call 406c2f call 406e25 call 406c2f GetFileSize 566->569 570 4034dd-4034e2 566->570 578 40351d 569->578 579 40360f-40361e call 4033e9 569->579 571 4036b1-4036bb 570->571 581 403524-40354a call 40311b 578->581 584 403624-403626 579->584 585 4036ac 579->585 587 403550-403557 581->587 588 4036a4-4036ab call 4033e9 581->588 589 403628-403647 call 403131 call 406a5d 584->589 590 40364f-40369b GlobalAlloc call 407d89 call 406b6b CreateFileW 584->590 585->571 591 4035d5-4035d8 587->591 592 403559-403572 call 4067c9 587->592 588->585 589->585 618 403649-40364d 589->618 616 40369d-4036a2 590->616 617 4036be-4036f3 call 403131 call 4032c7 590->617 600 4035e2-4035e8 591->600 601 4035da-4035e1 call 4033e9 591->601 592->600 609 403574-40357c 592->609 602 4035ea-4035f9 call 406f51 600->602 603 4035fd-403605 600->603 601->600 602->603 603->581 611 40360b 603->611 609->600 615 40357e-403586 609->615 611->579 615->600 619 403588-403590 615->619 616->571 626 4036f8-4036fc 617->626 618->585 618->590 619->600 621 403592-40359a 619->621 621->600 623 40359c-4035bb 621->623 623->585 625 4035c1-4035c7 623->625 625->611 628 4035c9-4035cf 625->628 626->585 627 4036fe-403710 626->627 629 403712 627->629 630 403718-40371b 627->630 628->600 631 4035d1-4035d3 628->631 629->630 632 40371e-403726 630->632 631->600 632->632 633 403728-403742 call 4067c9 632->633 633->571
                          APIs
                          • GetTickCount.KERNEL32 ref: 004034A1
                          • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\-pdf.bat.exe,00000400), ref: 004034BD
                            • Part of subcall function 00406A30: GetFileAttributesW.KERNELBASE(00000003,004034D0,C:\Users\user\Desktop\-pdf.bat.exe,80000000,00000003), ref: 00406A34
                            • Part of subcall function 00406A30: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000), ref: 00406A54
                          • GetFileSize.KERNEL32(00000000,00000000,00438000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\-pdf.bat.exe,C:\Users\user\Desktop\-pdf.bat.exe,80000000,00000003), ref: 00403507
                          • GlobalAlloc.KERNELBASE(00000040,?), ref: 00403655
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                          • String ID: C:\Users\user~1\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\-pdf.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author $Null$soft
                          • API String ID: 2803837635-3011249260
                          • Opcode ID: 599ca7be9194ffd7aba6a4343ff8315617eef4df89bd3b83fc00f7988b37868b
                          • Instruction ID: 3b142060e7b9412fd979dc1fb42ba0df29582307c8f1f7093b8b137cbf00f437
                          • Opcode Fuzzy Hash: 599ca7be9194ffd7aba6a4343ff8315617eef4df89bd3b83fc00f7988b37868b
                          • Instruction Fuzzy Hash: 2D61F571640300ABD730AF24DD86B5A7BA8EB84715F100A3FF541B72E1CB3D9A458B5E

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 636 405e3d-405e49 637 405f1a-405f1e 636->637 638 405e4f-405e62 636->638 639 405e64-405e69 call 405fbd 638->639 640 405e6e-405e7e lstrlenW 638->640 639->640 641 405e80-405e8f lstrlenW 640->641 642 405ea3 640->642 644 405e95-405ea1 lstrcatW 641->644 645 405f17-405f19 641->645 646 405ea8-405eab 642->646 644->646 645->637 647 405eba-405ebd 646->647 648 405ead-405eb4 SetWindowTextW 646->648 649 405f05-405f07 647->649 650 405ebf-405f03 SendMessageW * 3 647->650 648->647 649->645 651 405f09-405f0f 649->651 650->649 651->645
                          APIs
                          • lstrlenW.KERNEL32(00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E6F
                          • lstrlenW.KERNEL32(?,00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E81
                          • lstrcatW.KERNEL32(00424230,?,?,00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E9C
                          • SetWindowTextW.USER32(00424230,00424230), ref: 00405EB4
                          • SendMessageW.USER32(?), ref: 00405EDB
                          • SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405EF6
                          • SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00405F03
                            • Part of subcall function 00405FBD: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,?,00403466), ref: 0040618F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$lstrcatlstrlen$TextWindow
                          • String ID: 0BB$0BB$0BB$0BB$C:\Users\user\Desktop
                          • API String ID: 1759915248-643024207
                          • Opcode ID: 2475f87d803c5ef63a02e9ec05c0eb26efa1af4e36a7e4118f10b924440d8630
                          • Instruction ID: 0ce1c44fb447bcfc908b7bbe79f9094619b51c0f52104d818297a9f3ba0da135
                          • Opcode Fuzzy Hash: 2475f87d803c5ef63a02e9ec05c0eb26efa1af4e36a7e4118f10b924440d8630
                          • Instruction Fuzzy Hash: FA21F532A056546BD310AF55DD40A5BFB9CEF94350F44043EF988A3291C7BC5D004AAE

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 652 405fbd-405fc6 653 405fc8-405fd7 652->653 654 405fd9-405ff4 652->654 653->654 655 405ff6-406001 654->655 656 40600b-406012 654->656 655->656 659 406003-406007 655->659 657 406218-40621f 656->657 658 406018-40601b 656->658 661 406221-406228 call 406c2f 657->661 662 40622a 657->662 660 40601c-40602a 658->660 659->656 663 406030-40603b 660->663 664 406213-406217 660->664 666 40622c-406232 661->666 662->666 667 406041-406085 663->667 668 4061ec 663->668 664->657 672 406197-40619a 667->672 673 40608b-40609a 667->673 670 4061fa 668->670 671 4061ee-4061f8 668->671 674 4061fd 670->674 671->674 675 4061d0-4061d3 672->675 676 40619c-40619f 672->676 677 4060d9-4060dc 673->677 678 40609c-4060c7 call 406a8c 673->678 681 4061ff-40620d 674->681 683 4061d5-4061d9 call 405fbd 675->683 684 4061de-4061ea lstrlenW 675->684 679 4061a1-4061ad call 406734 676->679 680 4061af-4061c6 call 406c2f 676->680 685 4060de-4060ea GetSystemDirectoryW 677->685 686 4060ef-4060f2 677->686 697 40617d-406182 678->697 698 4060cd-4060d4 call 405fbd 678->698 679->684 680->684 701 4061c8-4061ce call 406e52 680->701 681->660 681->664 683->684 684->681 691 406179 685->691 692 406102 686->692 693 4060f4-406100 GetWindowsDirectoryW 686->693 691->697 694 406104-406120 692->694 693->691 699 406132-406152 call 4069fb 694->699 700 406122-406126 694->700 697->701 703 406184-406187 697->703 698->697 713 406154-40616a SHGetPathFromIDListW CoTaskMemFree 699->713 714 40616c-406173 699->714 708 40612e-406130 700->708 701->684 703->701 707 406189-406195 lstrcatW 703->707 707->701 708->699 711 406175 708->711 711->691 713->711 713->714 714->694 714->711
                          APIs
                          • GetSystemDirectoryW.KERNEL32(Call,00000400), ref: 004060E4
                            • Part of subcall function 00406C2F: lstrcpynW.KERNEL32(?,?,00000400,00403979,00428D40,NSIS Error), ref: 00406C3C
                            • Part of subcall function 00405FBD: SHGetPathFromIDListW.SHELL32(00000000,Call), ref: 00406156
                            • Part of subcall function 00405FBD: CoTaskMemFree.OLE32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,00403466,00000000), ref: 00406162
                          • GetWindowsDirectoryW.KERNEL32(Call,00000400,00424230,?,?,?,?,C:\Users\user\Desktop,00000000,00000000), ref: 004060FA
                          • lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,?,00403466), ref: 0040618F
                          • lstrlenW.KERNEL32(Call,00424230,?,?,?,?,C:\Users\user\Desktop,00000000,00000000), ref: 004061DF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Directory$FreeFromListPathSystemTaskWindowslstrcatlstrcpynlstrlen
                          • String ID: 0BB$Call$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                          • API String ID: 698176107-1118408401
                          • Opcode ID: c4305dca4c3c9a80663fe91b25f080845fb2b885571739180ef8a7dc8815ff10
                          • Instruction ID: 652daa6bf86f9d3fc302909022c953cc0e89febb2bd57c9f500c2de9f400e0ee
                          • Opcode Fuzzy Hash: c4305dca4c3c9a80663fe91b25f080845fb2b885571739180ef8a7dc8815ff10
                          • Instruction Fuzzy Hash: 586105312042159BD710AF299C80A3B76A4AF99310F12443FF986FB2D1D63CC9268B6D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 779 40291d-402934 call 403002 782 402ea1-402ea5 779->782 783 40293a-40294b 779->783 787 402eab-402eb7 782->787 784 402951-402965 call 406d3a 783->784 785 402aa2-402aac 783->785 784->785 792 40296b-402973 784->792 791 402ab5-402aba 785->791 793 402ad3-402ae2 SetFilePointer 791->793 794 402abc-402ac1 791->794 797 402975-40297a 792->797 793->785 795 402ac3-402ac6 794->795 796 402ac8-402ad1 794->796 795->793 795->796 796->785 798 402980-40299c ReadFile 797->798 799 402a33-402a37 797->799 798->785 800 4029a2-4029ac 798->800 801 402a39-402a3b 799->801 802 402a4c-402a5b call 406a5d 799->802 800->785 804 4029b2-4029bf 800->804 801->802 805 402a3d-402a46 call 406599 801->805 802->785 812 402a5d-402a61 802->812 808 402ae4-402aee call 406734 804->808 809 4029c5-4029dc MultiByteToWideChar 804->809 805->785 814 402a48 805->814 808->782 808->787 809->812 813 4029de-4029e4 809->813 816 402a65-402a69 812->816 817 4029e6-4029f4 813->817 814->802 816->808 818 402a6b-402a76 816->818 817->816 819 4029f6-402a2f SetFilePointer MultiByteToWideChar 817->819 818->791 820 402a78-402a7d 818->820 819->817 821 402a31 819->821 820->791 822 402a7f-402a92 820->822 821->812 822->785 823 402a94-402a9c 822->823 823->785 823->797
                          APIs
                          • ReadFile.KERNELBASE(00000000,?,?,?), ref: 00402994
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,?,00000001), ref: 004029D4
                          • SetFilePointer.KERNELBASE(?,?,?,00000001,?,00000008,?,?,?,00000001), ref: 00402A07
                          • MultiByteToWideChar.KERNEL32(?,00000008,?,?,00000001,00000001,?,00000001,?,00000008,?,?,?,00000001), ref: 00402A1F
                          • SetFilePointer.KERNEL32(?,?,?,00000001,00000000,?,00000002), ref: 00402ADC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: File$ByteCharMultiPointerWide$Read
                          • String ID: 9
                          • API String ID: 1439708474-2366072709
                          • Opcode ID: cbce69830b2ac27408b95c64c0cddadcdc42c8f250a6c4142035317a81010454
                          • Instruction ID: eba2a45eeb10f73dc6eed4f84907f68d60de0f16478c8bc33572b7d083648977
                          • Opcode Fuzzy Hash: cbce69830b2ac27408b95c64c0cddadcdc42c8f250a6c4142035317a81010454
                          • Instruction Fuzzy Hash: 6A5149B1618301AFD724DF15CA44A2BB7E8BFD5304F00483FF981A62D0DBB9D9458B2A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 824 4062b3-4062d3 GetSystemDirectoryW 825 4062d5-4062d7 824->825 826 4062ed 824->826 825->826 827 4062d9-4062e4 825->827 828 4062ef 826->828 827->828 829 4062e6-4062eb 827->829 830 4062f4-406321 wsprintfW LoadLibraryExW 828->830 829->830
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004062CA
                          • wsprintfW.USER32 ref: 00406306
                          • LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040631A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: DirectoryLibraryLoadSystemwsprintf
                          • String ID: %s%S.dll$UXTHEME$\
                          • API String ID: 2200240437-1946221925
                          • Opcode ID: 714dfd95af2ce998ffd3f91a4f209d2bb5680a21a200567e99444b52dbb044f1
                          • Instruction ID: 3c81b89deb225ca8298b9d33e2fe5aa7d3ba7ba3c7b224130f881f219ff7cca8
                          • Opcode Fuzzy Hash: 714dfd95af2ce998ffd3f91a4f209d2bb5680a21a200567e99444b52dbb044f1
                          • Instruction Fuzzy Hash: 35F0967150151457D710B764DE0DB9737A8AF00304F5044BEA546F21C0EBBCDA54C79C

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 831 406b6b-406b77 832 406b78-406baa GetTickCount GetTempFileNameW 831->832 833 406bb5 832->833 834 406bac-406bae 832->834 836 406bb7-406bba 833->836 834->832 835 406bb0-406bb3 834->835 835->836
                          APIs
                          • GetTickCount.KERNEL32 ref: 00406B87
                          • GetTempFileNameW.KERNELBASE(?,0073006E,00000000,?,?,?,00000000,00403DD7,1033,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406BA2
                          Strings
                          • n, xrefs: 00406B79
                          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00406B74
                          • a, xrefs: 00406B80
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00406B70
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: CountFileNameTempTick
                          • String ID: C:\Users\user~1\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.$a$n
                          • API String ID: 1716503409-3496289110
                          • Opcode ID: 7d0d4397dd5f524cd1bb2981e1ab45d43d420a4297ed1305e9605d287a9de6af
                          • Instruction ID: 03f97ff025160759833fd1c5b54d4c15cc798ac05920b73cd7f9cb615ebaa677
                          • Opcode Fuzzy Hash: 7d0d4397dd5f524cd1bb2981e1ab45d43d420a4297ed1305e9605d287a9de6af
                          • Instruction Fuzzy Hash: 63F0BEB2200218BBEB148F44DC09BDE777EEF90710F10807BE941AB180E6F06A5483A4

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 837 40225d-402268 838 40233e-402343 837->838 839 40226e-402289 call 40303e * 2 837->839 840 402345-40234a call 405e3d 838->840 849 40228b-402296 GetModuleHandleW 839->849 850 40229c-4022aa LoadLibraryExW 839->850 847 402ea5-402eb7 840->847 852 4022b0-4022c2 call 40637e 849->852 853 402298 849->853 850->852 854 402335-40233c 850->854 857 4022c4-4022ca 852->857 858 402306-40230c call 405e3d 852->858 853->850 854->840 860 4022e6-402304 857->860 861 4022cc-4022e0 call 405e3d 857->861 862 402311-402315 858->862 860->862 861->862 871 4022e2-4022e4 861->871 862->847 865 40231b-402323 call 403dd9 862->865 865->847 870 402329-402330 FreeLibrary 865->870 870->847 871->862
                          APIs
                          • GetModuleHandleW.KERNELBASE(00000000,00000001,000000F0), ref: 0040228C
                            • Part of subcall function 00405E3D: lstrlenW.KERNEL32(00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E6F
                            • Part of subcall function 00405E3D: lstrlenW.KERNEL32(?,00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E81
                            • Part of subcall function 00405E3D: lstrcatW.KERNEL32(00424230,?,?,00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E9C
                            • Part of subcall function 00405E3D: SetWindowTextW.USER32(00424230,00424230), ref: 00405EB4
                            • Part of subcall function 00405E3D: SendMessageW.USER32(?), ref: 00405EDB
                            • Part of subcall function 00405E3D: SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405EF6
                            • Part of subcall function 00405E3D: SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00405F03
                          • LoadLibraryExW.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 004022A0
                          • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 0040232A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$Librarylstrlen$FreeHandleLoadModuleTextWindowlstrcat
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll
                          • API String ID: 334405425-3506212881
                          • Opcode ID: 47bf99d45f064d7ea273baa28ef99b1fd27508b9c52d70213c0230c50d8e9019
                          • Instruction ID: 5ab2f9945def4c914915ed97a450473ade9320cc6c17bc2c10081fcd0c3c0cb4
                          • Opcode Fuzzy Hash: 47bf99d45f064d7ea273baa28ef99b1fd27508b9c52d70213c0230c50d8e9019
                          • Instruction Fuzzy Hash: F121FB32644301A7C7119F61CE49A3F7694AF94751F60053FF951712D0DBBC98129A9F

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 872 402656-4026a8 call 40303e * 2 call 403023 call 4063ba 881 402ea5-402eb7 872->881 882 4026ae-4026b9 872->882 884 4026d1-4026d6 882->884 885 4026bb-4026cf call 40303e lstrlenW 882->885 888 4026e7-4026ec 884->888 889 4026d8-4026e5 call 403002 884->889 891 402700-40271a RegSetValueExW 885->891 888->891 892 4026ee-4026fe call 4032c7 888->892 889->891 896 40271c-402723 RegCloseKey 891->896 892->891 896->881
                          APIs
                          • lstrlenW.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsk89.tmp,00000023,?,00000011,00000002), ref: 004026C3
                          • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user~1\AppData\Local\Temp\nsk89.tmp,?,?,00000011,00000002), ref: 00402710
                          • RegCloseKey.ADVAPI32(?,?,?,C:\Users\user~1\AppData\Local\Temp\nsk89.tmp,?,?,00000011,00000002), ref: 0040271D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: CloseValuelstrlen
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nsk89.tmp
                          • API String ID: 2655323295-46121652
                          • Opcode ID: ade492d5df03a8d2c7ae578a81cf4fc1b43c494d79c722f1f7b613b4c58fbaf7
                          • Instruction ID: af464e8318e7c5fbf483fadd1347ea1ff69f410dc300b2d4ce688db9f9141b9d
                          • Opcode Fuzzy Hash: ade492d5df03a8d2c7ae578a81cf4fc1b43c494d79c722f1f7b613b4c58fbaf7
                          • Instruction Fuzzy Hash: 0821F232604300ABD7119FA5CD45B2FBBE8EB98764F11483EF581F31C0C7B99905879A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 898 4069fb-406a11 GetModuleHandleA 899 406a13-406a14 call 4062b3 898->899 900 406a1d-406a25 GetProcAddress 898->900 903 406a19-406a1b 899->903 902 406a2b-406a2d 900->902 903->900 903->902
                          APIs
                          • GetModuleHandleA.KERNEL32(UXTHEME,Error writing temporary file. Make sure your temp folder is valid.,UXTHEME,00403918,0000000C), ref: 00406A09
                          • GetProcAddress.KERNEL32(00000000), ref: 00406A25
                            • Part of subcall function 004062B3: GetSystemDirectoryW.KERNEL32(?,00000104), ref: 004062CA
                            • Part of subcall function 004062B3: wsprintfW.USER32 ref: 00406306
                            • Part of subcall function 004062B3: LoadLibraryExW.KERNEL32(?,00000000,00000008), ref: 0040631A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                          • String ID: Error writing temporary file. Make sure your temp folder is valid.$UXTHEME
                          • API String ID: 2547128583-890815371
                          • Opcode ID: 5444f8ec23be2c6a9b0b43c4d015ad41947603a44c70bf61a8aaf5f9aaa848d0
                          • Instruction ID: fde045b120d4e9fbedc4602cc912674c940b6414d211d64326a364595d17484f
                          • Opcode Fuzzy Hash: 5444f8ec23be2c6a9b0b43c4d015ad41947603a44c70bf61a8aaf5f9aaa848d0
                          • Instruction Fuzzy Hash: 18D0C2322012159BC7007F22AE0888B771DEF96350705843AF541B2230D738C82289BD
                          APIs
                          • CreateDirectoryW.KERNELBASE(00000000,?), ref: 00405F82
                          • GetLastError.KERNEL32 ref: 00405F8C
                          • SetFileSecurityW.ADVAPI32(00000000,80000007,00000001), ref: 00405FA5
                          • GetLastError.KERNEL32 ref: 00405FB3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: ErrorLast$CreateDirectoryFileSecurity
                          • String ID:
                          • API String ID: 3449924974-0
                          • Opcode ID: 26aef2f2a74a45cd408aa394e611098260eee0f39c193ac8fe47435c93f2fc62
                          • Instruction ID: 042ea5188ab4a242f45dae448e3eca013d4ac0ceece2a382c006faaf9ef1663f
                          • Opcode Fuzzy Hash: 26aef2f2a74a45cd408aa394e611098260eee0f39c193ac8fe47435c93f2fc62
                          • Instruction Fuzzy Hash: F1012C74D0060ADFEB008FA0DA04BAEBBB4FF04355F10443AE545F2290D77886488F99
                          APIs
                          • SetFilePointer.KERNELBASE(?,00000000,00000000,C:\Users\user\Desktop,?,00000000,004036F8,000000FF,00000000,00000000,?,?), ref: 004032EA
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID: C:\Users\user\Desktop
                          • API String ID: 973152223-3976562730
                          • Opcode ID: e848af23392ef9212b537c313fa36c8933c56bd9746aa11a2b1857199a9f20aa
                          • Instruction ID: 03ccdd90c03623ddb9a7e60c54f99ad42dbd580121bb72f8b918a97a4a7c42e8
                          • Opcode Fuzzy Hash: e848af23392ef9212b537c313fa36c8933c56bd9746aa11a2b1857199a9f20aa
                          • Instruction Fuzzy Hash: A631BF71600205AFDF109F5ADE80E9E3EACAB44755B00413EFE05F62A1DB38DE20DB69
                          APIs
                          • CreateDirectoryW.KERNELBASE(?,00000000,C:\Users\user~1\AppData\Local\Temp\,00403DCC,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00405F29
                          • GetLastError.KERNEL32 ref: 00405F33
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00405F21
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: CreateDirectoryErrorLast
                          • String ID: C:\Users\user~1\AppData\Local\Temp\
                          • API String ID: 1375471231-2382934351
                          • Opcode ID: ffc7d6197e1beb19ef1624df4ffa93a3437123ffd0222c56b7c883f1d5fa86bc
                          • Instruction ID: 7225596eb2c355decc995a26192eac208658e83bd5f5fd8e1e75763a45e760bc
                          • Opcode Fuzzy Hash: ffc7d6197e1beb19ef1624df4ffa93a3437123ffd0222c56b7c883f1d5fa86bc
                          • Instruction Fuzzy Hash: E1C08C327005319BC3701B75BE0CA87BE98EF107A1303423AF988E2220DA308C00CBE8
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 57e40a78f00abd15777e94ecd5bdab5ad8d33f2a4d0ed0717479564f524859e3
                          • Instruction ID: a17ac8480bdadea9300d7b84b1a57ef3aebf7c5664a30c8e763fb849d5045f8c
                          • Opcode Fuzzy Hash: 57e40a78f00abd15777e94ecd5bdab5ad8d33f2a4d0ed0717479564f524859e3
                          • Instruction Fuzzy Hash: D4913571A0C3908FD364CF29C480B6ABBE1AFC9344F10892EE59AD7390D774A905CB57
                          APIs
                            • Part of subcall function 70442351: GlobalFree.KERNEL32(?), ref: 70442A44
                            • Part of subcall function 70442351: GlobalFree.KERNEL32(?), ref: 70442A4A
                            • Part of subcall function 70442351: GlobalFree.KERNEL32(?), ref: 70442A50
                          • GlobalFree.KERNEL32(00000000), ref: 70441738
                          • FreeLibrary.KERNEL32(?), ref: 704417C3
                          • GlobalFree.KERNEL32(00000000), ref: 704417E9
                            • Part of subcall function 70441FCB: GlobalAlloc.KERNEL32(00000040,?), ref: 70441FFA
                            • Part of subcall function 704417F7: GlobalAlloc.KERNEL32(00000040,00000000,?,?,00000000,?,?,70441708,00000000), ref: 7044189A
                            • Part of subcall function 70441F1E: wsprintfW.USER32 ref: 70441F51
                          Memory Dump Source
                          • Source File: 00000000.00000002.3782009729.0000000070441000.00000020.00000001.01000000.00000005.sdmp, Offset: 70440000, based on PE: true
                          • Associated: 00000000.00000002.3781994438.0000000070440000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782022710.0000000070444000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782035449.0000000070446000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_70440000_-pdf.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc$Librarywsprintf
                          • String ID:
                          • API String ID: 3962662361-0
                          • Opcode ID: e078864a9b98d6421ab4706601495b551b98313bb6e05d55760e1fa220053f7f
                          • Instruction ID: c2c1e54ce530f1b9c5b7f592afd94dd64df7f950e73418a7a821418d04fd4f07
                          • Opcode Fuzzy Hash: e078864a9b98d6421ab4706601495b551b98313bb6e05d55760e1fa220053f7f
                          • Instruction Fuzzy Hash: 7C41BF36400249AFFB209F24D985B9E37FDBB41319F30601DF94A9A3A6DB7CA944C651
                          APIs
                          • GetTickCount.KERNEL32 ref: 0040315B
                            • Part of subcall function 00403131: SetFilePointer.KERNELBASE(00000000,00000000,00000000,004036CC,?), ref: 0040313F
                          • SetFilePointer.KERNELBASE(00000000,00000000,?,004032F7,00000004,C:\Users\user\Desktop,?,00000000,004036F8,000000FF,00000000,00000000,?,?), ref: 0040318E
                          • SetFilePointer.KERNELBASE(0000506C,00000000,00000000,004149F0,-0032D18C,?,004032F7,00000004,C:\Users\user\Desktop,?,00000000,004036F8,000000FF,00000000,00000000,?), ref: 004032AD
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: FilePointer$CountTick
                          • String ID:
                          • API String ID: 1092082344-0
                          • Opcode ID: 5996c985795e8b5707d76d0be3e92778556d34cb048b6a269bacef030baef48e
                          • Instruction ID: d2eefc4df71019c2b16fa905559572dc2303f56b63bf2239b88d083b882742d4
                          • Opcode Fuzzy Hash: 5996c985795e8b5707d76d0be3e92778556d34cb048b6a269bacef030baef48e
                          • Instruction Fuzzy Hash: F8315CF1912211DBC710AF29EE849667F68EB84326711433FE901B72E0CB399944DB9D
                          APIs
                          • RegEnumKeyW.ADVAPI32(00000000,00000000,?,000003FF), ref: 004027E8
                          • RegEnumValueW.ADVAPI32(00000000,00000000,?,?), ref: 004027FC
                          • RegCloseKey.ADVAPI32(00000000,?,?), ref: 00402818
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Enum$CloseValue
                          • String ID:
                          • API String ID: 397863658-0
                          • Opcode ID: fe6b0462bbb9c812055640b7e05a812a5f0f6476a15b8fe0613a818189b17234
                          • Instruction ID: b0fab6ada048a007bc7a9e7ea159b859fb2c46f1cf0919f9de2b856f0b768ccb
                          • Opcode Fuzzy Hash: fe6b0462bbb9c812055640b7e05a812a5f0f6476a15b8fe0613a818189b17234
                          • Instruction Fuzzy Hash: 3501B531658341ABD3189F61ED88D3BB79CFF85315F11093EF542A21C0D7B86904866A
                          APIs
                          • MulDiv.KERNEL32(?,00007530,00000000), ref: 004013F9
                          • SendMessageW.USER32(?,00000402,00000000), ref: 00401409
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 21baafe9a7a0f76613877036fe6656a1d903344fa510fbd339b417530e455d25
                          • Instruction ID: 290020a6ffb3b0b642d393fb7515e003cd99aebe452f8161eadcedbee24de40e
                          • Opcode Fuzzy Hash: 21baafe9a7a0f76613877036fe6656a1d903344fa510fbd339b417530e455d25
                          • Instruction Fuzzy Hash: 65014732B102309BD7296F28EC08B2A3698A790711F55053EF901F72F1D6B8CC06839C
                          APIs
                          • RegDeleteValueW.ADVAPI32(00000000,00000000,00000033), ref: 0040261E
                          • RegCloseKey.ADVAPI32(00000000), ref: 00402627
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: CloseDeleteValue
                          • String ID:
                          • API String ID: 2831762973-0
                          • Opcode ID: 58e93c502c6760cf7afac41f66f3caaeb4af238a1542128eb1103078922c963e
                          • Instruction ID: 362cb4f6b20b44c4732fe0c2e8830287d718b01241407342bacb51c37ffe1250
                          • Opcode Fuzzy Hash: 58e93c502c6760cf7afac41f66f3caaeb4af238a1542128eb1103078922c963e
                          • Instruction Fuzzy Hash: D6F02433645600A7E210ABA49D4AA7E765DAB903A2F11053FF642B61C4CEBE8C46866D
                          APIs
                          • ShowWindow.USER32(00000000,00000000), ref: 00402061
                          • EnableWindow.USER32(00000000,00000000), ref: 0040206C
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Window$EnableShow
                          • String ID:
                          • API String ID: 1136574915-0
                          • Opcode ID: 891da5ed0a96c49853c0618874e93badcd3494bf22b074912de49e1286eaee8a
                          • Instruction ID: d3ea980f862b26b5144c0637eecc05b71e9f62faeec01463a38ba2c80611de59
                          • Opcode Fuzzy Hash: 891da5ed0a96c49853c0618874e93badcd3494bf22b074912de49e1286eaee8a
                          • Instruction Fuzzy Hash: 5EE026726083009FE314AF20E94E96AB768EB40326F20443FF940B40C1CBBE2C4186BE
                          APIs
                          • GetFileAttributesW.KERNELBASE(00000003,004034D0,C:\Users\user\Desktop\-pdf.bat.exe,80000000,00000003), ref: 00406A34
                          • CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000), ref: 00406A54
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: File$AttributesCreate
                          • String ID:
                          • API String ID: 415043291-0
                          • Opcode ID: 2636aa4b6e8d56909014eda2f457a88b1db290e94deca41eabb4e2e5bf5542ae
                          • Instruction ID: 6944e5d097c49adef6872dbe64bc52011f165bd8882031d975811287a59293c5
                          • Opcode Fuzzy Hash: 2636aa4b6e8d56909014eda2f457a88b1db290e94deca41eabb4e2e5bf5542ae
                          • Instruction Fuzzy Hash: C1D09E71118201AEDF054F20DE4AF1FBA65EF84711F114A2CF2A5940F0DA718825AB15
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,?,00000000,?,?), ref: 00402B11
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: c9684272530c97a3937d2c2dd0a9e88e4371c21dc146d787c3a44186b09c15e4
                          • Instruction ID: bb3698166f2f7887da60b512e7e280e5d3ba2552d442c0d01900f7df534159fe
                          • Opcode Fuzzy Hash: c9684272530c97a3937d2c2dd0a9e88e4371c21dc146d787c3a44186b09c15e4
                          • Instruction Fuzzy Hash: CBE0DF722452007FD600AB11ED8AC3FB31CEB8031EF04483FF504A40C1C67E280186AA
                          APIs
                          • ReadFile.KERNELBASE(?,00000000,00000000,?,00000000,004149F0,-0032D18C,?,00000000,0040312E,?,?,00403292,004149F0,-0032D18C), ref: 00406A74
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: FileRead
                          • String ID:
                          • API String ID: 2738559852-0
                          • Opcode ID: f8dde0e6d0967dcd1486054d06716264d6198d5106f5dd6c4da627d3f0af441a
                          • Instruction ID: 385196eb23d11a36dc6e38e8ab68dc4ec2e70565b983062d54c52da8055020ce
                          • Opcode Fuzzy Hash: f8dde0e6d0967dcd1486054d06716264d6198d5106f5dd6c4da627d3f0af441a
                          • Instruction Fuzzy Hash: B0E0BF7220011ABB8F205B8ADD04D9FBFADEE966A07114026B905A6150D670EA11DAE4
                          APIs
                          • WriteFile.KERNELBASE(?,00000000,00000000,?,00000000,0041BE0C,-0032D18C,?,00000000,0040322C,004189F0,0041BE0C,004149F0,-0032D18C,?,004032F7), ref: 00406B37
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: FileWrite
                          • String ID:
                          • API String ID: 3934441357-0
                          • Opcode ID: 918db18773234dd27a4ccea7b05120dde1c36639e2429e3c910a208a0e7f3d6c
                          • Instruction ID: 1f3280817f598c96c51f842603ae3c0d9e7838c34cd32eb3dba11bf4455027e8
                          • Opcode Fuzzy Hash: 918db18773234dd27a4ccea7b05120dde1c36639e2429e3c910a208a0e7f3d6c
                          • Instruction Fuzzy Hash: 57E0B6B2200129BB8F209B8ADD08D9FFFBDEE957A07124036F905E6150D674EA11D6E4
                          APIs
                          • RegCreateKeyExW.KERNELBASE(00000000,?,00000000,00000000,00000000,?,00000000,?,00000000,?,?), ref: 004063E3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Create
                          • String ID:
                          • API String ID: 2289755597-0
                          • Opcode ID: a0b6da99e5e71265e8373ba8059e24fe5c697144cc542e2b776cf21a3b2d53e8
                          • Instruction ID: 20d2b18cbbbfb2fbef22a2957ce1d045c06c2643f5e2d934d02d27322de197f6
                          • Opcode Fuzzy Hash: a0b6da99e5e71265e8373ba8059e24fe5c697144cc542e2b776cf21a3b2d53e8
                          • Instruction Fuzzy Hash: 75E0B6B2010209BEEF095F90ED0AEBB361DEB08310F01852EBE06E4091E6B5ED30A675
                          APIs
                          • VirtualProtect.KERNELBASE(7044501C,00000004,00000040,70445034), ref: 70441A68
                          Memory Dump Source
                          • Source File: 00000000.00000002.3782009729.0000000070441000.00000020.00000001.01000000.00000005.sdmp, Offset: 70440000, based on PE: true
                          • Associated: 00000000.00000002.3781994438.0000000070440000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782022710.0000000070444000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782035449.0000000070446000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_70440000_-pdf.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 5f75e884adaa71efc1ee6efff84fe33ebaad4fd484bddbe86f671108732a0b8c
                          • Instruction ID: b0709e779aabe9f9989565cbb47278eaef448524f05f8b9c8b6ec4018c7ab0e7
                          • Opcode Fuzzy Hash: 5f75e884adaa71efc1ee6efff84fe33ebaad4fd484bddbe86f671108732a0b8c
                          • Instruction Fuzzy Hash: 53F0C07E919340DADB18DF1AAC447097AE0B71A345B20453EFE49DA362C77145009B9A
                          APIs
                          • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00424230,00000000,00000800,00424230,?,00406ABA,00000800,?,?,?,Call,00000000,00000000), ref: 00406411
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Open
                          • String ID:
                          • API String ID: 71445658-0
                          • Opcode ID: 5d90062fdd1cff32f27602045ec2692a1b627fa5483aed50fd6290a01ccc32d2
                          • Instruction ID: c4076ac10ec322d1f621b48464b0146dd55e4c4a2c3eba9e58b2c244d89ab2f2
                          • Opcode Fuzzy Hash: 5d90062fdd1cff32f27602045ec2692a1b627fa5483aed50fd6290a01ccc32d2
                          • Instruction Fuzzy Hash: 3CD0123200020DBBDF116E909D05FAB372DEB04350F01482AFE06A4091D775D530AB19
                          APIs
                            • Part of subcall function 00405FBD: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,?,00403466), ref: 0040618F
                          • SetDlgItemTextW.USER32(?,?,00000000), ref: 00405637
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: ItemTextlstrcat
                          • String ID:
                          • API String ID: 3433768297-0
                          • Opcode ID: 0a47412119046910f8567a3edcb2020fc28baccfd11460674a2097b00f1d61e3
                          • Instruction ID: 789d532d0cfa21274277a88f6342db929b0c0901db561bf65b50e3de0f7c97c4
                          • Opcode Fuzzy Hash: 0a47412119046910f8567a3edcb2020fc28baccfd11460674a2097b00f1d61e3
                          • Instruction Fuzzy Hash: 37C04C7514C641BFE642A755CC42F1FB799EF94315F00C92EB59CE51D1CA3984309A26
                          APIs
                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004055FD
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: 0b54b37c65a6f2e9775963e423fcf6596bf7a1857849fbbceef3d2bf8cc140d1
                          • Instruction ID: acaaf28e16a1f9bce30303e423b06679eb72cb68f5cd5c36ac2be97ede75637d
                          • Opcode Fuzzy Hash: 0b54b37c65a6f2e9775963e423fcf6596bf7a1857849fbbceef3d2bf8cc140d1
                          • Instruction Fuzzy Hash: C6C04C717446006AEA209B619D05F077764AB50701F508C397244E51E0CA75E411DA1C
                          APIs
                          • SendMessageW.USER32(00000028,?,00000001,0040543B), ref: 00405614
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: a3bd4e69c3a0b4c191a261ee86b7d51c4704c391ae90971fff71fbbf7edd3ec2
                          • Instruction ID: 7fc37ce8999bee95357acd9183195076b7b6587e69e68807996e1ccba99c995d
                          • Opcode Fuzzy Hash: a3bd4e69c3a0b4c191a261ee86b7d51c4704c391ae90971fff71fbbf7edd3ec2
                          • Instruction Fuzzy Hash: 8EB092352D1600AADA215B00DE09F4ABB62ABA4741F008838B240640F0CAB200A5DB08
                          APIs
                          • SetFilePointer.KERNELBASE(00000000,00000000,00000000,004036CC,?), ref: 0040313F
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: FilePointer
                          • String ID:
                          • API String ID: 973152223-0
                          • Opcode ID: eeb6e3b4f510f7bce7f4acd2004317b94e1f980229c798523801c224a6f07df3
                          • Instruction ID: 249934cc5d2069a5a678a88893d20fb7c04287045258dfdbdab4020963f10c22
                          • Opcode Fuzzy Hash: eeb6e3b4f510f7bce7f4acd2004317b94e1f980229c798523801c224a6f07df3
                          • Instruction Fuzzy Hash: 94B09231140200AADA214F009E0AF057B21AB90700F108434B290680F086711060EA0D
                          APIs
                          • VirtualAlloc.KERNELBASE(?), ref: 70442DD3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3782009729.0000000070441000.00000020.00000001.01000000.00000005.sdmp, Offset: 70440000, based on PE: true
                          • Associated: 00000000.00000002.3781994438.0000000070440000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782022710.0000000070444000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782035449.0000000070446000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_70440000_-pdf.jbxd
                          Similarity
                          • API ID: AllocVirtual
                          • String ID:
                          • API String ID: 4275171209-0
                          • Opcode ID: c6270ab5d7e90594305aaf0d3f1c385471c45875b42a7bb79e165b0111f0d96c
                          • Instruction ID: 3b05535ceda300b1834938e3d92da33a03dbba7b9f7daea297ebfee5043a5dce
                          • Opcode Fuzzy Hash: c6270ab5d7e90594305aaf0d3f1c385471c45875b42a7bb79e165b0111f0d96c
                          • Instruction Fuzzy Hash: 81417D7A900204DFEB109FA5EE86B4D77B5EB45358F70643EF9058B371DA3CA981CA81
                          APIs
                          • GetDlgItem.USER32(?,000003F9), ref: 00404539
                          • GetDlgItem.USER32(?,00000408), ref: 00404545
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 0040458D
                          • LoadImageW.USER32(0000006E,00000000,00000000,00000000,00000000), ref: 004045A6
                          • SetWindowLongW.USER32(00000000,000000FC,Function_000059D3), ref: 004045BD
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004045D3
                          • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 004045E5
                          • SendMessageW.USER32(00000000,00001109,00000002), ref: 004045F8
                          • SendMessageW.USER32(00000000,0000111C,00000000,00000000), ref: 00404604
                          • SendMessageW.USER32(00000000,0000111B,00000010,00000000), ref: 00404616
                          • DeleteObject.GDI32(00000000), ref: 00404619
                          • SendMessageW.USER32(?,00000143,00000000,00000000), ref: 00404647
                          • SendMessageW.USER32(?,00000151,00000000,00000000), ref: 00404651
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 004046FC
                          • SendMessageW.USER32(?,0000110A,00000003,00000000), ref: 00404726
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040473C
                          • GetWindowLongW.USER32(?,000000F0), ref: 0040476B
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00404778
                          • ShowWindow.USER32(?,00000005), ref: 0040478C
                          • SendMessageW.USER32(?,00000419,00000000,?), ref: 004048C9
                          • SendMessageW.USER32(?,00000147,00000000,00000000), ref: 00404944
                          • SendMessageW.USER32(?,00000150,00000000,00000000), ref: 00404963
                          • SendMessageW.USER32(?,00000420,00000000,00000020), ref: 0040498F
                          • SendMessageW.USER32(?,00000200,00000000,00000000), ref: 004049C4
                          • ImageList_Destroy.COMCTL32(?), ref: 004049EB
                          • GlobalFree.KERNEL32(?), ref: 004049FB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$ImageWindow$List_Long$GlobalItem$AllocCreateDeleteDestroyFreeLoadMaskedObjectShow
                          • String ID: M
                          • API String ID: 1688767230-3664761504
                          • Opcode ID: bee424e7aad126ffc3dd94acac0c55c887baa37b8f9f8150c8b02386ace4a1e4
                          • Instruction ID: f817e89bcf48760cfb5f4289bf731060a572f333ebe8f74edde3a20025983385
                          • Opcode Fuzzy Hash: bee424e7aad126ffc3dd94acac0c55c887baa37b8f9f8150c8b02386ace4a1e4
                          • Instruction Fuzzy Hash: 7A12C0B16043009FD720DF25DD45A2BB6E9EBC8314F104A3EFA95E72E1DB789C418B59
                          APIs
                          • GetDlgItem.USER32(?,000003FB), ref: 004041D9
                          • SetWindowTextW.USER32(00000000,?), ref: 00404203
                            • Part of subcall function 00406B4F: GetDlgItemTextW.USER32(?,?,00000400,0040504F), ref: 00406B62
                            • Part of subcall function 00406E52: CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,00403DB4,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406EC7
                            • Part of subcall function 00406E52: CharNextW.USER32(?,?,?,00000000), ref: 00406ED6
                            • Part of subcall function 00406E52: CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,00403DB4,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406EDB
                            • Part of subcall function 00406E52: CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,00403DB4,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406EF3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Char$Next$ItemText$PrevWindow
                          • String ID: :B$ :B$ :B$A$C:\Users\user\AppData\Local\Anvilled$Call
                          • API String ID: 4089110348-3279199050
                          • Opcode ID: 64a89f78390c37e28e39dbc90de8c98faa8b9fb800003988ad5373c0b078ce64
                          • Instruction ID: a7973db417e6baa05db810715503a342ede3a04454d7dbc9c1eaaa2829578ea4
                          • Opcode Fuzzy Hash: 64a89f78390c37e28e39dbc90de8c98faa8b9fb800003988ad5373c0b078ce64
                          • Instruction Fuzzy Hash: 8C91B2B1604311ABD710AF65DD81B5B76A8EF84704F41083EFB85B62D1DA7CD9018BAE
                          APIs
                            • Part of subcall function 704412F8: GlobalAlloc.KERNEL32(00000040,?,704411C4,-000000A0), ref: 70441302
                          • GlobalAlloc.KERNEL32(00000040,00001CA4), ref: 7044294E
                          • lstrcpyW.KERNEL32(00000008,?), ref: 704429A4
                          • lstrcpyW.KERNEL32(00000808,?), ref: 704429AF
                          • GlobalFree.KERNEL32(00000000), ref: 704429C0
                          • GlobalFree.KERNEL32(?), ref: 70442A44
                          • GlobalFree.KERNEL32(?), ref: 70442A4A
                          • GlobalFree.KERNEL32(?), ref: 70442A50
                          • GetModuleHandleW.KERNEL32(00000008), ref: 70442B1A
                          • LoadLibraryW.KERNEL32(00000008), ref: 70442B2B
                          • GetProcAddress.KERNEL32(?,?), ref: 70442B82
                          • lstrlenW.KERNEL32(00000808), ref: 70442B9D
                          Memory Dump Source
                          • Source File: 00000000.00000002.3782009729.0000000070441000.00000020.00000001.01000000.00000005.sdmp, Offset: 70440000, based on PE: true
                          • Associated: 00000000.00000002.3781994438.0000000070440000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782022710.0000000070444000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782035449.0000000070446000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_70440000_-pdf.jbxd
                          Similarity
                          • API ID: Global$Free$Alloclstrcpy$AddressHandleLibraryLoadModuleProclstrlen
                          • String ID:
                          • API String ID: 1042148487-0
                          • Opcode ID: f2d4e1c2b57f946e76a7413f80b4ab5611a85362784f64f2546a740c4d1a5075
                          • Instruction ID: b1f0621ced5c8e70a243552b76f60387d3fc5f334a4dbdc6af4aad8a30ca70fe
                          • Opcode Fuzzy Hash: f2d4e1c2b57f946e76a7413f80b4ab5611a85362784f64f2546a740c4d1a5075
                          • Instruction Fuzzy Hash: 3142CF71A08302DFE315CF24C64066EB7F4FF88315F905A2EF49AD6294E778D9458B92
                          APIs
                          • CoCreateInstance.OLE32(004089F0,?,00000001,004089D0,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 004023D8
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll, xrefs: 004024AC
                          • C:\Users\user\AppData\Local\Anvilled, xrefs: 0040241F
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll$C:\Users\user\AppData\Local\Anvilled
                          • API String ID: 542301482-1183829909
                          • Opcode ID: b71783c70e184a6a7ddeb92b2c083ba09767801481a9076baeb437bf216bbb0d
                          • Instruction ID: f69d0b7262b398630d4842e81ecf7832ddb853ca3a8a3f947773e47297c7f3c3
                          • Opcode Fuzzy Hash: b71783c70e184a6a7ddeb92b2c083ba09767801481a9076baeb437bf216bbb0d
                          • Instruction Fuzzy Hash: ED414B72204341AFC314DFA5C948A2BBBE9FF89304F10092EF695DB291DBB9D805CB16
                          APIs
                          • FindFirstFileW.KERNEL32(00000000,?,00000002), ref: 00402B85
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: FileFindFirst
                          • String ID:
                          • API String ID: 1974802433-0
                          • Opcode ID: aa95f51c6264b43bf771eda4cc7eb5353e28d7212280a1e96ce165172d32d45d
                          • Instruction ID: 674c96032337a1ae6b1bd2494ca7cf71499a5ca917b528e2f8746cac593059ec
                          • Opcode Fuzzy Hash: aa95f51c6264b43bf771eda4cc7eb5353e28d7212280a1e96ce165172d32d45d
                          • Instruction Fuzzy Hash: D9D0E261415250AAD260AF718A49ABA73ADAF05354F204A3EF196E20D1EABC6502932F
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: fcf2038373dac2d3d8319ce80b5227dedc9fd9d207136d333b3d89b18dbcf931
                          • Instruction ID: 0f19b20907bbe26c6374d5e5023c6d38e836cc393430afbe8d7ff324f94daeea
                          • Opcode Fuzzy Hash: fcf2038373dac2d3d8319ce80b5227dedc9fd9d207136d333b3d89b18dbcf931
                          • Instruction Fuzzy Hash: 36C16A71A0C3918FD364CF29C48076ABBE1FBC5300F54892EE4DA97391E678A546DB4B
                          APIs
                          • CheckDlgButton.USER32(?,?,00000001), ref: 00403F2C
                          • EnableWindow.USER32(?), ref: 00403F39
                          • GetDlgItem.USER32(?,000003E8), ref: 00403F45
                          • SendMessageW.USER32(00000000,0000045B,00000001,00000000), ref: 00403F61
                          • GetSysColor.USER32(?), ref: 00403F72
                          • SendMessageW.USER32(00000000,00000443,00000000,?), ref: 00403F80
                          • SendMessageW.USER32(00000000,00000445,00000000,04010000), ref: 00403F8E
                          • lstrlenW.KERNEL32(?), ref: 00403F94
                          • SendMessageW.USER32(00000000,00000435,00000000,00000000), ref: 00403FA1
                          • SendMessageW.USER32(00000000,00000449,?,?), ref: 00403FB8
                          • GetDlgItem.USER32(?,0000040A), ref: 00404014
                          • SendMessageW.USER32(00000000), ref: 0040401B
                          • EnableWindow.USER32(00000000), ref: 00404038
                          • GetDlgItem.USER32(0000004E,000003E8), ref: 0040405C
                          • SendMessageW.USER32(00000000,0000044B,00000000,?), ref: 004040B1
                          • LoadCursorW.USER32(00000000,00007F02), ref: 004040C3
                          • SetCursor.USER32(00000000), ref: 004040CC
                            • Part of subcall function 00406B08: ShellExecuteExW.SHELL32(?), ref: 00406B17
                          • LoadCursorW.USER32(00000000,00007F00), ref: 0040410E
                          • SetCursor.USER32(00000000), ref: 00404111
                          • SendMessageW.USER32(00000111,00000001,00000000), ref: 0040413D
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 00404155
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$Cursor$Item$EnableLoadWindow$ButtonCheckColorExecuteShelllstrlen
                          • String ID: N$|B
                          • API String ID: 3270077613-741270461
                          • Opcode ID: 6926f728b9a4140239efee31cad9342915eb37f61d6186b76a8037dd33359e50
                          • Instruction ID: 03ac8205f382ddc68e99412b94d7e0d93baa4fe0dd377c53b404b89af8b9d0ff
                          • Opcode Fuzzy Hash: 6926f728b9a4140239efee31cad9342915eb37f61d6186b76a8037dd33359e50
                          • Instruction Fuzzy Hash: F8816EB0644305AFD7109F24DD48A6B7BA8FB98344F40093EF685A72A1CB789945CB6A
                          APIs
                          • DefWindowProcW.USER32(?,?,?,?), ref: 0040102E
                          • BeginPaint.USER32(?,?), ref: 0040104C
                          • GetClientRect.USER32(?,?), ref: 00401062
                          • CreateBrushIndirect.GDI32(00000000), ref: 004010DF
                          • FillRect.USER32(00000000,?,00000000), ref: 004010F3
                          • DeleteObject.GDI32(00000000), ref: 004010FA
                          • CreateFontIndirectW.GDI32(?), ref: 00401120
                          • SetBkMode.GDI32(00000000,00000001), ref: 00401143
                          • SetTextColor.GDI32(00000000,000000FF), ref: 0040114D
                          • SelectObject.GDI32(00000000,00000000), ref: 0040115B
                          • DrawTextW.USER32(00000000,00428D40,000000FF,?,00000820), ref: 00401171
                          • SelectObject.GDI32(00000000,00000000), ref: 00401179
                          • DeleteObject.GDI32(?), ref: 0040117F
                          • EndPaint.USER32(?,?), ref: 0040118E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                          • String ID: F
                          • API String ID: 941294808-1304234792
                          • Opcode ID: 2ca4e0cb8bbe08ec02795cdb68367fd140eecc9f655486cbe37f55fdb25868c2
                          • Instruction ID: cbd0933a51e0d69d1329980f29ca5745c9819e032560b200aac5586c4a4d24f6
                          • Opcode Fuzzy Hash: 2ca4e0cb8bbe08ec02795cdb68367fd140eecc9f655486cbe37f55fdb25868c2
                          • Instruction Fuzzy Hash: C541BF720083509FC7159F65CE4496FBBE9FF88715F150A2EF9D5A62A0CA34C904CFA5
                          APIs
                          • CloseHandle.KERNEL32(00000000,00000000,00000000,00000001,?,?,00000000,?,00406373,?,?), ref: 00406456
                          • GetShortPathNameW.KERNEL32(00000000,00426E78,00000400), ref: 0040645F
                          • GetShortPathNameW.KERNEL32(?,00426678,00000400), ref: 0040647C
                          • wsprintfA.USER32 ref: 0040649A
                          • GetFileSize.KERNEL32(00000000,00000000,00426678,C0000000,00000004,00426678,?), ref: 004064D2
                          • GlobalAlloc.KERNEL32(00000040,0000000A), ref: 004064E2
                          • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000), ref: 00406512
                          • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,00000000,00426278,00000000,-0000000A,004089A4,00000000,[Rename],00000000,00000000,00000000), ref: 00406532
                          • GlobalFree.KERNEL32(00000000), ref: 00406544
                          • CloseHandle.KERNEL32(00000000), ref: 0040654B
                            • Part of subcall function 00406A30: GetFileAttributesW.KERNELBASE(00000003,004034D0,C:\Users\user\Desktop\-pdf.bat.exe,80000000,00000003), ref: 00406A34
                            • Part of subcall function 00406A30: CreateFileW.KERNELBASE(?,?,00000001,00000000,?,00000000,00000000), ref: 00406A54
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: File$CloseGlobalHandleNamePathShort$AllocAttributesCreateFreePointerSizelstrcpywsprintf
                          • String ID: %ls=%ls$[Rename]$xfB$xnB
                          • API String ID: 2900126502-517554076
                          • Opcode ID: ac91c1a28502f1bfb87c1199f85f6386a03c8f980d5b1fd238676458d943b8cb
                          • Instruction ID: 0cce765fd4ac64f64f5847131bacee5d89b3958391fbe683fc7760f607864942
                          • Opcode Fuzzy Hash: ac91c1a28502f1bfb87c1199f85f6386a03c8f980d5b1fd238676458d943b8cb
                          • Instruction Fuzzy Hash: 7131F2B02006117AD6207B25AD49F7B3A6CEF41748F16003EF943B62D6DE7CC8128A7C
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402C09
                          • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,?,?,?,?,000000F0), ref: 00402C33
                          • GlobalFree.KERNEL32(?), ref: 00402C7E
                          • GlobalFree.KERNEL32(00000000), ref: 00402C94
                          • CloseHandle.KERNEL32(00000000,?,00000000,?,?,00000000,40000000,00000002,00000000,00000000), ref: 00402CB1
                          • DeleteFileW.KERNEL32(00000000,00000000,40000000,00000002,00000000,00000000,?,?,?,?,?,?,?,000000F0), ref: 00402CC4
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll, xrefs: 00402CD3
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Global$AllocFree$CloseDeleteFileHandle
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll
                          • API String ID: 2667972263-3506212881
                          • Opcode ID: ec2f19e7735bcee35764a1c419a37c79c0b5e252fdbd4c41f47b9c28b54a733e
                          • Instruction ID: 074600833c42f0693f5f472c4feb87f1cd667ccf468de98b174193e6d8715b1c
                          • Opcode Fuzzy Hash: ec2f19e7735bcee35764a1c419a37c79c0b5e252fdbd4c41f47b9c28b54a733e
                          • Instruction Fuzzy Hash: 30310871408351AFD310AF65CE48E1FBAE8AF89754F11463EF5A1772D2C77898018B9A
                          APIs
                          • CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,00403DB4,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406EC7
                          • CharNextW.USER32(?,?,?,00000000), ref: 00406ED6
                          • CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,00403DB4,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406EDB
                          • CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,00403DB4,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406EF3
                          Strings
                          • *?|<>/":, xrefs: 00406EB6
                          • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00406E59
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 00406E52, 00406E54
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Char$Next$Prev
                          • String ID: *?|<>/":$C:\Users\user~1\AppData\Local\Temp\$Error writing temporary file. Make sure your temp folder is valid.
                          • API String ID: 589700163-3572696228
                          • Opcode ID: d7cee7299210071b0bd5c0c877b0836f4874a5f45daef98052a11ed8e57e76f7
                          • Instruction ID: 678fcbdb596b78e8a7eea6de8248b36d7e838f456ea6c1a5848c0ba59b47ba4e
                          • Opcode Fuzzy Hash: d7cee7299210071b0bd5c0c877b0836f4874a5f45daef98052a11ed8e57e76f7
                          • Instruction Fuzzy Hash: E211F32950073559DA306B6ACC4097B62E8EF697A1316443BFACAA32C0E77D8D51D2E8
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                          • String ID:
                          • API String ID: 2320649405-0
                          • Opcode ID: bf0799ea3bd6f053e04a74c3ecacf9df28762d59f89d86d460fcd2570ffda868
                          • Instruction ID: 853fd2a938e6063eae5099aa51e4afe06320ee8032e9b574836c5d7031c179f8
                          • Opcode Fuzzy Hash: bf0799ea3bd6f053e04a74c3ecacf9df28762d59f89d86d460fcd2570ffda868
                          • Instruction Fuzzy Hash: FE21D675500B04EFDB349F28DA48A5B77F4EF057607008A3DE896A26B0DB34E814CF14
                          APIs
                          • GlobalFree.KERNEL32(00000000), ref: 704421BF
                            • Part of subcall function 704412E1: lstrcpynW.KERNEL32(00000000,?,7044156A,?,704411C4,-000000A0), ref: 704412F1
                          • GlobalAlloc.KERNEL32(00000040), ref: 7044212C
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,?,00000000,00000000), ref: 7044214C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3782009729.0000000070441000.00000020.00000001.01000000.00000005.sdmp, Offset: 70440000, based on PE: true
                          • Associated: 00000000.00000002.3781994438.0000000070440000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782022710.0000000070444000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782035449.0000000070446000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_70440000_-pdf.jbxd
                          Similarity
                          • API ID: Global$AllocByteCharFreeMultiWidelstrcpyn
                          • String ID: @H3w
                          • API String ID: 4216380887-4275297014
                          • Opcode ID: 6fa4ff7eb91e2b1d829c74fc59adf9bb22ef2ef1f642814bb09ed7a3e443daa3
                          • Instruction ID: 6225ac5fa828226255f687b4a817e7557f9cfa63deeeac9cc7057806852720c3
                          • Opcode Fuzzy Hash: 6fa4ff7eb91e2b1d829c74fc59adf9bb22ef2ef1f642814bb09ed7a3e443daa3
                          • Instruction Fuzzy Hash: 29414771405205EFE3019F24C984BEE7BFCFB06344FA4123DFE099A249DBB86591DAA1
                          APIs
                          • DestroyWindow.USER32(00000000), ref: 00403402
                          • GetTickCount.KERNEL32 ref: 00403423
                          • wsprintfW.USER32 ref: 00403452
                            • Part of subcall function 00405E3D: lstrlenW.KERNEL32(00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E6F
                            • Part of subcall function 00405E3D: lstrlenW.KERNEL32(?,00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E81
                            • Part of subcall function 00405E3D: lstrcatW.KERNEL32(00424230,?,?,00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E9C
                            • Part of subcall function 00405E3D: SetWindowTextW.USER32(00424230,00424230), ref: 00405EB4
                            • Part of subcall function 00405E3D: SendMessageW.USER32(?), ref: 00405EDB
                            • Part of subcall function 00405E3D: SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405EF6
                            • Part of subcall function 00405E3D: SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00405F03
                          • CreateDialogParamW.USER32(0000006F,00000000,00403747,00000000), ref: 00403479
                          • ShowWindow.USER32(00000000,00000005), ref: 00403487
                            • Part of subcall function 004033CB: MulDiv.KERNEL32(0003FF03,00000064,0003FF03), ref: 004033E2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                          • String ID: ... %d%%
                          • API String ID: 722711167-2449383134
                          • Opcode ID: bdd0e0c02e783bf097d4f533cddbcf0abc40fd15471b2550623dfac65dc01907
                          • Instruction ID: f266c3144acc84abeb33af89d5a8a1b628b0ed282eaa896ec301c971e6cb58ec
                          • Opcode Fuzzy Hash: bdd0e0c02e783bf097d4f533cddbcf0abc40fd15471b2550623dfac65dc01907
                          • Instruction Fuzzy Hash: 50018470641204EBDB119F64FE8EB593BA8A700B0AF10443EF941F51E0DBB89548CB6C
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004057F6
                          • GetMessagePos.USER32 ref: 004057FE
                          • ScreenToClient.USER32(?,?), ref: 00405818
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0040582C
                          • SendMessageW.USER32(?,0000113E,00000000,?), ref: 00405854
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Message$Send$ClientScreen
                          • String ID: f
                          • API String ID: 41195575-1993550816
                          • Opcode ID: c033d2a482c0bbee4868c7629423a8e69750951f4e6b473a84ec653bd2017e87
                          • Instruction ID: a34ed8a21e94797a74c1091573c129874cd65debd64a168ab9176f0650f2b5a0
                          • Opcode Fuzzy Hash: c033d2a482c0bbee4868c7629423a8e69750951f4e6b473a84ec653bd2017e87
                          • Instruction Fuzzy Hash: 98014C7190020CBADB01EF94DD45BEEBBB9EF04710F10812AFA50BA1E0C7B49A51CF54
                          APIs
                          • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00403765
                          • wsprintfW.USER32 ref: 00403795
                          • SetWindowTextW.USER32(?,?), ref: 004037A5
                          • SetDlgItemTextW.USER32(?,00000406,?), ref: 004037B7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Text$ItemTimerWindowwsprintf
                          • String ID: unpacking data: %d%%$verifying installer: %d%%
                          • API String ID: 1451636040-1158693248
                          • Opcode ID: defbe51d6f9882951ad5208393e217e44a68b2759e178f6fe88e35c9064f4801
                          • Instruction ID: 79e04ba7ff141100257c27fc40fa1ffc2d52e87daa7d5e1ad393195e5ff21367
                          • Opcode Fuzzy Hash: defbe51d6f9882951ad5208393e217e44a68b2759e178f6fe88e35c9064f4801
                          • Instruction Fuzzy Hash: E0F044B0640509ABDF206F64DD46BAA3B6CAB00345F00C03EF946F50D0DFB89A559B9D
                          APIs
                            • Part of subcall function 704412F8: GlobalAlloc.KERNEL32(00000040,?,704411C4,-000000A0), ref: 70441302
                          • GlobalFree.KERNEL32(00000000), ref: 704422F1
                          • GlobalFree.KERNEL32(00000000), ref: 70442326
                          Memory Dump Source
                          • Source File: 00000000.00000002.3782009729.0000000070441000.00000020.00000001.01000000.00000005.sdmp, Offset: 70440000, based on PE: true
                          • Associated: 00000000.00000002.3781994438.0000000070440000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782022710.0000000070444000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782035449.0000000070446000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_70440000_-pdf.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 5175ac00b7c9b015610fa8c35400606c7ac97828abd6b1be9b783d8ff7a596a8
                          • Instruction ID: 9b2531563e342f5f37f2e1f98152bcf8f41dce8ee841f9ef5d3eab8f95228785
                          • Opcode Fuzzy Hash: 5175ac00b7c9b015610fa8c35400606c7ac97828abd6b1be9b783d8ff7a596a8
                          • Instruction Fuzzy Hash: 09310232200101DFF7268F65CE45B2EB7B9FB86315FA015ACF902D62A0C7B99851EB61
                          APIs
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 7044116B
                          • GlobalFree.KERNEL32(00000000), ref: 704411AE
                          • GlobalFree.KERNEL32(00000000), ref: 704411CD
                          • GlobalAlloc.KERNEL32(00000040,?), ref: 704411E6
                          • GlobalFree.KERNEL32 ref: 7044125C
                          • GlobalFree.KERNEL32(?), ref: 704412A7
                          • GlobalFree.KERNEL32(00000000), ref: 704412BF
                          Memory Dump Source
                          • Source File: 00000000.00000002.3782009729.0000000070441000.00000020.00000001.01000000.00000005.sdmp, Offset: 70440000, based on PE: true
                          • Associated: 00000000.00000002.3781994438.0000000070440000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782022710.0000000070444000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782035449.0000000070446000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_70440000_-pdf.jbxd
                          Similarity
                          • API ID: Global$Free$Alloc
                          • String ID:
                          • API String ID: 1780285237-0
                          • Opcode ID: 753ac7e8ac328d0dfafe76adaae99a6264046651d83ef99760c53bc0dcd29715
                          • Instruction ID: 426208f61c2c37099655e745fcff52f324ae772105a46ca5e211e3aedb4dc2fc
                          • Opcode Fuzzy Hash: 753ac7e8ac328d0dfafe76adaae99a6264046651d83ef99760c53bc0dcd29715
                          • Instruction Fuzzy Hash: 6C519D76600201DFEB10DFA9D841A2EB7B8FB4A304B30156EF946E7371DA79E901CB91
                          APIs
                          • RegEnumValueW.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 00401486
                          • RegEnumKeyW.ADVAPI32(?,00000000,?,00000105), ref: 004014D2
                          • RegCloseKey.ADVAPI32(?), ref: 004014DC
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 004014FB
                          • RegCloseKey.ADVAPI32(?), ref: 00401507
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: CloseEnum$DeleteValue
                          • String ID:
                          • API String ID: 1354259210-0
                          • Opcode ID: e8ddf1ba41867b4dcb0a1b51ee85c4361d4a4490657ba90a650c7ccd87fbe96b
                          • Instruction ID: 1a53fb46a82155f82ff31744ef364dfb58a0b08b91411c266ca9c6ebac2befae
                          • Opcode Fuzzy Hash: e8ddf1ba41867b4dcb0a1b51ee85c4361d4a4490657ba90a650c7ccd87fbe96b
                          • Instruction Fuzzy Hash: 98218032108244BBD7219F51DD08FABBBADEF99354F02043EF989A11B0D7359A149A6A
                          APIs
                          • GetDlgItem.USER32(?,?), ref: 00401F03
                          • GetClientRect.USER32(00000000,?), ref: 00401F4D
                          • LoadImageW.USER32(00000000,?,00000100,?,?,00000100), ref: 00401F82
                          • SendMessageW.USER32(00000000,00000172,00000100,00000000), ref: 00401F92
                          • DeleteObject.GDI32(00000000), ref: 00401FA1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                          • String ID:
                          • API String ID: 1849352358-0
                          • Opcode ID: 82f52a09afcb0d3daa84e2303d63fc57e8106e0a43467699c9b4d0f7bcb94b74
                          • Instruction ID: 719508abfab18efcfe9497ff31e10421c437d84cede584cdb3018339205083e7
                          • Opcode Fuzzy Hash: 82f52a09afcb0d3daa84e2303d63fc57e8106e0a43467699c9b4d0f7bcb94b74
                          • Instruction Fuzzy Hash: C621B372609302AFD340DF64DE84A6BB7E8EB88304F04093EF985E62A1D678D840CB59
                          APIs
                          • GetDC.USER32 ref: 00401FB9
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401FD0
                          • MulDiv.KERNEL32(00000000,00000000), ref: 00401FD8
                          • ReleaseDC.USER32(?,00000000), ref: 00401FEB
                            • Part of subcall function 00405FBD: lstrcatW.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch,?,?,?,?,?,?,?,?,?,?,?,?,?,00403466), ref: 0040618F
                          • CreateFontIndirectW.GDI32(0040C8E8), ref: 00402037
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: CapsCreateDeviceFontIndirectReleaselstrcat
                          • String ID:
                          • API String ID: 4253744674-0
                          • Opcode ID: a2cb6d5a530958616e1a68da60b4d574b0b9919d37be39f7b238e4b07ad129ff
                          • Instruction ID: 3db98f0040f9558d3034a6f543d99371bd15d147d3a645f57d18814a747c8483
                          • Opcode Fuzzy Hash: a2cb6d5a530958616e1a68da60b4d574b0b9919d37be39f7b238e4b07ad129ff
                          • Instruction Fuzzy Hash: DA01D472104341EFD300BBB49E4AF5A3BE8E755706F10893DF690B71E1CA784106AB2E
                          APIs
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000,00000000,00000808,00000000,70442B4C,00000000,00000808), ref: 70441F8C
                          • GlobalAlloc.KERNEL32(00000040,00000000), ref: 70441F97
                          • WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 70441FAB
                          • GetProcAddress.KERNEL32(?,00000000), ref: 70441FB6
                          • GlobalFree.KERNEL32(00000000), ref: 70441FBF
                          Memory Dump Source
                          • Source File: 00000000.00000002.3782009729.0000000070441000.00000020.00000001.01000000.00000005.sdmp, Offset: 70440000, based on PE: true
                          • Associated: 00000000.00000002.3781994438.0000000070440000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782022710.0000000070444000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782035449.0000000070446000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_70440000_-pdf.jbxd
                          Similarity
                          • API ID: ByteCharGlobalMultiWide$AddressAllocFreeProc
                          • String ID:
                          • API String ID: 1148316912-0
                          • Opcode ID: 51e8ea919bf9c25c1c274b75201fd440cbe0b28d0b0db8ff2b5883e6bbcec5cb
                          • Instruction ID: 218cdec2f344e6f46c280b6c803070ee72b871cfcc8bd802927d04ceca03dfe6
                          • Opcode Fuzzy Hash: 51e8ea919bf9c25c1c274b75201fd440cbe0b28d0b0db8ff2b5883e6bbcec5cb
                          • Instruction Fuzzy Hash: 8AF0AC33108118BBC6101BA7DC0CE57BE6CEBCB6FEF260225F719D11A0C9A268208771
                          APIs
                          • lstrlenW.KERNEL32(00421200,%u.%u%s%s,?,00000000,00000000,?,000000DC,00000000,?,000000DF,00421200,?,?,?,?,?), ref: 00405722
                          • wsprintfW.USER32 ref: 0040572F
                          • SetDlgItemTextW.USER32(?,00421200), ref: 00405746
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: ItemTextlstrlenwsprintf
                          • String ID: %u.%u%s%s
                          • API String ID: 3540041739-3551169577
                          • Opcode ID: c96249e9300986abb23fa76973b5aeafd7c2cead55943fec95e169e365224207
                          • Instruction ID: 16b5fc0e536004003feacbc0b07359baea7c85987217a9a7f81b4acd8141d083
                          • Opcode Fuzzy Hash: c96249e9300986abb23fa76973b5aeafd7c2cead55943fec95e169e365224207
                          • Instruction Fuzzy Hash: 342106337046145BE720A9799C40FABB289C7C1364F114B3EFD6AF31D1E97A4C0885A5
                          APIs
                          • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,?,?,?), ref: 00401E2C
                          • SendMessageW.USER32(?,00000000,00000000,00000000), ref: 00401E48
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$Timeout
                          • String ID: !
                          • API String ID: 1777923405-2657877971
                          • Opcode ID: 4ac29c9cce96a64425d433324c190f698a606156d2abb8f580e7760b9a936131
                          • Instruction ID: 69e66636fd5bd3b5647f571c9a221c10a7108a79841ed4504f027ee0874c03e8
                          • Opcode Fuzzy Hash: 4ac29c9cce96a64425d433324c190f698a606156d2abb8f580e7760b9a936131
                          • Instruction Fuzzy Hash: B821F471609301AFE714AF21C846A2FBBE8EF84755F00093FF585A61E0D6B99D05CA9A
                          APIs
                          • wsprintfW.USER32 ref: 70441F51
                          • lstrcpyW.KERNEL32(?,error,00001018,70441765,00000000,?), ref: 70441F71
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3782009729.0000000070441000.00000020.00000001.01000000.00000005.sdmp, Offset: 70440000, based on PE: true
                          • Associated: 00000000.00000002.3781994438.0000000070440000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782022710.0000000070444000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782035449.0000000070446000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_70440000_-pdf.jbxd
                          Similarity
                          • API ID: lstrcpywsprintf
                          • String ID: callback%d$error
                          • API String ID: 2408954437-1307476583
                          • Opcode ID: f2adc61b2c283a6bc326ac4e0b3e2488401fee36c991f8d0388df7d6522d262b
                          • Instruction ID: 35fea37a853b79b5369f0cebeacb5ca0bff5aead28f0c96020bc909a2c82ae23
                          • Opcode Fuzzy Hash: f2adc61b2c283a6bc326ac4e0b3e2488401fee36c991f8d0388df7d6522d262b
                          • Instruction Fuzzy Hash: CEF08235204110AFE3048B04D949EBE73B5EFC5310F1581A8FE4A87321C7B8AC558B51
                          APIs
                          • lstrlenW.KERNEL32(?,C:\Users\user~1\AppData\Local\Temp\,00403DC6,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406671
                          • CharPrevW.USER32(?,00000000), ref: 0040667C
                          • lstrcatW.KERNEL32(?,004082B0), ref: 0040668E
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\, xrefs: 0040666B
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: CharPrevlstrcatlstrlen
                          • String ID: C:\Users\user~1\AppData\Local\Temp\
                          • API String ID: 2659869361-2382934351
                          • Opcode ID: af0f29ec3e00eb9cb7465e170f069c3d07ca18caf44beac98ff2055d579f65ee
                          • Instruction ID: e53bcaeb2a9d501c079122a7a30c9a72ba2c4e071b5cbc1f188cd12783ca4c41
                          • Opcode Fuzzy Hash: af0f29ec3e00eb9cb7465e170f069c3d07ca18caf44beac98ff2055d579f65ee
                          • Instruction Fuzzy Hash: A4D01731102A24EBC2025B549E0899B76ACAF46301305446AF982A2160CB78295287FD
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.3782009729.0000000070441000.00000020.00000001.01000000.00000005.sdmp, Offset: 70440000, based on PE: true
                          • Associated: 00000000.00000002.3781994438.0000000070440000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782022710.0000000070444000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000000.00000002.3782035449.0000000070446000.00000002.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_70440000_-pdf.jbxd
                          Similarity
                          • API ID: FreeGlobal$__alldvrm
                          • String ID:
                          • API String ID: 482422042-0
                          • Opcode ID: 64234e56f52b44a60cdad566243ab5d1ca34b3de13cdbb4cbd229f7d89d51595
                          • Instruction ID: 382c3e9e1d27bf23e4dcc55b4436ecc7e56089029d4e95019a3972138a18a665
                          • Opcode Fuzzy Hash: 64234e56f52b44a60cdad566243ab5d1ca34b3de13cdbb4cbd229f7d89d51595
                          • Instruction Fuzzy Hash: 7A5116F6B043458EF3069E75898057E76FAABC9244B30692DF543C3374E6ADEC868252
                          APIs
                          • lstrlenA.KERNEL32(C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll), ref: 004028B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: lstrlen
                          • String ID: C:\Users\user~1\AppData\Local\Temp\nsk89.tmp$C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll
                          • API String ID: 1659193697-301176501
                          • Opcode ID: 387afe5f2ee94bb6b8344b757808788b15e5643010adbc636527a30c9f2b8f3a
                          • Instruction ID: b2a1b44c32654855d82a94df603f8ab0089ff69422b0f6d19ee8e4250137a66d
                          • Opcode Fuzzy Hash: 387afe5f2ee94bb6b8344b757808788b15e5643010adbc636527a30c9f2b8f3a
                          • Instruction Fuzzy Hash: C6110676A4431167C314EB619D8592FB7D4AF84314F55843FF545B21C1D7BC980683AF
                          APIs
                            • Part of subcall function 00405E3D: lstrlenW.KERNEL32(00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E6F
                            • Part of subcall function 00405E3D: lstrlenW.KERNEL32(?,00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E81
                            • Part of subcall function 00405E3D: lstrcatW.KERNEL32(00424230,?,?,00424230,C:\Users\user\Desktop,00000000,00000000), ref: 00405E9C
                            • Part of subcall function 00405E3D: SetWindowTextW.USER32(00424230,00424230), ref: 00405EB4
                            • Part of subcall function 00405E3D: SendMessageW.USER32(?), ref: 00405EDB
                            • Part of subcall function 00405E3D: SendMessageW.USER32(?,0000104D,00000000,?), ref: 00405EF6
                            • Part of subcall function 00405E3D: SendMessageW.USER32(?,00001013,00000000,00000000), ref: 00405F03
                            • Part of subcall function 00406B08: ShellExecuteExW.SHELL32(?), ref: 00406B17
                            • Part of subcall function 00406629: WaitForSingleObject.KERNEL32(?,00000064), ref: 00406633
                            • Part of subcall function 00406629: GetExitCodeProcess.KERNEL32(?,?), ref: 0040665D
                          • CloseHandle.KERNEL32(?,?), ref: 00402110
                          Strings
                          • C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll, xrefs: 00402098
                          • @, xrefs: 004020F2
                          • C:\Users\user\AppData\Local\Anvilled, xrefs: 004020D1
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: MessageSend$lstrlen$CloseCodeExecuteExitHandleObjectProcessShellSingleTextWaitWindowlstrcat
                          • String ID: @$C:\Users\user~1\AppData\Local\Temp\nsk89.tmp\System.dll$C:\Users\user\AppData\Local\Anvilled
                          • API String ID: 4079680657-1872613119
                          • Opcode ID: aa7ec03ee00d28e014fa6505370972872b830a8762c26e593078ae465e74a0c3
                          • Instruction ID: eb73de0908827afac095caf57cdf6eb37e5abf97a1b8575dd1b675aa20df7b67
                          • Opcode Fuzzy Hash: aa7ec03ee00d28e014fa6505370972872b830a8762c26e593078ae465e74a0c3
                          • Instruction Fuzzy Hash: E9118C72A083809BC710EFA2C94561ABBE9BF84345F40493EF595A72D1DBB98805CB4A
                          APIs
                            • Part of subcall function 00406C2F: lstrcpynW.KERNEL32(?,?,00000400,00403979,00428D40,NSIS Error), ref: 00406C3C
                            • Part of subcall function 00406CDA: CharNextW.USER32(?,?,?,00000000,00425A78,00406764,00425A78,00425A78,00000000,?,?,00406850,?,00000000,771B3420,00000000), ref: 00406CE9
                            • Part of subcall function 00406CDA: CharNextW.USER32(00000000), ref: 00406CEE
                            • Part of subcall function 00406CDA: CharNextW.USER32(00000000), ref: 00406D08
                            • Part of subcall function 00406E52: CharNextW.USER32(?,*?|<>/":,00000000,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,00403DB4,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406EC7
                            • Part of subcall function 00406E52: CharNextW.USER32(?,?,?,00000000), ref: 00406ED6
                            • Part of subcall function 00406E52: CharNextW.USER32(?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,00403DB4,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406EDB
                            • Part of subcall function 00406E52: CharPrevW.USER32(?,?,Error writing temporary file. Make sure your temp folder is valid.,C:\Users\user~1\AppData\Local\Temp\,00000000,C:\Users\user~1\AppData\Local\Temp\,00403DB4,C:\Users\user~1\AppData\Local\Temp\,771B3420,00403ACC), ref: 00406EF3
                          • lstrlenW.KERNEL32(00425A78,00000000,00425A78,00425A78,00000000,?,?,00406850,?,00000000,771B3420,00000000), ref: 004067A1
                          • GetFileAttributesW.KERNEL32(00425A78,00425A78), ref: 004067B2
                            • Part of subcall function 004066E4: FindFirstFileW.KERNELBASE(00000000,00427678,00000000,00406791,00425A78), ref: 004066EF
                            • Part of subcall function 004066E4: FindClose.KERNEL32(00000000), ref: 004066FB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Char$Next$FileFind$AttributesCloseFirstPrevlstrcpynlstrlen
                          • String ID: xZB
                          • API String ID: 1879705256-2099606936
                          • Opcode ID: 5800bf596dedfe38e5e8e205addafa35088b03d9a536258e662f59f23e937245
                          • Instruction ID: 2db780cc6ff4cd725acbdd47cdb002ba9ae4a6237b2c335b3197585fa2333bb0
                          • Opcode Fuzzy Hash: 5800bf596dedfe38e5e8e205addafa35088b03d9a536258e662f59f23e937245
                          • Instruction Fuzzy Hash: 41F0816111462159D62123754E8852B55588E0576D75B4E3FFCA3F32D3CA3CCD35917C
                          APIs
                          • RegQueryValueExW.ADVAPI32(?,00424230,00000000,?,00000000,00000800,?,00000800,?,?,?,Call,00000000,00000000,?,004060BE), ref: 00406AD3
                          • RegCloseKey.ADVAPI32(?), ref: 00406ADE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: CloseQueryValue
                          • String ID: Call
                          • API String ID: 3356406503-1824292864
                          • Opcode ID: 06b5c5a8a77114971240aaeb66a1a7ac0d855d789a2ba5ec2246048785c8eebf
                          • Instruction ID: 34caf82e5ea4c281413b850cd147b84363d63a2aa5d54ac32b4bcbe0ea44b894
                          • Opcode Fuzzy Hash: 06b5c5a8a77114971240aaeb66a1a7ac0d855d789a2ba5ec2246048785c8eebf
                          • Instruction Fuzzy Hash: 91014C7651010ABADF218FA4DD0AADF7BF8EF45344F114136B802E2160D274EA64DBA4
                          APIs
                          • IsWindowVisible.USER32(?), ref: 00405A07
                          • CallWindowProcW.USER32(?,?,?,?), ref: 00405A4F
                            • Part of subcall function 004055EB: SendMessageW.USER32(?,00000000,00000000,00000000), ref: 004055FD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.3780115547.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000000.00000002.3780099356.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780131246.0000000000408000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000427000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042C000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.000000000042E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780144711.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000044E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000450000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.000000000048E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.3780238905.0000000000490000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_400000_-pdf.jbxd
                          Similarity
                          • API ID: Window$CallMessageProcSendVisible
                          • String ID:
                          • API String ID: 3748168415-3916222277
                          • Opcode ID: 8bed61b20fc1319d828832d96cd2df9170cc440e4b5382bb1eccda39d0ccd4f6
                          • Instruction ID: 3928be96b0bb21ea01fbc6d57ea2e9352dbda775cb9ee4e874704f653b680fb1
                          • Opcode Fuzzy Hash: 8bed61b20fc1319d828832d96cd2df9170cc440e4b5382bb1eccda39d0ccd4f6
                          • Instruction Fuzzy Hash: D9018F35700908EBDF309F55EC85A9B3A26EB88765F004237FA04B61D1C7798892DEAD